Server Win 2003 Malware

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by mongooseba, Nov 2, 2013.

  1. mongooseba

    mongooseba Corporal

    Hi All,

    I believe there is malware on my server. I'm seeing excessive CPU usage (100%) all the time.
    Is this the place to ask for help with this issue or should I post it elsewhere? Any help is appreciated and I'm lost.

    Sincerely,
    Mongooseba
     
  2. mongooseba

    mongooseba Corporal

    I'm detecting ltc-miner.exe and ltc-miner2.exe running in the background.
    Thanks again.

    Mongooseba:-o
     
  3. mongooseba

    mongooseba Corporal

    Hi All,

    I've found these folders and moved it to a new foler.

    C:\windows\ltc-miner
    C:\windows\tanechka

    My antivirus is out-of-date and should I load in a new one on the server? What is your advise? Thank you all for your assistance.

    Sincerely,
    Mongooseba
     
  4. mongooseba

    mongooseba Corporal

    Hi All,

    I apologize for skipping the steps. Read through the details and will upload the files needed to help me. Thank you for your patience. I did not know there was a section on Windows 2003.

    Mongooseba :-o
     
  5. mongooseba

    mongooseba Corporal

    Hi All,

    I was able to perform all the tests with the enclosed results. Should I disable the current out of date AV and load a new AVAST (free edition) on the server? I look forward to all your assistance.

    Sincerely,
    Mongooseba:-o
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No you should not disable the current antivirus if you wanted to install Avast. You would have to uninstall your current antivirus first. Disabling is not an acceptable thing to do. However I would not uninstall Symantec to use Avast unless you are saying that you are running a server and do not want to pay for a full blown protection program. If that is the case then you need to consider why you are running a server. A server needs good protection and it needs to stay updated and I would not use a free version of any protection software on a server. Pay for it and get full protection plus support.



    Please download OTM by Old Timer and save it to your Desktop.
    • Run OTM.exe by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
     
    :Files
    C:\Documents and Settings\Administrator\Desktop\do not use potential virus\ltc-miner\System_Idle_Process.exe
    C:\Documents and Settings\Administrator\Desktop\do not use potential virus\tanechka\realvnc.exe
    C:\Documents and Settings\ztest\Local Settings\Temporary Internet Files\Content.IE5\7I216TH0\bsdl1_923721_36925609[1].exe
    C:\WINDOWS\tanechka\realvnc.exe
    C:\WINDOWS\tanechka\svchosl.exe
    C:\WINDOWS\ltc-miner2
    C:\WINDOWS\tanechka
    C:\WINDOWS\Tasks\At1.job
    C:\WINDOWS\system32\tmp*.cmd
    C:\WINDOWS\Temp\*.*
    C:\Documents and Settings\Administrator\Local Settings\Temp\*.*
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large [​IMG] button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.

    Now please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Note: That JRT may reset your home page to a google default so you will need to restore your home page setting if this happens.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • the JRT.TXTlog
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  7. mongooseba

    mongooseba Corporal

    Hi Chaslang,

    Will update the server AV after the clean-up. Thanks for the sound advice. I'm running the instructions now. Will forward it once I have it.

    Most appreciative,
    Mongooseba
     
  8. mongooseba

    mongooseba Corporal

    Hi Chaslang,

    Sorry I could not reply earlier. I had to go into the office the next day to perform a manual start.

    I checked and there was a date and time stamp folder created (C:\_OTM\MovedFiles\11032013_193616). However, I'm not able to see any *.log file. Within the 11032013_193616 folder are C_Documents and Settings and C_Windows folders. I also noticed that there were some viruses isolated within the C:_Documents and Settings.

    Did I do it incorrectly? The folders are showing all hidden files and folders and none of the op system files are hidden. Did I do something incorrectly? Thanks so much.

    Mongooseba rolleyes
     
  9. mongooseba

    mongooseba Corporal

    Hi Chaslang,

    Enclosed are the two files out of the three requested. I could not locate the OTM log file. Thanks so much. I look forward to your instructions.

    Sincerely,
    Mongoosebarolleyes
     

    Attached Files:

  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Run a new scan with Hitman Pro and attach the new log.

    Are you still having problems with the server?
     
  11. mongooseba

    mongooseba Corporal

    Hi Chaslang,

    I ran the Hitman Pro and enclosed is the log requested. Thanks again.
    * Should I be concerned that I did not get the OTM log for you?

    Sincerely,
    Mongoosebarolleyes
     

    Attached Files:

  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.

    Delete the C:\_OTM folder.

    Also delete the below folder:
    C:Documents and Settings\Administrator\Desktop\do not use potential virus

    Now empty the Recycle Bin.

    Now rerun Hitman Pro and allow it to fix any malware it finds. You can ignore the Supicious file report on C:\windows\system32\THREED20.OCX which is not a probelem. After having Hitman Pro fix the malware, immediately reboot the server.

    After reboot, run a new scan with Hitman Pro and attach the new log.
     
  13. mongooseba

    mongooseba Corporal

    Hi Chaslang,

    Thank you so much for your reply. Deleted the files as requested but was not able to delete the infected files. HItMan Pro required that I enter an activation code. Did I do something wrong?

    Enclosed is the recent log from HitMan Pro. Look forward to more instructions.

    Thanks.

    Mongooseba:-o
     

    Attached Files:

  14. mongooseba

    mongooseba Corporal

    Hi Chaslang,

    Should I go to the specific registry directory and remove them manually? Will this perform the same job if the HitMan Pro does not work?
    Thanks.

    Mongooseba:-o
     
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    It is not showing registry entries. It is showing files and folders. SOme I already asked you to delete like:

    C:\_OTM folder.
    C:Documents and Settings\Administrator\Desktop\do not use potential virus

    Can you manually delete the other indicated folders? Are you 100% sure that these are not related to some software that the server needs to run?

    The other folders implicated are:

    C:\WINDOWS\ltc-miner2
    C:\WINDOWS\tanechka
     
  16. mongooseba

    mongooseba Corporal

    Hi Chaslang,

    I've have deleted

    C:\WINDOWS\ltc-miner2
    C:\WINDOWS\tanechka

    previously and they were recreated after a day. However, the replicated files from these folders on my desktop have been deleted per your instructions. There is also exe file that runs in the background periodically that takes away all my resources. My programs run even after removing these infected files from my previous deletion.

    These two ltc-miner2 and tanechka are not items that I use. I came across this article:

    http://www.symantec.com/connect/forums/fake-systemidleprocessexe-notice-underscores

    I believe we can zap them off. Do you still want me to repeat your instructions namely remove these files?

    Thanks so much.

    Mongooseba:wave
     
  17. mongooseba

    mongooseba Corporal

    Hi Chaslang,

    I have now have three infected folders under C:\windows

    1. ltc-miner (created on `11/3/13)
    2. ltc-miner2 (created on 11/4/13)
    3. tanechka (created on 11/2/13)

    It seems that there is something that is populating these folders. I have not deleted them yet. Today the system ltc_miner.exe was running in the background and I stopped it.
    Thanks again and look forward to your instructions.

    Mongooseba:-o
     
  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I still think it is due to something being run on the server. Based on things I see on the internet this ONLY shows up on Windows Server PC installations.

    Why does this PC have 9 user accounts that are set as administrators???? I see that 2 are disabled but they are admin accounts. They should be deleted if not needed.
    There should be one administrator account. How do you know that one of the other administrator user accounts has not installed and is responsible for running whatever this is? You have only given me logs from the ZTest user account so I can only see what it is loading at startup and not what any other accounts are doing.

    Zip the contents of the below two folders into a ZIP file and attach it for me:
    C:\windows\ltc-miner2
    C:\windows\tanechka
     
  19. mongooseba

    mongooseba Corporal

    Hi Chaslang,

    You are correct. I noticed that there is an administrator 133 and 134 created automatically without my knowledge. Tried deleting these and they come back again. I will forward the contents of the two folders.

    Thanks,

    Mongooseba:-o
     
  20. mongooseba

    mongooseba Corporal

    Hi Chaslang,

    I'm sorry to inform you that I need a security token before I can upload these viruses. How do I proceed? I was only able to get one of the three on the attachment. Please advise.

    Hopeful,
    Mongooseba:-o
     

    Attached Files:

  21. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi there. Chaslang is currently away for a short while. I will be assisting you with your thread. Do you want to go ahead and let Hitman fix everything it found? Then reboot the machine, re run Hitman, just a scan, and attach log. Let me know how things are running.
     
  22. mongooseba

    mongooseba Corporal

    Hi Kestrel 13!,

    Thanks to both of you for your assistance. I've tried to run HitMan Pro but was not able to remove the viruses because it was asking for an activation code. Did I do anything wrong? Maybe I have missed a step? Look forward to your reply.

    Sincerely,
    Mongooseba:-o
     
  23. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi mongooseba, I have not forgotton about you. There are a few things we need to do in order for me to help you, and I just need a little time for organisation of the fix. Chaslang took me through everything needs doing before he left :) Hang in there.
     
  24. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Have you got your Windows Server boot CD to hand?
     
  25. mongooseba

    mongooseba Corporal

    Hi Kestrel13!,

    I will try and locate it. I believe I have the original CD that came with the server. If not, I will have to call Dell. What should I do if I do locate the CD? Can I remove the virus during a safe boot, if there is such a thing exists?

    Thanks again to the both of you.

    Mongooseba
     
  26. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    We may have to delete some folders in system recovery mode, also, possibly a fix of the MBR.

    If you do not have your CD I think we may have to create a bootable one.
     
  27. mongooseba

    mongooseba Corporal

    Hi Kestrel13!,

    I'm still trying to find the CD but no luck so far. Will try again.

    Much appreciated,
    Mongooseba:-o
     
  28. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

  29. mongooseba

    mongooseba Corporal

    Hi Kestrel13!,

    Will check whether my drive can create a DVD next week.
    Thanks.

    Mongooseba
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds