how can you tell if trojan downloaded your files?

Discussion in 'Malware Help (A Specialist Will Reply)' started by RunPc2Deth, Feb 15, 2006.

  1. RunPc2Deth

    RunPc2Deth Private E-2

    i recently found a rbot trojan virus on my computer and was wondering how do you know if it uploaded files off your computer?

    is there a way to tell?

    i have zone alarm as a firewall and always leave it on high security.

    this trojan made a file called server in my system32 folder, but i never saw in running in the background?
     
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to MGs!

    No the really is no exact way to know what it may have done. If you were using Task Manager to look for processes, just note that it does not show all process that can be running.

    You may want to consider running our standard cleaning sticky thread (the READ & RUN ME) to make sure you have no other malware on your system. Often tmes problems do not come alone.
     
  3. RunPc2Deth

    RunPc2Deth Private E-2

    thanks

    well i was looking at the property's of some of my files and it shows date accessed and was wondering if that would tell me? or does that only show when you open the file? i got some bank files on here so i wanted to make sure.

    funny thing about this trojan, i use zone alarm anti virus/antispyware and it didn't pick it up?

    spyware doctor and spysweeper did.
     
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    There is Date Created, Date Modified, and Date Accessed times. Date Accessed will change even when you view it to find out the last access time. This is really of no use to you.

    If you are worried about bank files, you really need to run the READ & RUN ME. There are many password stealing trojans floating around that go after banking info. They also do a good job hiding.

    That's the way things go. And ZonaAlarm may find things they do not. I would not have all three of these antispyware applications running permanently. Which did you pay for?
     
  5. RunPc2Deth

    RunPc2Deth Private E-2

    does the trojan leave any logs of what it did or is there anything i can check in my zonealarm logs to tell if files were taken?

    thanks
     
  6. RunPc2Deth

    RunPc2Deth Private E-2

    well in explorer you can add columns in the view so you don't have to view the file to see when it was last accessed. so i just thought that it would tell if the file had been moved.

    zone alarm is the only one i payed for, the others would only detect the trojan, but wouldn't remove it. i never run them in the background, only do a scan once a week or so.
     
  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    There are many different trojans and you may not necessarily find them in ZoneAlarm's logs because sometimes they attach themselves to valid applications (like Internet Explorer) to run and ZoneAlarm would see them as whatever the valid application is. You could spend hours checking your ZA log and also tracking down IP addresses to see who they belong to.

    Download GetRunKey125b.zip to your PC someplace you can locate it. Then extract the files from the ZIP. Locate the getrunkey125b.bat file and double click on it to run it. It will create a file named runkeys.txt in the root of drive C: (C:\runkeys.txt) . This log will also popup in a notepad window which your can just close. Upload the runkeys.txt file here as an attachment. This will only take a minute to do and will look for one of the password stealing trojan types.

    You still really need to get started now running this Sticky thread READ & RUN ME FIRST Before Asking for Support
     
  8. RunPc2Deth

    RunPc2Deth Private E-2

    cool i'll give that a shot and thanks for the help.

    i think i'm just gonna format this computer and start over. i was due anyway:)
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    What version of Windows do you have? Some only allow the columns to be Created & Modified?

    They are still running whether you scan or not and they are eating up valueable system resources. In addition they can conflict with each other making it difficult for the other to detect/remove problems.
     
  10. RunPc2Deth

    RunPc2Deth Private E-2

    here it is.
     

    Attached Files:

  11. RunPc2Deth

    RunPc2Deth Private E-2

    i have xp pro

    even if the program is not running it will still eat up resources?
     
  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    What SP level of XP Pro! I know that SP1 does not allow a column for Last Accessed time. Not sure about SP2 right now and I don't have one available right now to check.

    It is running whether scanning or not. They are run services too.
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Why are you using msconfig to block so many things from loading?
     
  14. RunPc2Deth

    RunPc2Deth Private E-2

    oh i have sp2.

    what should i use to block programs from loading?

    how did the log look?
     
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    First why do you want to block them? If you never use them, then uninstall them. There are better tools for control startups if you just want to sometimes allow things to run and other times not.

    The log was okay. But it is not a malware scanning tool. It just looks for a few things, one of which is a certain password stealer.

    If you are so concerned about malware problems, you really need to get started ASAP on running the READ & RUN ME now. You are wasting time. If you are clean that's great! But the best way to find out is to run the procedures.
     
  16. RunPc2Deth

    RunPc2Deth Private E-2


    no i use the anti spyware programs, but i don't leave them on all the time. i just turn then on from time to time to scan. i also switch stuff off from services.msc but msconfig always seems to be quicker. any suggestions for controlling startup programs.

    yeah i am backing up my data as i type this and will be doing a complete format of the drive.

    password stealer? is there any way to tell if it uploads files as well? like i said just concerned about my bank files i have in my documents.

    spyware doctor says server.exe is the infected file but i notice a server program in my services.msc? did it take over that program you think?


    anyway thanks again for filling me in on some info.
     
  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Startup CPL is nice but it will only control startup processes not services.

    The service named Server is a normal Windows service (lanmanserver).

    There is no way to know what files (if any) may have been stolen form your PC.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds