Extremely Difficult Trojan. Tried all tricks-can't remove

Discussion in 'Malware Help (A Specialist Will Reply)' started by Mastaphin, Jul 20, 2009.

  1. Mastaphin

    Mastaphin Private E-2

    Dear Staff,

    Windows XP Pro:

    Apparently infected with Advanced Antivirus / Redol Trojan / Zpack trojan.


    Tried to install Spyware Doctor, blocked from updating, can't run.
    At this time only Mbam log is available.

    I have tried many things to remove this, such as:
    AVG Antivirus
    AVG Rootkit
    Rootkit Revealer
    Booting in Safe Mode (fail)
    Booting to Recover cd (can't load cd drivers)
    Booting to Linux for Aries Rootkit remover (fail)

    -------------------------------------

    Please advise. (Your assistance is greatly appreciated)
     

    Attached Files:

  2. Mastaphin

    Mastaphin Private E-2

    Wow, this is some issue.

    Now mainstream sites like Youtube and Facebook have been blocked too.

    I just ran Sophos Anti-Rootkit and it has found large amount of issues, but has refused to allow any of them to be cleaned.

    This is quite serious, to the point of blanket formating my hard drive.

    Is it possible to get some advice soon.?

    Thanks !
     
  3. Mastaphin

    Mastaphin Private E-2

    Dear Major Geeks and forum friends.
    I found a way to remove all of the infections.. It was really simple.

    Windows XP Pro

    Boot to Windows, create a new Admin account and login as such.
    Run Malwarebyte's Anti-Malware

    Allow to complete, then remove selected infections.
    Reboot to remove remaining infections.

    Log back in as original admin account and rerun Malwarebyte's Anti-Malware.
    remove infections and reboot.

    TaDaaa !

    These were my infections.. Loads!

    Memory Processes Infected:
    C:\WINDOWS\system32\sopidkc.exe (Backdoor.Bot) ->

    Memory Modules Infected:
    C:\WINDOWS\system32\flashd132.dll (Trojan.Agent) ->
    C:\WINDOWS\system32\winhelper.dll (Trojan.FakeAlert) ->

    Registry Keys Infected:
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sopidkc (Backdoor.Bot) ->
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\sopidkc (Backdoor.Bot) ->
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sopidkc (Backdoor.Bot) ->
    HKEY_CLASSES_ROOT\CLSID\{38101905-d80f-4788-96f6-986a8186178a} (Trojan.Agent) ->
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{500bca15-57a7-4eaf-8143-8c619470b13d} (Trojan.FakeAlert) ->
    HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) ->
    HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) ->
    HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) ->
    HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\setup.exe (Rogue.Installer) ->
    HKEY_CURRENT_USER\SOFTWARE\Cognac (Rogue.Multiple) ->
    HKEY_CURRENT_USER\SOFTWARE\XML (Trojan.FakeAlert) ->
    HKEY_CURRENT_USER\SOFTWARE\ColdWare (Malware.Trace) ->
    HKEY_CLASSES_ROOT\D (Trojan.Agent) ->
    HKEY_CLASSES_ROOT\D.1 (Trojan.Agent) ->

    Registry Values Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{38101905-d80f-4788-96f6-986a8186178a} (Trojan.Agent) ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\taskman (Backdoor.Bot) ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network\UID (Malware.Trace) ->
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cognac (Trojan.FakeAlert) ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\XML2u (Spyware.OnlineGames) ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\w32id (Spyware.OnlineGames) ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\BuildW (Malware.Trace) ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\i (Malware.Trace) ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\mso (Malware.Trace) ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\udso (Malware.Trace) ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\uid (Malware.Trace) ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\Ulrn (Malware.Trace) ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\Update (Malware.Trace) ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\UpdateNew (Malware.Trace) ->
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Desktop\General\wallpaper (Hijack.Wallpaper) ->

    Registry Data Items Infected:
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) ->
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> No action taken.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\activedesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) ->
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoActiveDesktopChanges (Hijack.DisplayProperties) -> Bad: (1) Good: (0) ->
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) ->
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoActiveDesktopChanges (Hijack.DisplayProperties) -> Bad: (1) Good: (0) ->

    Folders Infected:
    C:\Documents and Settings\All Users\Start Menu\Programs\RelevantKnowledge (Spyware.Marketscore) ->
    C:\WINDOWS\system32\lowsec (Stolen.data) ->

    Files Infected:
    C:\WINDOWS\system32\sopidkc.exe (Backdoor.Bot) ->
    C:\WINDOWS\system32\flashd132.dll (Trojan.Agent) ->
    c:\WINDOWS\file.exe (Trojan.Dropper) ->
    c:\WINDOWS\install.exe (Trojan.Downloader) ->
    c:\WINDOWS\msa.exe (Trojan.Agent) ->
    c:\WINDOWS\setup.exe (Rogue.Installer) ->
    c:\WINDOWS\system32\mobsyn.exe (Backdoor.Bot) ->
    c:\WINDOWS\system32\msncache.dll (Backdoor.Bot) ->
    c:\WINDOWS\Temp\12.tmp (Trojan.Dropper) ->
    c:\WINDOWS\Temp\61.tmp (Trojan.Dropper) ->
    c:\documents and settings\all users\start menu\Programs\relevantknowledge\About RelevantKnowledge.lnk (Spyware.Marketscore) ->
    c:\documents and settings\all users\start menu\Programs\relevantknowledge\Privacy Policy and User License Agreement.lnk (Spyware.Marketscore) ->
    c:\documents and settings\all users\start menu\Programs\relevantknowledge\Support.lnk (Spyware.Marketscore) ->
    c:\WINDOWS\system32\lowsec\local.ds (Stolen.data) ->
    c:\WINDOWS\system32\lowsec\user.ds (Stolen.data) ->
    C:\WINDOWS\Fonts\services.exe (Trojan.Agent) ->
    C:\WINDOWS\system32\comsa32.sys (Trojan.Agent) ->
    C:\WINDOWS\system32\dllcache\figaro.sys (Trojan.Agent) ->
    C:\Documents and Settings\Sean 1\Local Settings\Temp\svchost.exe (Trojan.Agent) ->
    C:\WINDOWS\system32\FInstall.sys (Backdoor.Bot) ->
    C:\WINDOWS\system32\delself.bat (Malware.Trace) ->
    C:\WINDOWS\system32\drivers\beep.sys (Fake.Beep.sys) ->
    C:\WINDOWS\system32\dllcache\beep.sys (Fake.Beep.sys) ->
    C:\WINDOWS\system32\braviax.exe (Trojan.FakeAlert) ->
    c:\WINDOWS\Tasks\{5B57CF47-0BFA-43c6-ACF9-3B3653DCADBA}.job (Trojan.FakeAlert) ->
    C:\WINDOWS\Tasks\{783AF354-B514-42d6-970E-3E8BF0A5279C}.job (Trojan.Downloader) ->
    C:\Documents and Settings\Sean 1\Start Menu\Advanced Virus Remover.lnk (Rogue.AdvancedVirusRemover) ->
    C:\Documents and Settings\Sean 1\Application Data\wiaserva.log (Malware.Trace) ->
    C:\WINDOWS\system32\certstore.dat (Trojan.Agent) ->
    C:\Documents and Settings\Sean 1\Application Data\wiaservg.log (Malware.Trace) ->
    C:\WINDOWS\system32\critical_warning.html (Trojan.FakeAlert) ->
    C:\WINDOWS\system32\winhelper.dll (Trojan.FakeAlert) ->
    C:\WINDOWS\system32\flashd32.dll (Trojan.Agent) ->
    C:\uudoam.exe (Trojan.Dropper) ->
    C:\wuveidc.exe (Trojan.Dropper) ->
    C:\englrxq.exe (Trojan.Dropper) ->
    C:\adcyhoy.exe (Trojan.Dropper)


    ----------------------
    Dear Staff. I apologize for apparently "bumping" this thread the other day. Didn't know what was meant by it, but now I do.

    Also. I think I visited "ConsumptionJunction.com" and got this issue. A few years ago the site was like Ogre.com, but now it is a porn site. (Didn't know that either till now)
     
  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Welcome to Major Geeks!

    I would suggest you complete these instructions and attach the requested logs so we can be sure that ALL traces of the malware are gone.

    Please follow the instructions in the READ & RUN ME FIRST link given futher down and attach the requested logs when you finish these instructions.

    • If you have problems where no tools seem to run, please try following the steps given in the below and then continue on no matter what you find. You only need to try the TDSSserv steps if having problems getting scans in the Read & Run Me First. If TDSSserv is not found, just continue on with the READ & RUN ME.
    READ & RUN ME FIRST. Malware Removal Guide

    • If something does not run, write down the info to explain to us later but keep on going.
    • Do not assume that because one step does not work that they all will not.
    • After completing the READ & RUN ME and attaching your logs, make sure that you tell us what problems still remain ( if any still do )!
    Helpful Notes:

    1. If you run into problems trying to run the READ & RUN ME or any of the scans in normal boot mode, you can run the steps in safe boot mode but make sure you tell us what you did later when you post logs. See the below if you do not know how to boot in safe mode:

    2. If you have problems downloading on the problem PC, download the tools and the manual updates for SUPERAntiSpyware, Malwarebytes and Spybot ( links are given in the READ & RUN ME) onto another PC and then burn to a CD. Then copy them to the problem PC. You will have to skip getting updates if (and only if) your internet connection does not work. Yes you could use a flash drive too but flash drives are writeable and infections can spread to them.
    3. If you cannot seem to login to an infected user account, try using a different user account (if you have one) in either normal or safe boot mode and running only SUPERAntiSpyware and Malwarebytes while logged into this other user account. Then reboot and see if you can log into the problem user account. If you can then run SUPERAntiSpyware, Malwarebytes, ComboFix and MGtools on the infected account as requested in the instructions.
    4. To avoid additional delay in getting a response, it is strongly advised that after completing the READ & RUN ME you also read this sticky:

    Any additional post is a bump which will add more delay. Once you attach the logs, your thread will be in the work queue and as stated our system works the oldest threads FIRST.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds