Persistent Worm, Server 2003 R2

Discussion in 'Malware Help (A Specialist Will Reply)' started by Bowlersaid, Oct 27, 2010.

  1. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    WARNING: The below registry patch is only for Bowlersaid. It is not a generic fix to use for everyone.

    Copy the bold text below to notepad. Save it as fixNetSVC.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).



    Then attach the below logs:
    • C:\MGlogs.zip
    Now do not power down or reboot your PC!!!! Wait until you hear back from me on what to do next.
     
    Last edited: Nov 23, 2010
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Just an FYI for Kestrel13! and others. You cannot search the registry for the below strings because they do not exist in plain ASCII like this:

    nncrbg
    jiqmcnw
    zdxtjms
    ofjqdedr
    zzqncjk
    inifhzbk
    vyykoylm
    gespfbyx

    They are in the registry in hexidecimal format and have additional embedded 00 after each character since they are in dword format. They look like the below in the registry ( which you can see in the attachment obtained from from doing the export on the registry key, the colon is just a character separator ):

    6e:00:6e:00:63:00:72:00:62:00:67:00:00:00:
    6a:00:69:00:71:00:6d:00:63:00:6e:00:77:00:00:00:
    7a:00:64:00:78:00:74:00:6a:00:6d:00:73:00:00:00:
    6f:00:66:00:6a:00:71:00:64:00:65:00:64:00:72:00:00:00:
    7a:00:7a:00:71:00:6e:00:63:00:6a:00:6b:00:00:00:
    69:00:6e:00:69:00:66:00:68:00:7a:00:62:00:6b:00:00:00:
    76:00:79:00:79:00:6b:00:6f:00:79:00:6c:00:6d:00:00:00:
    67:00:65:00:73:00:70:00:66:00:62:00:79:00:78:00:00:00
     
    Last edited: Nov 23, 2010
  3. Bowlersaid

    Bowlersaid Private E-2

    No Problems encountered,
    All executed as instructed
    Log attached,

    Thanks for giving of your time and talents -
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Okay that appears to have removed the leftovers from Confiker but I need to make a new registry patch since the last one did not format the NetSvcs registry key value properly. I had a feeling that would happen which is why I said not to reboot or power down. Hangon while I work up another fix.
     
  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay lets make a new registry patch that we will name as fixNetSvcs2.reg

    Copy the bold text below to notepad. Save it as fixNetSvcs2.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Code:
    [COLOR=black][B][COLOR=black]REGEDIT4[/COLOR][/B][/COLOR]
     
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost]
    "netsvcs"=hex(7):41,65,4c,6f,6f,6b,75,70,53,76,63,00,41,70,70,4d,67,6d,74,00,\
      41,75,64,69,6f,53,72,76,00,42,72,6f,77,73,65,72,00,43,72,79,70,74,53,76,63,\
      00,44,4d,53,65,72,76,65,72,00,45,76,65,6e,74,53,79,73,74,65,6d,00,48,69,64,\
      53,65,72,76,00,49,61,73,00,49,70,72,69,70,00,49,72,6d,6f,6e,00,4c,61,6e,6d,\
      61,6e,53,65,72,76,65,72,00,4c,61,6e,6d,61,6e,57,6f,72,6b,73,74,61,74,69,6f,\
      6e,00,4d,65,73,73,65,6e,67,65,72,00,4e,65,74,6d,61,6e,00,4e,6c,61,00,4e,74,\
      6d,73,73,76,63,00,4e,57,43,57,6f,72,6b,73,74,61,74,69,6f,6e,00,4e,77,73,61,\
      70,61,67,65,6e,74,00,52,61,73,61,75,74,6f,00,52,61,73,6d,61,6e,00,52,65,6d,\
      6f,74,65,61,63,63,65,73,73,00,53,61,63,73,76,72,00,53,63,68,65,64,75,6c,65,\
      00,53,65,63,6c,6f,67,6f,6e,00,53,45,4e,53,00,53,68,61,72,65,64,61,63,63,65,\
      73,73,00,54,68,65,6d,65,73,00,54,72,6b,57,6b,73,00,54,72,6b,53,76,72,00,57,\
      5a,43,53,56,43,00,57,6d,69,00,57,6d,64,6d,50,6d,53,70,00,77,69,6e,6d,67,6d,\
      74,00,78,6d,6c,70,72,6f,76,00,42,49,54,53,00,77,75,61,75,73,65,72,76,00,53,\
      68,65,6c,6c,48,57,44,65,74,65,63,74,69,6f,6e,00,68,65,6c,70,73,76,63,00,57,\
      6d,64,6d,50,6d,53,4e,00,00
    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • C:\MGlogs.zip
    Now do not power down or reboot your PC!!!! Wait until you hear back from me on what to do next!
     
  6. Bowlersaid

    Bowlersaid Private E-2

    No Problems encountered,
    All executed as instructed
    Log attached,
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay that looks better. How are things working right now?

    Reboot your PC and make sure all is good.
     
  8. Bowlersaid

    Bowlersaid Private E-2

    So far, no interruptions no flags from AVG
    I will re-boot the server when it won't cause too much interruption.

    What scan/scans do you suggest to verify our situation before final steps?
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I suggest that you re-run GMER and attach a new log before we do final steps.
     
  10. Bowlersaid

    Bowlersaid Private E-2

    Rebooted the server and windows malicious software tool was activated
    Detected and Removed, screen shot attached

    ran GMER as instructed, attached
     

    Attached Files:

  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes now that we actually removed the infection, MSRT finally woke up. ;) It likely only detected what we removed and quarantined or just some minor inactive leftovers.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  12. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    So glad you're sorted. I knew Chas would work his magic ;)
     
  13. Bowlersaid

    Bowlersaid Private E-2

    I fear I am going to bring in an unrelated issue, but it seems weird, please advise.

    Over the holiday I rebooted the server and was getting ready to go over the finals... came in early today to do somethings and then was going to finish.

    Decided that I would run malware bytes to double check and alas I attached screen pic. and log

    After re-boot system drive fail to load...Screen Pic

    On unrelated?? issue, checking my email, I use hotmail, I see that there are a bunch 20+ emails returned to me as bounced by bad emails from my contacts. I was spoofed or worse. I don't use outlook or anything, I leave all emails on their website, not on my system. I look in my "sent" folder and they do not appear there. please advise..
     

    Attached Files:

  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Were these items actually removed now by MBAM. The one with the .vir extension was just a renamed file ( quarantined ) from running previous fixes. Previous attempts were always failing since the NetSvcs entries were not fixed at the time. After we fixed the NetSvcs entries ( and assuming the services entries had not returned ) these should have been easily deleted. If not, it could be that the infection had returned before rebooting the server. It is important when fixing infections like this that rebooting after the fixes occur immediately. The server really should be taken offline while doing fixes since it could spread the infection to clients.

    What driver exactly? Did you look at event viewer to see? It could be one of the drivers from Conficker that is failing to load and that would mean there is a left over registry entry.

    Could have been part of your infection. Are they still occurring?
     
  15. Bowlersaid

    Bowlersaid Private E-2

    MBAM - auto reboot was done sucessful on item one, cannot find item 2
    Perhaps we should just take a step back and have another go...
    Tell me what to run and post, and I will endeavor to make certain that I take the server offline, and do immediately a re-boot as suggested.

    atapi and crcdisk were the fails; I ran malware bytes and let it attack the conficker, it finds the two occurrences an is successful on the first, and after it deletes the first, cannot find the second occurrence.

    Yes, happened this morning and is what prompted the scans -
    It happened earlier when we were working against this beast.
    This has only happened twice that I can see, as I get bounces.
     
    Last edited: Nov 26, 2010
  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Let's run a few scans.


    Download OTL to your desktop.
    • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
    • Vista and Windows 7 users Right-click OTL and choose Run as Administrator)
    • When the window appears, underneath Output at the top change it to Minimal Output.
    • Check the boxes beside LOP Check and Purity Check.
    • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
    When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL.

    Attach both of these logs into your next reply.


    Now run the scan with DDS given in the below link and attach the two requested logs:

    Scanning with DDS


    Now download MGtools and run a new scan. Attach the new MGlogs.zip file.
     
  17. Bowlersaid

    Bowlersaid Private E-2

    OTL Ran, OTL.txt generated and attached below.. Extras did not open, ran search, nowhere was it saved... so no extras.txt

    Attempted scan w/dds, opens but says does not support my os

    MGlogs.zip attached below.
     

    Attached Files:

  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That is what I was guessing but I had never tried it on Win Server 2003. I knew ComboFix and Avenger would not work but was hoping DDS would.

    Okay one new NetSvcs process showed up from Conficker. This one is named nkmxpsz and it was not there before. I'm not sure if this occurred due to not rebooting immediately after previous fixes or if another PC accessing this server is causing reinfection. Is this server fully up to date with ALL Microsoft Updates? Are other PCs on the network also fully up to date and have they been scanned to check for Conficker?

    We need to check to see if any services were added before making a new fix, please run the below and attach the GMER log

    GMER - running with a random name
     
  19. Bowlersaid

    Bowlersaid Private E-2

    This server only runs the two register systems on the checkout lanes
    No other systems are attached.

    Updated every 6am and installed automatically. Other PCs are just cash registers

    Took the system offline and disconnected from registers, rebooted after
    As after GMER it seems to tie up and slow the sys.

    Log attached below -
     

    Attached Files:

  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Then what are all of the many many admin logins for. Your logs show the below:
    Code:
    Users on this computer:
    Is Admin? | Username
    ------------------
       Yes    | Administrator
              | Guest (Disabled)
       Yes    | localsm
              | office
       Yes    | RCSSupport
       Yes    | remotesm
       Yes    | Robot
              | SBS
       Yes    | SCOT
       Yes    | SNSupport
              | SUPPORT_388945a0 (Disabled)
       Yes    | WRKSTN01
       Yes    | WRKSTN02
       Yes    | WRKSTN03
       Yes    | WRKSTN04
       Yes    | WRKSTN05
       Yes    | WRKSTN06
       Yes    | WRKSTN07
       Yes    | WRKSTN08
       Yes    | WRKSTN09
    ................ many many more
    Run Registrar Lite and paste the below into the address bar and click the green Go button.

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost

    You will now see two entries titled netsvcs. The first is a folder ( yellow icon ) the second is a normal entry. Double click on this normal entry and the Data Editor should come up. Scroll down to the bottom of the list and you should set nkmxpsz listed. Highlight this text name with your mouse and right click on it and select delete. Okay the delete. Then close the Data Editor. Now click View and then Refresh in the main Registrar Lite window. Double check to make sure the aboe entry from Conficker is gone. Let me know. We will then start the next part of the fix once this has been completed.

    Do you still have OTM and OTL on this PC? If not please download them again. See Kestrel13!'s earlier messages.
     
  21. Bowlersaid

    Bowlersaid Private E-2

    On this server, there are two entities, This is a franchise store, the pos system is overseen by a company known as retalix (RCS), their software oversees the registers and interfaces with the franchise system, which maintains the day to day store operations and all the promotions and pricing; this program is managed by corporate, and is known as SCS or Store Control System. So when we see RCS and/or SCS these are related to the two software packages.
    That having been said, the many admin have to do with these individuals either from RCS or SCS, logging in remotely to do updates or access the system. Many cooks in this kitchen from time to time.

    The entry is gone, after refresh and 2x check still gone. Closed out of Reglite and rebooted-

    Yes, still present on system
     
  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I did not want you to reboot. Double check to make sure the entry has not returned. If it has then remove it again and do not reboot. Just continue on with the below.


    Code:
    :services
    nkmxpsz  
     
    :reg
    [-HKLM\SYSTEM\CurrentControlSet\Services\nkmxpsz]
    [-HKLM\SYSTEM\ControlSet002\Services\nkmxpsz]
     
    :files
    C:\WINDOWS\system32\zfyspqu.dll
    C:\WINDOWS\system32\zfyspqu.u
    C:\32788R22FWJFW
     
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into notepad, save it as something appropriate and attach it into your next reply.
    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.
    Make sure your PC has been rebooted after the above.

    See if the C:\WINDOWS\system32\zfyspqu.dll file exist or not?
    Rerun GMER and attach a new log.
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Attach the new C:\MGlogs.zip
     
  23. Bowlersaid

    Bowlersaid Private E-2

    My apologies, I will wait for explicit instruction in the future. It had not returned, I proceeded as instructed. Ran OTM as instructed, log attached

    Does not appear -

    Attached

    Attached
     

    Attached Files:

  24. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Looks good now. I suggest that you do the below to cleanup all of what we put on the PC and remove the quarantines and other files and then afterwards ( not before final steps ) run a full scan with AVG. If all still looks good, you can then put it back online. If it gets reinfected again, it likely means that something else on your network ( or a device like a USB drive plugged in ) that is connecting to it is infected.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  25. Bowlersaid

    Bowlersaid Private E-2

    Update ---

    I was off doing an order, came back to sys with this showing
    Allowed it to Q - it took the first , stated could not find the 2nd

    ?
     

    Attached Files:

  26. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Re: Update ---

    Was it connected to the network?

    Quickly run C:\MGtools\GetLogs.bat and attach the new MGlogs.zip

    Also run GMER and attach the log.

    I expect a new NetSvcs/driver infection.
     
  27. Bowlersaid

    Bowlersaid Private E-2

    Did have to reconnect to establish the cash registers
    Have only the two cash registers in the loop
    Also there is connected USB Passport drive that is the backup site for the cash register files and such

    MGlogs and GMER log attached -
     

    Attached Files:

  28. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Then it is very possible that any or all of these are infected. You now have a new Conficker rootkit driver infection. The driver is now named cyqlb

    It may be a waste of time to continue cleaning this PC as it will continue to get reinfected when you connect these other devices to it if they are infected. You need to fix them all or you need to fix this server and then DO NOT connect it to the network or anything else for awhile to prove that it remains clean while not connected to anything else.
     
  29. Bowlersaid

    Bowlersaid Private E-2

    Ok, I need to decide on a course of treatment-

    How do you suggest we proceed?

    My first suspect would be the passport backup drive for the register journals since it is connected via usb to the system if this is the case...

    Please advise on best way to proceed.
     
  30. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    We can try cleaning the server and not connecting anything to it all and just let it sit with the cable to the network physically unplugged. ( Not sure how long you can leave it offline but not sure you have any choice. ) It did not take too long last time before you saw reinfection. If you give it a number of hours or even overnight and it does not have the infection return then you can be pretty sure the reinfection is coming from the other devices. You should also disable autoruns on the server an perhaps this may help keep the infection from reoccuring due to other devices being plugged in ( like USB drives ). Try running the below right now while a prepare a fix based on your last logs. Then UNPLUGGED the ethernet cable to this server can keep the USB drive you have been using unplugged.

    Autorun Eater

    Also download and save the below to your Desktop but do not run it yet:

    http://majorgeeks.com/McAfee_AVERT_Stinger_Conficker_d5985.html

    You may also want to see the below which could be useful for other systems too:

    http://www.mcafee.com/us/enterprise/confickertest.html
     
  31. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Then next fix for the server.


    Run Registrar Lite and paste the below into the address bar and click the green Go button.

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost

    You will now see two entries titled netsvcs. The first is a folder ( yellow icon ) the second is a normal entry. Double click on this normal entry and the Data Editor should come up. Scroll down to the bottom of the list and you should set cyqlb listed. Highlight this text name with your mouse and right click on it and select delete. Okay the delete. Then close the Data Editor. Now click View and then Refresh in the main Registrar Lite window. Double check to make sure the aboe entry from Conficker is gone. Let me know. We will then start the next part of the fix once this has been completed.

    Code:
    :services
    cyqlb 
     
    :reg
    [-HKLM\SYSTEM\CurrentControlSet\Services\cyqlb]
    [-HKLM\SYSTEM\ControlSet002\Services\cyqlb]
     
    :files
    C:\WINDOWS\system32\zfyspqu.dll
    C:\WINDOWS\system32\zfyspqu.u
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into notepad, save it as something appropriate and attach it into your next reply.
    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.

    Make sure your PC has been rebooted after the above.

    Now run the McAfee Stinger Conficker program. And if it finds anything, fix it, reboot, and run it again until clean. Once it does not detect anything, wait a number of hours or until tomorrow to see if it remains clean ( ie. AVG does not popup and run Stinger again still finds nothing.
     
  32. Bowlersaid

    Bowlersaid Private E-2

    The Avert Stinger Confi link... comes back as not found for me
    Tried all three download sites... even australia...
    404-file not found
     
  33. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Hmmm! Looks like McAfee took it offline. Not sure exactly why but probably because it did not work too well from what I had see in the past. It never removed everything which is why we use manual steps. But sometime it helped located leftovers.

    Download the Symantec tool ( D.EXE ) from the below and use it instead. Run it in safe mode if it seems to have any problem removing any part of the infection ( they also suggest this in the link ).

    http://www.symantec.com/security_response/writeup.jsp?docid=2009-011316-0247-99

    You may also want to check out the below tools from BitDefender since they also have one to run on a network:

    http://www.bdtools.net/
     
  34. Bowlersaid

    Bowlersaid Private E-2

    OTM log attached...
    Will run mcafee till clean then call it a night,
    Registers are off line and shut down, usb drive disconnected
    Auto run eater inplace and running..
    Will let you know in the am...
     

    Attached Files:

    • otm.log
      File size:
      3.7 KB
      Views:
      3
  35. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay but the server itself should have the cable unplugged. You do not want anyone/thing being able to connect to it remotely which is what a conficker infection will also do.
     
  36. Bowlersaid

    Bowlersaid Private E-2

    System is coming back as clean to the McAfee tool..
    Disconnecting from the internet as well at this time...
    Will let it bake overnight..
    scan again in the am

    Disconnected, isolated entirely... ran a second scan, still clean as far as the MCAfee tool is concerned..

    Will look in the am again -

    Nighters
     
  37. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I assume you meant Symantec?
     
  38. Bowlersaid

    Bowlersaid Private E-2

    McAfee Conficker test from your post of 11:20 yesterday
    Also running the symantec removal tool...

    If all come back clean, I have to start back somehow..
    How are we going to reconnect and protect/attack it i it exists
    On the passport drive or the register systems?

    Recommended startup procedure?
     
  39. Bowlersaid

    Bowlersaid Private E-2

    Latest update...
    Symantec scanner finds 2 (in the OTM moved files)
    Triggers AVG alert to quarantine
    Symantec finishes...
    Recommends reboot and install of
    MS08-067 Vulnerability patch if not already installed -

    Re-boot completed,
    Re-scanning again -
     
  40. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Obviously not a problem. ;)
    Make sure that you do have this patch installed.

    Let me know the result.
     
  41. Bowlersaid

    Bowlersaid Private E-2

    Clean, Running full scan w/avg
    How do I check to see if the patch is installed?
    I will have to go to the site to download
    Which means that I will have to connect ....

    Dilemma, please advise
     
  42. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    If all is still clean, only just connect to the network first and wait a bit to see if it stays clean just being connected. Do not connect the passport drive yet. However with all updates installed and with AutoRun Eater in place, I'm hoping it will block issues with the passport if there are any.
     
  43. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

  44. Bowlersaid

    Bowlersaid Private E-2

    Attempting to reconnect to the register systems
    Unable to do so, could this have to do with autorun eater?

    Please advise..
     
  45. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I don't know for sure but I guess it is possible that these systems use an autorun.inf file. If so it is a major security risk as you can see from conficker and it is only one on many many forms of autorun infections. You could try disabling autorun eater, but if the server gets infected..... you then know you have a problem that begins with the registers that you will have to fix.
     
  46. Bowlersaid

    Bowlersaid Private E-2

    Took the registers down to reboot windows
    They came back up and can connect now...
    So good, so far with eater running
    ... not just scan and see\...

    Will let you know
     
  47. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay if things continue to remain clean thru the day, you can then try reconnecting your passport drive to see what happens.

    By the way, if these registers are Windows based, you need to make sure they have the MS08-067 patch ( and all other patches ) too.
     
  48. Bowlersaid

    Bowlersaid Private E-2

    No such luck, avg triggered once I got the registers re-connected
    Re-scanning after AVG, sys comes back clean

    Detection tool says registers are infected
     
  49. Bowlersaid

    Bowlersaid Private E-2

    After closing tonight - I will run the Bit Defender
    Network tool sending it to the registers on the network
    Then in the am I will scan them all again checking
    If and only if they all come back clean then I will
    Figure out the passport, thinking that as soon as I attach it...
    I need to scan it -- but with what do you think?

    On another note, I have decided to get with Retalix (registers)
    and SCS (store control systems) and have them let me know what
    Admin entry they want and i will delete all other Admin priv-

    What do ou think Chas?
     
  50. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes it needs to be scanned right away and don't run programs or open any files on it until fully scanned. Hopefully Autorun Eater will block any autorun.inf files from running that may be on the drive.

    Yes it would be best to have just one admin account. You may need to clean these "registers" manually with similar procedures used on the server. Many times the Conficker removal tools do not get everything.

    You also have to understand, that any remote PCs that have been accessing the server or registers may also be infected and could even be the source of the infection.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds