trojan downloader.tibser & backdoor.small

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by buzz4_nt, Feb 11, 2005.

  1. buzz4_nt

    buzz4_nt Private E-2

    We have been hit with a troika:
    Trojan Horse Backdoor.Small.5.BT (puts temp25.exe in temp directory)
    Trojan Horse Downloader.Tibser.E (puts sbar[1] into Temp. Inet Files
    Trojan Horse Downloader.Tibser.E (puts t.exe into windows\system32)

    a bunch of dll's also appeared in system32: msdrs.dll, syfqwpaa.dll, lxossfaa.dll, dsmanager.dll, ntrsh.dll (they reappear after delete, that is, IF they can be deleted); other suspicious(?) ones are: open32.exe, open32.conf and open32_uninstall.exe

    There is a BHO in the registry --> B72F75B8 etc. that is not legitimate.

    During normal startup (I have XP, but have not yet gone to SP2), I notice a quick flash on the screen after which the Microsoft message comes up saying that IE encountered a problem and do I want to send the error report. Of course, when you check out the details, Microsoft indicates that it can't determine the problem. The latest manifestation is that my Google searches get hijacked and sometimes IE just comes up on its own with http://horseserver.net/etc...and some stupid page.

    Grisoft AVG does find the trojans, and I put them in the vault and then deleted them. They have reappeared when I start up. Also, when you try a Google search, you get a different looking page of results with the first page always showing the same results no matter what the search. And then, to add insult to injury, even if you do not have an IE window open, up pops one with address of http://horseserver.net/etc . I tried to put this site as Restricted, but IE Tools says it is already in another site category (even though I do not see it).

    In safe mode, it appears that I am OK, but when I boot up normally,
    I have downloaded and run: Spybot S&D (and the DSO Exploit Fix - it found 1 item to delete);
    Ad-Aware (+ the VX2 cleaner) - found CoolWeb items (including 5 registry keys)
    Grisoft AVG (now just finds 2 Tibser.E items, not the Backdoor.Small downloader though)
    CWShredder
    SpywareBlaster
    CCleaner
    Stinger

    Also, while in Safe Mode, performed Trend Micro's scan (nothing), and Symantec Security check (said I was OK).

    BUT, as soon as I reboot normally, AVG alerts me of the trojans. Please help get rid of them and turn my son's frown (and mine) to a smile. Thanks.

    (It is 8:45 PM now; I will stay on for an hour, and then return tomorrow)
     
  2. buzz4_nt

    buzz4_nt Private E-2

    I also found snim.dll in windows\system32.
     
  3. mastermosley

    mastermosley Sergeant

    Grisoft doesnt work properly i used to use there software. When u detect the trojan it tells you the location of the file and delete it manually. Then delete it from recycle bin and it should be gone.
     
  4. buzz4_nt

    buzz4_nt Private E-2

    Whether I delete manually or delete from the vault, they return when when I startup in normal mode.
     
  5. mastermosley

    mastermosley Sergeant

    I see if i can find anything to help you. Can you tell me the location of the trojan?
     
  6. buzz4_nt

    buzz4_nt Private E-2

    Trojan Horse Backdoor.Small.5.BT (puts temp25.exe in temp directory)
    Trojan Horse Downloader.Tibser.E (puts sbar[1] into Temp. Inet Files)
    Trojan Horse Downloader.Tibser.E (puts t.exe into windows\system32)

    system32 has the bogus dll's also
     
  7. mastermosley

    mastermosley Sergeant

  8. buzz4_nt

    buzz4_nt Private E-2

    well, thx for the link; it does seem similar to my problem, although there seemed to be a lot of trial and error :) I will check in again tomorrow.
     
  9. PhilliePhan

    PhilliePhan Guest

    Hi Buzz,

    These can be a real pain to remove depending on which variant of Haxdoor you are afflicted with. I've had some success against it - See this thread: Wierd search and dialer proggy..think im hijacked

    I have been really busy lately and not sure I can find the time to stick with another long thread like that one. I'm willing to try, but be warned - It may drag out for a while!

    If you want to go ahead and try to remove this baddie (and any others), please send me a HijackThis Log. Please be sure to follow the instructions below:

    Note that your HijackThis should be up-to-date (v1.99) and MUST be extracted to its own safe folder – C:\Program Files\HijackThis!
    Should you need a Fresh Download of HJT, get it HERE: HijackThis v1.99

    Also note that, before you scan, you MUST close all running programs including your web browser, e-mail and items in the system tray.

    Please save your HJT Log as a .txt File and attach it via the "Manage Attachments" tool in the Additional Options section when you post.

    I'll try to take a look when I get some free time!

    PP :)
     
  10. buzz4_nt

    buzz4_nt Private E-2

    Here is the HJT log as requested. I ran the scan while still in safe mode.
     

    Attached Files:

  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    HijackThis log scans must be from normal boot mode as indicated in the HijackThis sticky thread.
     
  12. buzz4_nt

    buzz4_nt Private E-2

    ok, i will boot normally; what do i do when my AVG finds the trojans shortly after bootup? put them in vault and then run HJT? or do i run HJT immediately upon startup?
     
  13. buzz4_nt

    buzz4_nt Private E-2

    OK, attached is the HJT log; after I booted up normally I got the AVG trojan messages, sent them to the vault, closed the 2 items in tray (AVG and MSN Messenger, and then quickly ran HJT. I am now back in Safe mode.
     

    Attached Files:

  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You must not have two antivirus programs installed. Uninstall either AVG or Symantec/Norton. Only keep one.

    Do you know what this next two processes are? They seem suspcious especially open32.exe
    C:\WINDOWS\System32\open32.exe
    C:\Program Files\Smart Protector Pro\smart-protector-pro.exe
     
  15. buzz4_nt

    buzz4_nt Private E-2

    i think open32.exe is associated with the evilness; the other one is probably from an install i did a while ago (i think it is OK, but will remove)
     
  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    If you are using WinXP or WinMe, make sure you have system restore disabled (per the tutorial).
    For all OS types, make sure viewing of hidden files is enabled (per the tutorial).

    Please bring up Task Manager by hitting CTRL-ALT-DEL and click the Processes tab. Look for the below process(es) and if found, End them:
    C:\WINDOWS\System32\open32.exe
    C:\Program Files\Smart Protector Pro\smart-protector-pro.exe

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = C:\WINDOWS\blank.htm
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,SearchAssistant = about:blank
    R3 - Default URLSearchHook is missing
    O2 - BHO: Explorer Class - {962F12AE-2773-4BEB-99EA-B5C3AB9A6606} - C:\WINDOWS\System32\DSMANA~1.DLL

    O4 - HKLM\..\Run: [Shell] open32.exe
    O4 - HKCU\..\Run: [SPSTEALT] "C:\Program Files\Smart Protector Pro\smart-protector-pro.exe" /stealt
    O4 - Startup: winupdate36305678[1].exe
    O15 - Trusted IP range: (HKLM)
    O16 - DPF: {94837F90-A2CA-4A8A-9DA0-B5438EC563EA} - http://install.wildtangent.com/cda/islandrally/ActiveLauncher/ActiveLauncherSetup.cab
    O18 - Filter: text/plain - {B72F75B8-93F3-429D-B13E-660B206D897A} - (no file)
    O21 - SSODL: NTWSMON - {08A0B935-4450-4151-B227-6867D49C5DDD} - C:\WINDOWS\System32\attrls31.dll
    O21 - SSODL: MSMserv - {E195B0C9-A591-4F4D-BD01-5E3E961347A1} - C:\WINDOWS\System32\msdtqasf.dll
    O23 - Service: Content Monitoring Tool - Unknown - C:\WINDOWS\system32\msCMTSrvc.exe (file missing)


    Also do you know what this below service is for:
    O23 - Service: Remote Administrator Service - Unknown - C:\WINDOWS\System32\r_server.exe


    After clicking Fix, exit HJT.

    Boot into safe mode and use Windows Explorer to delete:
    C:\WINDOWS\System32\open32.exe
    C:\Program Files\Smart Protector Pro <-- the whole folder
    C:\WINDOWS\System32\DSMANA~1.DLL

    I want to wait on removing the below two items right now, so just let them be.
    C:\WINDOWS\System32\attrls31.dll
    C:\WINDOWS\System32\msdtqasf.dll

    If you get an error when deleting a file. Right click on the file and check to see if the read only attribute is checked. If it is, uncheck it and try again.

    Now reboot in normal mode and post a new HJT log. And tell us how things are working.
     
  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Forgot two steps before getting the new HJT log do these too:

    Now:
    Go to Start > Run and type: cleanmgr and then click OK. Make sure the boxes for these are checked:
    Temporary Files
    Temporary Internet Files
    Recycle Bin
    And Click OK.

    Now we need to Reset Web Settings:
    1) If you have an Internet Explorer icon on your Desktop, goto step 2. If not, skip to step 3.
    2) Now right click on your desktop Internet Explorer icon and select Properties. Then click the Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK. Then skip step 3.
    3) If you do not have an Internet Explorer icon on your Desktop, click Start, Control Panel (for some systems it may be Start, Settings, Control Panel), Internet Options, Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK.
     
  18. buzz4_nt

    buzz4_nt Private E-2

    when I booted up normally, AVG still found the trojans.
    I ran HJT again and found [shell]open32.exe, so fixed that and ran the scan.
    The item 04 - Startup: winupdate36305678[1].exe reappears even after i "fixed" it.
    also, got errors when trying to "fix" these 2 items: "error 62, input past end of file (send email to merijn@spyware.info.com)"
    O21 - SSODL: NTWSMON - {08A0B935-4450-4151-B227-6867D49C5DDD} - C:\WINDOWS\System32\attrls31.dll
    O21 - SSODL: MSMserv - {E195B0C9-A591-4F4D-BD01-5E3E961347A1} - C:\WINDOWS\System32\msdtqasf.dll
     

    Attached Files:

  19. buzz4_nt

    buzz4_nt Private E-2

    btw, r_server is part of the RAdmin install (Remote Administrator which I sometimes use to connect to my machine at the office; the radmin server service is turned off.
     
  20. buzz4_nt

    buzz4_nt Private E-2

    All who read this: I think it has solved. I downloaded HsFix (probably stands for Horseserver Fix) and this has seemed to finally take care of this. My AVG no longer sees trojans upon startup, and IE seems to behave now. (There are still some stray dll's I need to delete). I have attached the latest HJT log and also the log from HsFix. Thank you for your help, and I hope others can benefit from this. Here is what I did:
    got HsFix from here: http://www.atribune.org/downloads/hsfix.zip

    First, download HSFix.
    After it is downloaded, create a new folder on your desktop called "HSFix" and extract all the files into the newly created folder.
    Boot into safe mode: Restart your computer and as soon as it starts booting up again continuously tap F8. A menu should come up where you will be given the option to enter Safe Mode.
    Locate the HSFix folder on your desktop, open it, and double-click "hsfix.bat"
    A log will be produced which you can close out of.
    Restart your computer and post a new HijackThis log, as well as the HSFix log which is located in C:/hslog.txt
     

    Attached Files:

  21. buzz4_nt

    buzz4_nt Private E-2

    After all that went on before, I ran eScan AntiVirus Toolkit Utility (mwav) and it found the following: (do I need to do something about these?)

    File C:\WINDOWS\System32\attrls31.dll infected by "Virus.Win32.Bayan-based" Virus. Action Taken: No Action Taken.
    File C:\WINDOWS\System32\dplaalg.dll infected by "Virus.Win32.Bayan-based" Virus. Action Taken: No Action Taken.
    File C:\WINDOWS\System32\msdtqasf.dll infected by "Virus.Win32.Bayan-based" Virus. Action Taken: No Action Taken.
    File C:\WINDOWS\System32\nvwrbios.dll infected by "Virus.Win32.Bayan-based" Virus. Action Taken: No Action Taken.
    File C:\WINDOWS\System32\osconfig.dll tagged as not-a-virus:RiskWare.Proxy.MarketScode.c. No Action Taken.
    File C:\WINDOWS\System32\rasdockx.dll infected by "Virus.Win32.Bayan-based" Virus. Action Taken: No Action Taken.
     
  22. PhilliePhan

    PhilliePhan Guest

    Hi Buzz,

    Those DLLs should probably be deleted. If you'll notice, a couple of those DLLs are in those 021 HJT lines that gave you trouble.

    I see you found Atribune's HSFix - Good deal! It seems to work more often than not. Still, if you'd like to doublecheck manually for Haxdoor remnants, look for the files and registry entries I listed in Post # 28 of this thread I linked earlier:Wierd search and dialer proggy..think im hijacked

    You can use regedit to look for the registry entries (or do the same as in Post #21 of that thread), but don't delete anything without backing up first with ERUNT (or Similar).

    Probably a good idea to post a fresh set of logs for Chas to peruse, as well.

    PP :)
     
  23. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

  24. buzz4_nt

    buzz4_nt Private E-2

    I went through the list you mentioned in that other post, and did not find those items. However, in the registry in HKEY_CURRENT_USER\Software\Search Assistant\ACMru I found 2 subfolders (5603 which hasdsmana and temp.exe as Data; 5604 which has snim.dll and sbar*.* as Data). I am going to delete these 2 subfolders from the registry. Should I also delete folder ACMru?
     
  25. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No! Those are not problems. They are Most Recently Used (MRU) lists just indicating what you most recently search for. They are not problem. They are just sort of a history trace. You can cleanup the MRU's themselves (not really a problem though) by just using a program like Ad-Aware to removing them.

    Post a current HJT log so we can see what you status is. Are you still having any problems?
     
  26. buzz4_nt

    buzz4_nt Private E-2

    Here is the latest HJT log. It does appear as if the boogeyman has left the building.

    A question re: HKEY_CURRENT_USER\Software\Windows\Current Version\Internet Settings\ZoneMap\Domains (all the entries have " * " for Name and 0x00000004 (4) for data). These also appear in HKEY_USERS\S-1-5-21-286....\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains [Are these the ones that SpywareBlaster prevents from getting on your machine?]
     

    Attached Files:

  27. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes those are what programs like SpywareBlaster and Spybot S&D and to you PC to protect you. The 0x00000004 (4) means it is an entry in the Restricted Zone. A 2 would have meant the Trusted Zone and then we would be removing them.

    Your log is clean but you still have not resolved the problem I mentioned awhile back.

    You must not have two antivirus programs installed. Uninstall either AVG or Symantec/Norton. Only keep one.
     
  28. buzz4_nt

    buzz4_nt Private E-2

    done :) thx, merci, gracias, danke
     
  29. PhilliePhan

    PhilliePhan Guest

    Actually, Chas, that is a different tool - It is just removes a few registry entries and is not very thoruogh. For Atribune's tool, try the link I gave you.

    PP :)
     
  30. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Last edited: Feb 13, 2005
  31. buzz4_nt

    buzz4_nt Private E-2

    One more item on this topic: There were 2 files that seemed leftover in system32. One was a .rrh file which I have deleted; the other is a .dll which will not go away, no matter what I do. When I tried Killbox, C:\WINDOWS\System32\lxossfaa.dll "This file could not be deleted". I tried Click "Standard File Kill" and check the "End Explorer Shell While Killing File" box; also tried "Delete on Reboot" setting, and "Replace on Reboot" and "Use Dummy". The file is still there, unchanged.

    I seem to recall that when I was having problems, I was able to delete it, but it reappeared with the others. While in Safe mode I had changed the properties to Deny all permissions, but later changed it back. It says it is Read-only, then I renamed it to _lxossfaa.dll and tried to delete it both manually ("access denied") and with Killbox, but no luck.

    Any thoughts? :confused:
     
  32. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Remove the Read only attribute and then try to delete it.

    Who is the owner of the file?
     
  33. buzz4_nt

    buzz4_nt Private E-2

    Hopefully this is the last installment on this: there are 3 user accounts on this machine, and I had previously denied access to that file to all users, and later I thought I had reset the privs for all 3, but I had left user Owner w/out privs to delete that file. Now I have finally expunged that sucker from system32. Thus, another happy ending. Thx much chaslang and PhilliePhan! :)
     
  34. PhilliePhan

    PhilliePhan Guest

    Cool! We're happy to help! :)

    PP
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds