Help with Black Internet trojan (II)

Discussion in 'Malware Help (A Specialist Will Reply)' started by netmatt, Jun 23, 2010.

  1. netmatt

    netmatt Private E-2

    I saw the original "Help with Black Internet Trojan" and was going to post a note or message, but rules prohibit both, so hopefully one f them will see this post.

    I have the exact same issue with an XP machine as that. (smss.exe and services.exe in the system volume information area, made by Black Internet, Inc)

    In addition, there is another guy on BleepingComputer, Am I infected forums, thread "How do I delete services.exe and smss.exe from my System Volume Information folder?" that has the same thing as well. They are working on that with no luck up to this point as well.

    Anyway, I am following both threads, but wanted to let @cachito and @dr.moriarty know that I found that you can delete those files by running the XP Recovery Console, but when rebooted they re-appear, so just getting rid of those files may not be the root cause here. I even went so far as to (while in recovery console) delete everything in System Volume Information, and then replace the actual SMSS and Services.exe in System32 with new ones from a working XP machine. Still they all re-appeared. Very aggravating. Anyway, hopefully it give some more data on this issue.
     
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    You need to remove the infection from the Master Boot Record (MBR) first. You can try running fixmbr from the Recovery Console and then deleting the rogue files if they still exist. Alternatively, you can try the below which is just the first step of two. We need to see the first log before creating a fix.

    • Download bootkit_remover.rar
    • Click the underlined DOWNLOAD text to download the file and save it to your Desktop.
    • You then need to extract the remover.exe file from the RAR using a program capable of extracing RAR compressed files. If you don't have an extraction program, you can use7-Zip
    • After extracing remover.exe to your Desktop, double click the remover.exe file to run the program.
    • Attach or post inline here, the output from remover.exe
     
  3. netmatt

    netmatt Private E-2

    I was going to try the fixmbr in the Recovery Console, but it warned that it could/would change my partitions, since mine was non-standard. Since my Ghost images were on Partition #2, I could not take the chance.

    I decided to just revert to a Ghost image I had of the system. 2 days working on it was enough for me.

    Thanks for the follow-up! :)
     
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Yes that is an issue with non-standard MBRs. Even Dell and some other vendors create problems by making non-standard MBRs to use their factory partitions. Using fixmbr can make these factory images become non-usable. But in many cases, most people do not want to revert to a very outdated image that puts the PC back into the state it was shipped from the factory thus loosing everything you have installed. Using fixmbr only rewrites sector 0 of the MBR. It does not rewrite the whole MBR.

    More and more infections are messing with the MBR. You may want to find a way that you can reliably rewrite just your MBR in the future since this may happen more.
     
  5. netmatt

    netmatt Private E-2

    Son of a...!!!!!!!

    The Ghost image did not remove it. Will need your help if your still watching!

    Here is the output from Remover:

    Bootkit Remover version 1.0.0.1
    (c) 2009 eSage Lab
    www.esagelab.com

    \\.\C: -> \\.\PhysicalDrive0
    MD5: bfa611d5fe300f883a84a4fd7447f26b
    \\.\D: -> \\.\PhysicalDrive0

    Size Device Name MBR Status
    --------------------------------------------
    149 GB \\.\PhysicalDrive0 Unknown boot code

    Unknown boot code has been found on some of your physical disks.
    To inspect the boot code manually, dump the master boot sector:
    remover.exe dump <device_name> [output_file]
    To disinfect the master boot sector, use the following command:
    remover.exe fix <device_name>


    Press any key to quit...
     
  6. netmatt

    netmatt Private E-2

    Was not sure of the output that you wanted so I also ran the "dump" that it mentioned. 2 attached text files. One is the dumped to a text file. dump 2 is a copy of what showed in the command prompt (like a hex output)
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Your log indicates that drive D is the problem. Is that the drive that you reimaged already?

    Also please run MGtools as per the below instructions and attach the MGlogs.zip file so I can be sure we are seeing this infection and so we have a reference point to compare to later.

    Using MGtools
     
  8. netmatt

    netmatt Private E-2

    No that is the drive where the images are stored. I re-imaged the C: drive from the images on the D Drive. We have not done anything with the D drive, just thought that it was OK.

    OK, done, attached are the logs
     

    Attached Files:

  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay I misread your log. It appears that you have just one physical hard disk with two partitions on it.

    Before I attempt to give you a fix I have to ask if this is a company PC with business info on it and at risk. If so you really need to have it backed up elsewhere just to be safe before we continue. While in most cases our fixes are safe, there are no guarantees due to the effects that malware itself can cause. Also you also need to install proper protection software as this PC has no protection.
     
  10. netmatt

    netmatt Private E-2

    Yes we are properly backed up. Worst case, we reformat, and restore the ghost image. We just backed up the image to the network, so we are OK to proceed.

    The PC had protection before we just restored the image. We will reload the protection again, when we are fixed. We got a lot of Microsfot updates to re-install as well!
     
  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Now - please do the following:


    • Click Start, Run then copy and paste the below into the Run box and click OK.
    "%userprofile%\Desktop\remover.exe" fix \\.\PhysicalDrive0 %systemdrive%\bkrlog.txt

    • Now reboot your PC and after reboot continue with the below instructions.
    • Disable System Restore on all drives.
    • Look for the below folder and if if it sill exists, delete it.
      • C:\System Volume Information\Microsoft
    • Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


      Then attach the below logs:
      • the bkrlog.txt file created in your root folder which is C:\
      • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  12. netmatt

    netmatt Private E-2

    The first command that you wanted us to run failed with.....

    Restoring boot code at \\.\PhysicalDrive0...
    ReadFromFile(): Error 2 while reading 'C:\bkrlog.txt'
    ERROR: Can't read input file C:\bkrlog.txt

    Press any key to quit...


    What is bkrlog.txt? It appears to need this file and it doesn't exist??
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No it is not supposed to exist. It is supposed to be a log file it creates when running. Are you ure it did not already apply the fix? If it did not already run the fix, Try the below.

    "%userprofile%\Desktop\remover.exe" fix \\.\PhysicalDrive0 bkrlog.txt

    If the above does not work, just leave off the log file name and run it like below and try to note the output.

    "%userprofile%\Desktop\remover.exe" fix \\.\PhysicalDrive0
     
  14. netmatt

    netmatt Private E-2

    We were only able to get the third of your commands to work.

    "%userprofile%\Desktop\remover.exe" fix \\.\PhysicalDrive0

    So we don't have a bkrlog.txt, but it said it ran OK. We then deleted the Microsoft directory as stated and ran GetLogs.bat. The MGLogs.zip is attached.
     

    Attached Files:

  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Looks good based on the new log. How is it working for you?
     
  16. netmatt

    netmatt Private E-2

    Seems to be OK! Thanks!
     
  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  18. netmatt

    netmatt Private E-2

    OK, I will work thru that. Thanks again! :wave

    (BTW, I noticed that AdBlock Plus on Firefox blocks the links that you post in these threads. You may already know that, but in case someone says they don't see the links...)
     
  19. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes we know this and this is the risk people take when using programs like AdBlock. It is blocking more than just ads. Thus it is the end users problem, not ours ;). I have no problem with links when using FireFox ( even with AdBlock Plus running) , IE, Chrome, Opera or any of another dozen browsers.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds