Another Brontok Infection

Discussion in 'Malware Help (A Specialist Will Reply)' started by DBM, Jan 22, 2007.

  1. DBM

    DBM Private E-2

    Hello!
    My laptop seems to be infected with the same Brontok virus as on jimkata's thread "Brontok Removal Help". That's what happens when you share a dirty external hard drive... Anyway, I followed the steps on the "Read and Run Me First" sticky and the logs are attached. Please note that I could not run the Panda scan in safe mode, it would freeze after only a third of the way through on multiple tries. It worked fine in normal mode. Would you please confirm if I should follow the recommendations you gave to jimkata or if I should do something different? Thanks in advance!!!
     

    Attached Files:

  2. DBM

    DBM Private E-2

    Remaining logs...

    Thanks!
     

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Majorgeeks!

    Why did you attach a log from Sun Java?

    What you needed to attach was a log from HijackThis as requested in step 7. We will start are fix without it for now!


    Do you know what the below suspicious looking process is for:
    "DeleteLog"="c:\\windows\\system32\\oobe\\DeleteLog.exe"


    Uninstall the below old versions of software:
    J2SE Runtime Environment 5.0 Update 6
    Make sure you reboot after uninstalling the above!

    After reboot, now install the current version of Sun Java from: Sun Java Runtime Environment

    Continue by downloading a tool we will need - Pocket KillBox

    Save it to its own folder somewhere that you will be able to locate it later.

    Now Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.


    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):


    C:\Documents and Settings\Donna Mcilveen\Local Settings\Temp\taskmgr.txt
    C:\Documents and Settings\Donna Mcilveen\taskmgr.exe
    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.
    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But please let me know if you receive this message!).
    If Killbox does not reboot just reboot your PC yourself.

    Also delete all files and subfolders in the below folders except ones from the current date (Windows will not let you delete the files from the current day).
    C:\WINDOWS\Temp
    C:\Documents and Settings\Joe Santoro\Local Settings\Temp

    Now attach the below new logs and tell me how the above steps went.

    1. GetRunKey
    2. ShowNew
    3. HJT


    Make sure you tell me how things are working now!

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  4. DBM

    DBM Private E-2

    AHH! Sorry about that!! My eyes must have crossed. I will post the correct log when I get home tonight! :eek: And thank you for your quick reply!
     
  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Just wait until you finish the procedure I gave. Also be sure to answer my question!
     
  6. DBM

    DBM Private E-2

    Hi again!

    Followed your steps, no prob! Well, except I don't have the second file listed below (with Joe Santoro). I used C:\Documents and Settings\Donna Mcilveen\Local Settings\Temp instead. I hope that was what you were referring to... Please see the attached updated logs.

    Also delete all files and subfolders in the below folders except ones from the current date (Windows will not let you delete the files from the current day).
    C:\WINDOWS\Temp
    C:\Documents and Settings\Joe Santoro\Local Settings\Temp


    And I have no idea what this file is for!

    Do you know what the below suspicious looking process is for:
    "DeleteLog"="c:\\windows\\system32\\oobe\\DeleteLog.exe"

    Things seem to be running ok. Thanks for your help! and for dumbing down the steps!! Have a great day/night! (whichever it is for you!)
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes that was a field I was supposed to edit to change from Joe Santoro to your user name. I just forgot to change it. ;)


    Please scan this file at one of the below two sites. They can be rather busy at times so it may take awhile for them to initiate the scan.

    http://virusscan.jotti.org/

    http://www.virustotal.com/en/virustotalf.html

    Post the results of the scans here!


    Uninstall CounterSpy now since we are finished with it. Then delete the below two folders it will leave behind:
    C:\Documents and Settings\Donna Mcilveen\Local Settings\Application Data\Sunbelt Software
    C:\Program Files\Sunbelt Software


    Your logs are clean! If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix you can delete the ComboFix.exe file and associated C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    5. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    6. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    7. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    8. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
     
  8. DBM

    DBM Private E-2

    I scanned the deletelog.exe file on both sites and no virus was found!

    Thanks again for all of your help!! You ROCK!!! and this site is also great!
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds