1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

got hit with vundo/rootkit/etc. -- probably gone now, could you check logs?

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by Blue Orlando, May 1, 2008.

  1. Blue Orlando

    Blue Orlando Private E-2

    i got a nasty infection of vundo, with rootkit, clbdriver.sys, QDR, ISM, etc. it changed my beep and installed lots of weird stuff and kept redirecting my browser. i already had Symantec Anti-Virus Corporate installed and it didn't catch it. i tried at first using Spybot (got rid of a bunch of stuff) and Ad-Aware (this one didn't help much) but it was still there -- the sign was that when i went to google and did a search, the links all got redirected to some weird site -- 78.something -- which tried to sell stuff. eventually i got frustrated and remembered i had a backup from a week before, and used it to restore my system state, \WINDOWS and \Program Files. this got rid of the problems but it turns out it still left lots of Malware files hanging around -- restoring overwrote all files back to the state of a week before, but didn't remove new files created since then.

    this became obvious when i went and reinstalled the newest Symantec + Firewall, Spybot, updated Java, etc. and then made a new backup -- the backup log had "\Windows\System32\clbdriver.sys access denied" and when i asked Symantec to scan it, it noted it as a Rootkit (obviously Symantec had blocked it from getting backed up but then why didn't it pop up a screen noting this?). i searched and found your site, esp. this posting:


    which seemed to have an almost identical infection.

    i followed all of your "READ AND RUN ME FIRST" guide and they all found bits and pieces here and there and got rid of them. the bits and pieces didn't seem active but who knows? i also dumped/toggled system restore at one point, but that was before running all of the tools in your guide. i hope everything is gone but i'm not sure -- could someone take a look at my logs?


    Attached Files:

  2. Blue Orlando

    Blue Orlando Private E-2

    here are the remaining logs.

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    Based on your logs, the worst of your problems are already gone. We just have a little to do.

    Run C:\MGtools\analyse.exe by double clicking on it. This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    O2 - BHO: (no name) - {259F616C-A300-44F5-B04A-ED001A26C85C} - (no file)
    O3 - Toolbar: (no name) - {BA52B914-B692-46c4-B683-905236F6F655} - (no file)
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime

    After clicking Fix, exit HJT.

    Now we need to use ComboFix to remove a bunch of malware files.
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Open Notepad and copy/paste the text in the below quote box into it:
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.

    Now run Ccleaner!

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it.

    Then attach the below logs:
    • C:\ComboFix.txt
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
  4. Blue Orlando

    Blue Orlando Private E-2

    OK, I did what you asked and attached the logs. No problem getting registry settings applied. I'm doing another backup now since hopefully everything should be pretty clean ... I recently did a full Symantec scan and it didn't find anything worrisome.

    BTW I've got another problem, not virus related -- spoolsv service hangs on boot-up, sometimes taking 15 mins or more before hanging, and blocking any further boot-up loading (until it times out or i get frustrated and kill it). after boot-up, if i go to services.msc and turn it back on, no problem. which forum is the best one to help with this issue?

  5. Blue Orlando

    Blue Orlando Private E-2

    hmm?? the logs didn't show up. let's try again.

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Try the Software forum.

    Your logs are clean. If you are not having any other malware problems, it is time to do our final steps:
    1. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop & renamed it like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\cf" /u
        • Notes: The space between the cf" and the /u, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
      • Delete the C:\cf folder from combofix.
    2. If we used SmitFraudFix, you can delete all files and folders related to it now including the c:\rapport.txt log.
    3. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    4. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    5. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    6. Go to add/remove programs and uninstall HijackThis.
    7. You can delete the C:\MGtools folder and the C:\MGtools.exe file. You can also delete the C:\MGlogs.zip
    8. If you are running Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning steps in the READ ME for your Window version and see the steps to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:

Share This Page

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds