Help to remove Whistler/Black Internet Trojan

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by An0, Aug 15, 2010.

  1. An0

    An0 Private E-2

    hello hello,

    So I've been infected with this Whistler Trojan.

    F-Secure detects it as W32 Trojan-Clicker Wistler in the 0x80 and 0x81 Master Boot Record, but fails in doing anything about it.

    So I've done a full analysis, with F-Secure, Spybot, and Malwarebytes. I removed what was detected (including a BHO thingy), but this one is still here. The noticeable effect is that of slowing/heating the computer, and creating two unstoppable iexplore.exe processes. They eat up approx 15mo and 5mo. And google results aren't reassuring as to the effects.

    I googled around and found this forum, but I'm still at a loss on how to get rid of it.

    I ran the MBRCheck.exe and followed the steps, but the Trojan is still here. The startup of the computer only worked the third time - the first giving a blue screen. I've attached the log, as the MGLogs.zip

    I hope I've posted right and that someone will be able to help me.

    Thanks in advance
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Do you have all important data backed up? You really should do this before continuing since we will need to rewrite your MBR to fix this and while most times this can be done without any problem, these infections can react badly and that could result in a PC not being bootable. You really don't have much choice though since these infections are too dangerous to your security to leave on a PC.

    Also note if you have a Dell PC which uses a non-standard MBR ( or another manufacturer's who does similar to Dell) , fixing the mbr may prevent access the the Dell Restore Utility, which allows you to press a key on startup and revert your computer to a factory delivered state. There are a couple of known fixes for said condition, though the methods are somewhat advanced. If you are unwilling to take such a risk, you should not continue but you risk serious problems leaving this infection in place and thus your only other option would be to try using the Dell Restore Utility to return a factory ship state which will remove everything you additional you have put onto the PC.


    Now if you wish to continue and fix the malware - please do the following:

    * Run MBRCheck.exe
    * Wait until you see the following lines:
    o Enter 'Y' and hit ENTER for more options, or 'N' to exit:
    o Options:
    [1] Dump the MBR of a physical disk to file.
    [2] Restore the MBR of a physical disk with a standard boot code.
    [3] Exit.
    Enter your choice:

    * Please push the 'Y' key and then press Enter
    * When the program asks you to Enter your choice: enter 2 to Restore the MBR and press the Enter key
    * Now the program will ask you to "Enter the physical disk number to fix (0-99, -1 to cancel):"
    o Enter 0 and press the Enter key.
    * The program will show Available MBR codes as below

    * You need to select your version of Windows from the list. For example, enter 0 or 1 for XP or enter 3 for Vista.....etc. and then press Enter.
    * The program will prompt for confirmation. Type 'YES' and hit Enter.
    * Left click on the title bar (where program name and path is written). From menu chose Edit -> Select All
    * You will see all the text in the window get highlighted.
    * Hit the Enter key on your keyboard to copy all of the text into the clipboard.
    * Paste that text into Notepad, save it to your desktop as MBRfix.txt
    * Restart your PC.
    * Attach the MBRfix.txt file to your next message..

    Now do it again for physical disc1.

    Now please re-run MBRCheck.exe and attach that log also.

    Then run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\MGlogs.zip
     
  3. An0

    An0 Private E-2

    Ok ran the MBR thing twice, and a third time to see if the trojan was still there.
    F-Secure is still seeing it.

    The first reboot didn't work properly though.

    After the second one I got a blue screen (about 20seconds after everything had started up and the computer was ready to use - so not during the actual startup).
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You managed to fix physical disc1 but not 0. What OS is on that disc?
     
  5. An0

    An0 Private E-2

    Alright.

    It's Windows Vista Family Edition.

    Should I try once again fixing disk 0 ?

    BTW, disc 0 is the main one, and disc 1 the external hard drive, if that's relevant.
     
  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Yes, you should try repairing it again. So re-run the MBRCheck once to fix and once after to see if it was fixed.
     
  7. An0

    An0 Private E-2

    I successfully rebooted but the trojan is still there. :confused
     
  8. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Then I need you to boot to the bios and change the boot order to cd / dvd first. Then we need to boot to your Vista CD and enter the Recovery Environment:
    Tell me how that goes.
     
  9. An0

    An0 Private E-2

    Will this wipe everything from my hard drive ?

    I don't have the DVD. Is this something I can download easily from Microsoft ? Or maybe the IT guys from my university will have ?

    Should I be unplugging my external hard drive now so it doesn't get contaminated again ?
     
  10. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    No. All this does is to re-write the MBR. It does not do anything else. If you don't have your OS cd, then yes, you may need to borrow one ( but it needs to be the same version as what you have installed). I would also suggest you contact the manufacturer of the computer and ask for a disc. Explain your need.

    Usually the MBRCheck will fix the infections, but lately it has been failing.

    Yes, you should disconnect the external while we work on your main drive.
     
  11. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I just noticed that you have TeaTimer running. Please Disable Spybot's TeaTimer --> Should have been done as per the R&R instructions!

    * Run Spybot and click Mode
    * Select Advanced Mode.
    * Then click Tools and select Resident.
    * Now in the right window pane, uncheck TeaTimer.
    * Also while this is open, in the left column now select IE Tweaks
    * and then in the right pane make sure all the Miscellaneous locks are unchecked.
    * Now quit Spybot!

    Now try to re-run the MBRCheck and let's see if it works this time without Teatimer running!!

    Also use windows explorer to find and dC:\Users\Sebastien\AppData\Local\Pdupeyo.dat
    C:\Users\Sebastien\AppData\Local\Xvaxuzoze.bin
    C:\Windows\Temp\100.dat
     
  12. An0

    An0 Private E-2

    Still the same situation without Spybot.

    I've removed the files you said.

    I'll try tomorrow and see if the university IT guys have a disc and hopefully finally fix this !

    Thank you so much for all your help so far ! :)
     
  13. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Let me know. Fingers are crossed for you.
     
  14. An0

    An0 Private E-2

  15. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Yes, in fact that was going to be my next suggestion to you. It will work just fine!!
     
  16. An0

    An0 Private E-2

    I think it got rid of it.

    Thank you so much for you help man !

    I've attached logs in case something dodgy is still there.

    In any case iexplore.exe is not running anymore, and F-Secure isn't detecting anything anymore.

    While I'm at it, I think I can get Windows 7 for cheap with my university. Is this a good idea ? I have Vista now. I'm just wondering if it's worth the hassle of resetting/reinstalling everything on the computer.

    Thanks again :)
     

    Attached Files:

  17. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Good job!! The only thing left for you to do is to run CCleaner and make sure this is removed:
    C:\Windows\Temp\100.dat

    As to migrating to Windows 7, that should not be an issue, but I would suggest you post in the software forum as there is a link someone could give you to check for compatibility issues. You maybe able to just do an upgrade install and not have to worry about reloading all your software. Sometimes this works out fine, other times it is best to do a clean install. I would ask this question in the software forum.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.We recommend them for doing backup scans when you suspect a malware infection.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:




    Support MajorGeeks with Geek Wear!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds