Possible malware infection. Logs attached.

Discussion in 'Malware Help (A Specialist Will Reply)' started by wormgod, May 11, 2009.

  1. wormgod

    wormgod Private E-2

    I have a possible malware infection that I cannot find. Recently, I have been experiencing the following problems:
    IE randomly dying
    XP hanging and requiring a power cycle (sometimes at the welcome screen)
    tmproxy also frequently dying

    I have tried multiple AV and other scanning tools (Trend Micro, VirtumunoBeGone, SpyBot, SAS, FixVundo, Trojan Remover, etc), and a couple of them found and removed Vundo and Winfixer and Dropper, but I am still having the same problems I am not sure that I have gotten everything, so I am now appealing to others for their help. I went through all the steps and have attached the requested logs. Please help. Thanks!
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Download The Avenger by Swandog469, and save it to your Desktop.

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    * Extract+ avenger.exe from the Zip file and save it to your desktop
    * Run avenger.exe by double-clicking on it.
    * -Do not change any check box options!!
    * Copy everything in the Quote box below, and paste it into the Input script here: part of the window:


    * Now click the Execute button.
    * Click Yes to the prompt to confirm you want to execute.
    * Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    * Your PC should reboot, if not, reboot it yourself.
    * A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\Avenger.txt
    * C:\MGlogs.zip
     
  3. wormgod

    wormgod Private E-2

    Thanks for the response. I ran Avenger as you suggested, and the files in C:\WINDOWS\SYSTEM32\DRIVERS\ETC\ were deleted. However, even though the log says the two files in C:\WINDOWS\temp\ were deleted, they are still there (marked as hidden and system). There is also another hidden and system file in that directory (xsw2).

    GetLogs.bat kept hanging and generating "NTVDM encountered a system error" messages, so I finally killed it and just re-ran the MGTools.exe that I originally downloaded. Hope this was okay. Logs are attached.
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Yes there are other files in your temp folder that need deleting:

    * Run avenger.exe by double-clicking on it.
    * -Do not change any check box options!!
    * Copy everything in the Quote box below, and paste it into the Input script here: part of the window:


    * Now click the Execute button.
    * Click Yes to the prompt to confirm you want to execute.
    * Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    * Your PC should reboot, if not, reboot it yourself.
    * A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.

    Now run Ccleaner.

    Uninstall thru add/remove programs:
    My Way Search Assistant

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\Avenger.txt
    * C:\MGlogs.zip
     
  5. wormgod

    wormgod Private E-2

    Ran Avenger, but even though it says that it is deleting the hidden/system files in the \windows\temp dir (rg4sfay, ydf8dk, xsw2), they are still there. Something is recreating them.

    Ran CCleaner. MyWay dir does not exist, so it could not be uninstalled, so I removed the registry entry via CCleaner. Ran GetLogs.bat.

    Avenger log and MGLogs.zip are attached. Please take a look and let me know the next step. Thanks.
     

    Attached Files:

  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I am not seeing whatever is recreating these files. Lets do this:

    * Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
    If it is not on your Desktop, the below will not work.
    * Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    * If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    * Open Notepad and copy/paste the text in the below code box into it (make sure you scroll all the way down in the code box to get all lines selected ):
    Code:
    KILLALL::
    
    File::
    C:\WINDOWS\temp\rg4sfay      
    C:\WINDOWS\temp\xsw2        
    C:\WINDOWS\temp\ydf8dk
    
    * Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    * At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    * You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    If it asks you to overide the prvevious file with the same name, click YES.
    * Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif
    * Follow the prompts.
    * When it finishes, a log will be produced named c:\combofix.txt
    * I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Now please use IE to dp this:
    Using BitDefender Online Scan.

    Please attach both the logs.
     
  7. wormgod

    wormgod Private E-2

    Before I saw your last post, I did a little research on my own (started by googling the filenames that kept returning), and found that this was quite possibly a master boot record trojan. Downloaded Dr Web CureIt, and it did find and fix a MBR trojan. Description of it at this link:
    http://www.trustdefender.com/blog/2009/04/04/new-mebrootsinowalmbrtorpig-variant-in-the-wild-virtually-undetected-and-more-dangerous-than-ever/

    It also mentions that one of the files (rg4sfay) actually contains the information being stolen by the trojan. I verified this by checking the Avenger backups. Nasty little bastard.

    I rescanned everything with all the scanners that I have now downloaded -- everything looks clean, and my system seems to be running fine. I also then had to go through and change a bunch of passwords to different websites that it had either stolen or might have been exposed.

    Thanks for all your help in getting me down the right path.
     
  8. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    If you wish to double check the MBR infection. you can do this:
    GMER's MBR.exe

    • Double click on the MBR.exe file to run it.
    • A log will be produced & saved to the desktop, called MBR.log.
    • Attach this log to your next message.


    Now delete the current mbr.log file and then run the below instructions.
    Click Start > Run and copy & paste the following text in the code box into the Run box and then click OK. You must copy and paste or type in this exactly. The quotes must be exactly as shown and there is a space before the -f
    Code:
    
         "%userprofile%\desktop\mbr.exe" -f
    
    Now double click on the mbr.exe file and attach the new mbr.log
     
  9. wormgod

    wormgod Private E-2

    Every time I try to download MBR, Trend Micro stops me with both a virus and a trojan warning and won't let me download it. Should I disable Trend Micro and try again?
     
  10. wormgod

    wormgod Private E-2

    Got MBR.exe and ran it twice as instructed. Both logs are attached, and it looks like they indicate some sort of malicious code, but I don't know enough to really decipher it.
     

    Attached Files:

  11. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Last edited: May 27, 2009
  12. wormgod

    wormgod Private E-2

    Booted from CD, ran Recovery console, ran fixmbr, and it said it was writing a new MBR. Restarted and re-ran MBR.exe and got the same output in the log (i.e. "malicious code").

    Possibly a false positive?
     
  13. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Re-run Combo as well as run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\ComboFix.txt
    * C:\MGlogs.zip
     
  14. wormgod

    wormgod Private E-2

    Here are the two logs.
     

    Attached Files:

  15. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You are clean.....we suspect that the MBR.exe is finding something related to Avira NTFS4DOS 1.9.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommed you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They are useful as backup scanners. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /u
        • Notes: The space between the combofix" and the /u, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.

      • Delete the C:\combofix folder from combofix (if it exists)

    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Go to add/remove programs and uninstall HijackThis.
    6. You can delete the C:\MGtools folder and the C:\MGtools.exe file. You can also delete the C:\MGlogs.zip
    7. If you are running Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning steps in the READ ME for your Window version and see the steps to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    8. After doing the above, you should work thru the below link:

     
  16. wormgod

    wormgod Private E-2

    Thanks for all your help. I'm going out of town for a few days, so I will start the cleanup when I get back. That (and the "How to protect yourself..." link) should keep me busy for a few days.

    Thanks again!
     
  17. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You are most welcome. Safe surfing....:)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds