Please help! Trojan/rootkit/browser redirect

Discussion in 'Malware Help (A Specialist Will Reply)' started by amgriffiths, Feb 2, 2010.

  1. amgriffiths

    amgriffiths Private E-2

    I managed, through my own fault, to pick up an infection from a bad executable, which I downloaded and ran when trying to add functionality to Media Monkey. I was alerted to it by AVG flashing up threat messages about "BackDoor.Generic12.GOG.Dropper".

    I immediately scanned with AVG (nothing found). I then scanned, several times, with MalWareBytes; SuperAntiSypware; Spybot. These found, and claimed to remove, multiple threats; mostly Trojans and one Rootkit entry. I have copies of these logs if required.

    After all of this, I had a persistent redirect in Firefox and IE from Google search results. I would click on a search result, and more often than not be taken to a different page than the one I had selected. Also, AVG seemed to be broken.

    I removed and reinstalled AVG, which then found an instance of the SHeur2.CIEE trojan. My internet connection was intermittent. I renamed the AVG executable, as well as those for various other spyware removers, and ran them all again, but they found nothing. I also booted into safe mode and deleted as much temporary file material as I could find.

    I then found this forum, and have followed the instructions to the best of my ability. I could not get RootRepeal to run: it froze (for hours) on the 'Initializing' box, immediately after running the executable, so I have no log for that. The other logs are attached. Combofix said that it had detected Rootkit activity.

    I have not done anything security-critical on the computer (passwords, bank details etc) since the moment of infection, which I can pinpoint very precisely. However, this is a computer which I use extensively for this purpose, and I need to be certain that it is clean. The redirects seem, for the moment, to have stopped - but I'm not relaxing yet.

    I hope you can help me! Many thanks in advance. Logs attached.
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Combo is saying it fixed your redirects, but I want to be sure, so:

    * Please download TDSSKiller to your Desktop
    * Extract its contents to your Desktop so that you have TDSSKiller.exe directly on your Desktop and not in any subfolder of the Desktop.
    * Click Start > Run and copy/paste the following bold command into Run box and hit Enter.

    "%userprofile%\Desktop\TDSSKiller.exe" -v

    * Follow the instructions to type in "delete" when it asks you what to do when if finds something.
    * When done, a log file should be created on your C: drive named something like TDSSKiller.2.1.1_27.12.2009_14.17.04_log.txt which is based on the program version # and date and time run. Please attach this log to your next reply.

    Tell me also how things are running.
     
  3. amgriffiths

    amgriffiths Private E-2

    Many thanks for your help! I have run TDSSKiller as you asked, and have attached the log. Things seem to be running as expected; certainly no redirects at present. Does this mean I don't need to worry about Trojans/Backdoor issues any more, from a security point of view?

    A related question: when I became infected with the various Trojans, my external hard drive (W: ) was connected to the computer. Shortly afterwards I disconnected it (physically), and it's been disconnected ever since. In a subsequent scan (but before I found this forum) one of the scanners found a problem with my W:/autorun file, even though the drive wasn't connected to the computer!

    Should I be concerned that when I reattach the external drive, I could become reinfected - and if so, what steps can I take? The drive usually attaches via Firewire, but there is a USB option if required. Ditto things like my Blackberry and digital camera, both of which the computer reads as external drives when attached.

    Thanks again
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    As far as worrying about the future, I will give you a link to read on protecting yourself when you are ready to do the final clean up.

    As to the external drive, you need to:
    1) Install AutoEater.
    2) Make sure that your AV and AS programs are up to date and run them with the drive connected.

    Let me know what you find.
     
  5. amgriffiths

    amgriffiths Private E-2

    Autorun Eater found an infected autorun file on my W: drive, and I told it to fix the problem. I then scanned with AVG 9, Malwarebytes and SAS, none of which found anything. Do you think I'm in the clear? Can I start using the computer for banking again?

    Thanks again for your help.
     
  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Good to know. However, any time your suspect that you have been infected, you should always alert your bank and credit card companies and then use a different computer to change your passwords.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real-time protection. They are useful as backup scanners.They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /u, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    5. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    6. Go to add/remove programs and uninstall HijackThis.
    7. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    8. If you are running Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures ian step 3 the READ ME for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore ato create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
     
  7. amgriffiths

    amgriffiths Private E-2

    Thanks. I've run through the final steps and all looks fine. Just wanted to thank you for your help. I'll be recommending this forum if I hear of anyone in a similar situation!
     
  8. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You are most welcome....safe surfing!! :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds