DNSChanger Trojan?

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by ejam50, Jan 21, 2012.

  1. ejam50

    ejam50 Private E-2

    My network administrator kicked me off the internet because they found my computer to be infected. But I've spent a long time running scans and turned up zilch. Symantec deleted some tracking cookies and MalwareBytes does not report anything. Also tried running a couple other programs without success. Below is the email from the network admin and attached is a hijackthis log (jpeg because it wouldn't save to a file) and TDSKiller log. Please help. Thank you!

    I'm running Windows 7 Startup on my Asus netbook, and since I can't access the internet, I can't update the programs. I've been transferring programs on usb drive.

    From network admin:
    ------------------------------------------------

    We have recived a report from the REN-ISAC that your machine is infected and participating in as botnet. This particular botnet steals personal information. All the passwords you use on this computer (Andrew, banking, google, facebook etc.) should be changed ASAP (on another computer). Please read the information below about your infection.


    Regarding DNSChanger:

    "DNSChanger is a trojan that will change the infected system's Domain
    Name Server (DNS) settings, in order to divert traffic to unsolicited,
    and potentially illegal sites." [1]

    [1] Trojan:W32/DNSChanger
    http://www.f-secure.com/v-descs/trojan_w32_dnschanger.shtml

    Additional information:

    Aliases [2]

    TR/Dldr.DNSChanger (Avira)
    Win32/Alureon (CA)
    Trojan.DnsChange (Dr.Web)
    Trojan.Zlob (Ikarus)
    Trojan-Downloader.Win32.Zlob (Kaspersky)
    DNSChanger (McAfee)
    Troj/Zlob (Sophos)
    Trojan-Downloader.Win32.Femad (Sunbelt Software)
    Trojan.Zlob (Symantec)
    TROJ_DNSCHAN (Trend Micro)

    [2] Win32/Alureon
    http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Win32/Alureon

    Rogue DHCP servers
    http://isc.sans.edu/diary.html?storyid=5434

    DNS changer Trojan for Mac (!) in the wild (part 1)
    http://isc.sans.edu/diary.html?storyid=3595

    (Minor) evolution in Mac DNS changer malware (part 2)
    http://isc.sans.edu/diary.html?date=2008-04-30

    OS X DNS Changers part three (part 3)
    http://isc.sans.edu/diary.html?storyid=5390

    DNSChanger.f
    http://www.mcafee.com/threat-intelligence/malware/default.aspx?id=141841
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    Please read ALL of this message including the notes before doing anything.

    Please follow the instructions in the below link:

    READ & RUN ME FIRST. Malware Removal Guide


    and attach the requested logs when you finish these instructions.
    • **** If something does not run, write down the info to explain to us later but keep on going. ****
    • Do not assume that because one step does not work that they all will not. MGtools will frequently run even when all other tools will not.

    • After completing the READ & RUN ME and attaching your logs, make sure that you tell us what problems still remain ( if any still do )!
    Helpful Notes:
    1. If you run into problems trying to run the READ & RUN ME or any of the scans in normal boot mode, you can run the steps in safe boot mode but make sure you tell us what you did later when you post logs. See the below if you do not know how to boot in safe mode:
    2. If you have problems downloading on the problem PC, download the tools and the manual updates for SUPERAntiSpyware and Malwarebytes ( links are given in the READ & RUN ME) onto another PC and then burn to a CD. Then copy them to the problem PC. You will have to skip getting updates if (and only if) your internet connection does not work. Yes you could use a flash drive too but flash drives are writeable and infections can spread to them.
    3. If you cannot seem to login to an infected user account, try using a different user account (if you have one) in either normal or safe boot mode and running only SUPERAntiSpyware and Malwarebytes while logged into this other user account. Then reboot and see if you can log into the problem user account. If you can then run SUPERAntiSpyware, Malwarebytes, ComboFix and MGtools on the infected account as requested in the instructions.
    4. To avoid additional delay in getting a response, it is strongly advised that after completing the READ & RUN ME you also read this sticky:
    Any additional post is a bump which will add more delay. Once you attach the logs, your thread will be in the work queue and as stated our system works the oldest threads FIRST.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds