Another Trojan:DOS/Alureon.E attack

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by msff, Jan 16, 2012.

  1. msff

    msff Private E-2

    Hello,
    I have a laptop that has been infected with the Alueron.E virus.
    I have tried, unsucessfully to remove the virus myself. Last night I even reformated the harddrive, still not luck.
    I am currently running windows 7, and using Microsoft Security Essentals. MSE is what alerted me to the trojan.
    As per your instructions, I have attached the SAS log, MB log, MG log and Combofix log.
    I look forward to your help with this bugger. Seems to have me stumpped. :cry
     

    Attached Files:

  2. msff

    msff Private E-2

    I have also included the following files;
    TDSSkiller
    MBRCheck
    Hope these help
     

    Attached Files:

  3. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I am not seeing much in the way of problems. What issues are you having?

    In the meantime:

    * Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
    If it is not on your Desktop, the below will not work.
    * Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    * If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    * Open Notepad and copy/paste the text in the below code box into it (make sure you scroll all the way down in the code box to get all lines selected ):
    Code:
    ClearJavaCache::
    KILLALL::
    
    File::
    C:\Windows\TEMP\TS_3063.tmp
    C:\Windows\TEMP\TS_34D7.tmp
    C:\Windows\TEMP\TS_3AD1.tmp
    C:\Windows\TEMP\TS_4C8D.tmp
    C:\Windows\TEMP\TS_52D5.tmp
    C:\Windows\TEMP\TS_547B.tmp
    C:\Windows\TEMP\TS_566F.tmp
    C:\Windows\TEMP\TS_5864.tmp
    C:\Windows\TEMP\TS_B328.tmp
    C:\Users\Zak\AppData\Local\Temp\6E3C.tmp
    C:\Users\Zak\AppData\Local\Temp\F5D5.tmp
    C:\Users\Zak\AppData\Local\Temp\trufos.dll
    
    Folder::
    C:\Users\Zak\AppData\Local\Temp\6E3C.dir
    C:\Users\Zak\AppData\Local\Temp\dmiwu
    
    
    * Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    * At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    * You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    If it asks you to overide the previous file with the same name, click YES.
    * Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif
    * Follow the prompts.
    * When it finishes, a log will be produced named c:\combofix.txt
    * I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Note: If after running Combofix you discover none of your programs will open up, and you recieve the following error: "Illegal operation attempted on a registry key that has been marked for deletion". Then the answer is to REBOOT the machine, and all will be corrected.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below log:

    • C:\MGlogs.zip

    Make sure you tell me how things are working now!
     
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    There is an infected partiton which is the reason for the DOS/Alureon.e detection!!!

    Code:
    Get Partition Info From WMI in K-bytes                          
    ==============================================================  
    Bootable  Name                   Size          Type                     
    FALSE     Disk #0, Partition #0  41094144      Unknown                  
    TRUE      Disk #0, Partition #1  250016358400  Installable File System  
    [B][COLOR=red]FALSE     Disk #0, Partition #2  1040384       Unknown[/COLOR][/B]                  
     
  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Preferably from a clean computer, I need you to download: gparted-live-0.11.0-7.iso (114 MB)
    Create a bootable CD for GParted. You can useImgBurn to accomplish this.
    If you need help on how to use ImgBurn, please view this guide by dr.m -- Using ImageBurn to Burn an ISO image
    Now boot off of the newly created GParted CD.
    http://img717.imageshack.us/img717/6546/gpartedsplash01107.th.png
    You should be here...
    Press ENTER
    http://img819.imageshack.us/img819/7286/gpartedkeymaps.th.png
    By default, do not touch keymap is highlighted. Leave this setting alone and just press ENTER.
    http://img404.imageshack.us/img404/9840/gpartedlanguage.th.png
    Choose your language and press ENTER. English is default [33]
    http://img140.imageshack.us/img140/7958/gpartedgui.th.png
    Once again, at this prompt, press ENTER
    You will now be taken to the main GUI screen below
    http://img32.imageshack.us/img32/1122/gpartedo.th.png
    According to your logs, the partition that you want to delete is 1,016.00 KB (1,040,384 bytes)
    Click the trash can icon to delete and then click Apply.
    You should now be here confirming your actions:
    http://img233.imageshack.us/img233/1533/gpartedsteps.th.png
    Now you should be here:
    http://img696.imageshack.us/img696/8471/gpartedsuccessclose.th.png
    Is boot next to your OS drive? According to your logs, your OS drive is the 140.85 GB sized partition.
    http://img194.imageshack.us/img194/7753/gpartedboot.th.png
    If boot is not next to your OS drive under Flags, right-mouse click the OS drive while in Gparted and select Manage Flags
    In the menu that pops up, place a checkmark in boot like the picture below:
    http://img196.imageshack.us/img196/3483/gpartedmanageflagsboot.th.png
    Now press the Close button to save these changes.
    Now double-click the http://img822.imageshack.us/img822/641/gpartedexit.png button.
    You should receive a small pop up like this:
    http://img88.imageshack.us/img88/8986/gpartedexitreboot.png
    Choose reboot and then press OK.

    Now reboot from the Windows 7 Recovery Disc and execute the following commands:

    • bootrec /fixmbr
    • bootrec /fixboot
    • exit
    Once back in Windows...
    http://img707.imageshack.us/img707/6703/generalxpicon.gif Re-run another scan withMBRCheck and attach its latest log. (How to attach)
     
  6. msff

    msff Private E-2

    Well, guys, here we go;
    The problem that started all this was the fact that Microsoft Security Essentials kept finding the "Trojan: DOS/Alureon.E" virus. It would try and clean it, but would never complete the process.
    So.....that is were you guys came in at........:wave

    I believe I have completed all requested tasks in the order as received.
    I started with running the Combofix script....file attached
    I then ran MGTools......log attached
    I then ran gparted-live per TimW's instructions....
    Completed bootrec /fixmbr......showed completed successfully
    Completed bootrec /fixboot.....showed completed successfully
    Then ran MBRCheck.........log attached

    All of the above seem to have completed with no problems. I did have to reboot a couple of times, the keyboard seemed to hang up.

    Before I reload and run MSE again, I'll await your review of the attached logs
    Please accept my deepest thank you for taking the time to help me with this issue. You all go above and beyond the call of duty....:major
     

    Attached Files:

  7. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You probably should have re-run MGTools after removing the fake partition. I assume it is removed? You can go ahead and reload MSE and see what it says. Are you having any issues?
     
  8. msff

    msff Private E-2

    I re-ran MGTools per your request....log attached.
    Reloaded MSE and performed a complete scan...............all I can say is......
    YOU GUYS ROCK........... :hyper MSE did not find anything:clap.........
    I can finally give this computer to my son...........again, thank all of you for everything you do to help the rest of us out......
     

    Attached Files:

  9. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Everything looks good, but you need to get the computer back and do the final clean up:

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.We recommend them for doing backup scans when you suspect a malware infection.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:


    Malware removal from a National Chain = $149
    Malware removal from MajorGeeks = $0
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds