Rootkit Zeroaccess

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by Clinetyme, Apr 15, 2012.

  1. Clinetyme

    Clinetyme Private First Class

    I have the Rootkit Zeroaccess, Combofix found it. Ive tried several removers (Avast Rootkit remover, TDSSKiller, Unhackme) that worked in the past but its not detecting it this time...ive also ran Ccleaner, Superantispyware, Malwarebytes, Spybot, AVG, ComboFix, Avenger, Regseeker and a few others....any help would be great, thx in advance..
     

    Attached Files:

  2. thisisu

    thisisu Malware Consultant

  3. Clinetyme

    Clinetyme Private First Class

    All is done, altho the RootRepeal freezes my computer everytime i run it. Thx again for your time.
     

    Attached Files:

  4. thisisu

    thisisu Malware Consultant

    [​IMG] Fixing items using ComboFix
    Make sure that ComboFix.exe that you downloaded while doing the READ & RUN ME is on your desktop -- but do not run it.
    If it is not on your desktop, the below will not work.
    Shut down your protection software now (antivirus, antispyware...etc) to avoid possible conflicts.
    Open Notepad and copy/paste the text in the below code box into Notepad:
    Code:
    [COLOR="DarkRed"]KillAll::[/COLOR]
    [COLOR="DarkRed"]ClearJavaCache::[/COLOR]
    [COLOR="DarkRed"]DirLook::[/COLOR]
    C:\Documents and Settings\Administrator\Application Data\Awig
    C:\Documents and Settings\Administrator\Application Data\Diawu
    C:\Documents and Settings\Administrator\My Documents\Aspy
    c:\documents and settings\Administrator\Local Settings\Application Data\Aspyr
    C:\Program Files\Aspyr
    [COLOR="DarkRed"]Driver::[/COLOR]
    sptd
    McciCMService
    [COLOR="DarkRed"]File::[/COLOR]
    C:\WINDOWS\DUMP1770.tmp
    C:\WINDOWS\DUMP5c39.tmp
    c:\windows\system32\drivers\sptd.sys
    [COLOR="DarkRed"]Folder::[/COLOR]
    C:\WINDOWS\$NtUninstallKB23923$
    C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Internet Explorer\DOMStore\0MROXZB1
    C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Internet Explorer\DOMStore\CHYDCNHN
    C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Internet Explorer\DOMStore\L6F6EV3M
    C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Internet Explorer\DOMStore\STZZA5TS
    C:\$AVG8.VAULT$
    [COLOR="DarkRed"]Registry::[/COLOR]
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4efb-9B51-7695ECA05670}]
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3CA2F312-6F6E-4B53-A66E-4E65E497C8C0}]
    [COLOR="DarkRed"]SecCenter::[/COLOR]
    AV: AVG Anti-Virus *Disabled/Outdated* {17DDD097-36FF-435F-9E1B-52D74245D6BF}
    
    Save this file as CFScript.txt to your desktop. So now you should have both CFScript.txt and ComboFix.exe on your desktop.
    Now use your mouse to drag CFScript.txt on top of ComboFix.exe and then release.
    [​IMG]
    This will launch ComboFix.
    Note: Do not mouse-click ComboFix's window while it is running. That may cause it to stall.
    Allow ComboFix to update itself if prompted.
    When ComboFix finishes, a log will be produced at C:\ComboFix.txt
    Attach this log to your next message. (How to attach)

    [​IMG] I want you to read and follow these instructions: TDSSKiller - How to run

    [​IMG] Now run C:\MGtools\GetLogs.bat by double-clicking it.
    This updates all of the logs inside MGlogs.zip.
    When it is finished, attach C:\MGlogs.zip to your next message. (How to attach)

    Let me know what problems remain, if any, after you have completed these steps.
     
  5. Clinetyme

    Clinetyme Private First Class

    After doing what u ask, Combofix no longer detects the Rootkit....here are the logs...
     

    Attached Files:

  6. thisisu

    thisisu Malware Consultant

    That's good :) Your latest logs are clean.

    You can delete these two empty folders:
    1. c:\documents and settings\Administrator\Application Data\Awig
    2. c:\documents and settings\Administrator\Application Data\Diawu

    __

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis if it present
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work through the below link:
    Be safe :)
     
  7. Clinetyme

    Clinetyme Private First Class

    Everything is back to normal, thx again for your time.:)
     
  8. thisisu

    thisisu Malware Consultant

    No problem :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds