rustock spambot log attached

Discussion in 'Malware Help (A Specialist Will Reply)' started by cividan, Jul 13, 2010.

  1. cividan

    cividan Private E-2

    Hi, my mail server was blacklisted because of sending spam and cbl was telling me that I had a computer infected with rustock spambot that brought me to your forum so I followed the instruction on the read and run me first post and I'm now attaching the log for you guys to process them and let me know if all is fine now. I also moved 90% of email in my inbox to a .pst file wich I closed from outlook according to a post i saw elsewhere in this forum (google search). I trying running rootRepeal but it hang up on the folder c:\windows\winsxs\manifests\
    this folder has 20963 file in it so that made RootRepeal use up to 2 gig of memory and then finally hang up with a half transparent pop up window i could not read and I pressed the enter key on it and then it closed the app. I had no antivirus or firewall running (disconnected from the internet). I'm posting from a different computer. I had also run ad-aware before running these tool that gave me a log file if it's ever needed I have posted it in the next reply
     

    Attached Files:

  2. cividan

    cividan Private E-2

    ad-aware attachment in this message

     

    Attached Files:

  3. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Malware detected in email databases has to be cleaned up by you. You have a few choices:

    1. delete the whole file which is not an option you normally want to use
    2. load the email folder that contains the infection and delete ALL unnecessary emails (hoping to remove the problem email) and then use the Mailbox Cleanup option to delete all old emails. Then compact the Outlook database to permanently remove data. See http://support.microsoft.com/kb/196990 If you do not cleanup and compact the databases, the deleted emails may still be leaving hidden information in the database that you just cannot see but a scanner may still pickup on it.
    3. create a new folder and move only emails you really need into the new folder and then delete the infected folder.

    In the meantime, it looks like the scans took care of most of it. However, do you know what these are:
    c:\windows\Ytizab.exe
    c:\windows\Ytizaa.exe
    If you don't, delete them along with:
    c:\users\danyd\AppData\Roaming\ohipmn.dat
    C:\Windows\TEMP\2c64e.tmp
    C:\Windows\System32\drivers\wjudb.sys
    C:\Windows\Temp\4a9ffdcf57e12c503faf261a.tmp

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    * C:\MGlogs.zip

    Make sure you tell me how things are working now!
     
  4. cividan

    cividan Private E-2

    Hi, thanks for the help,

    deleted from your recomandation since i dont know what they are:

    c:\windows\Ytizab.exe
    c:\windows\Ytizaa.exe

    along with:

    c:\users\danyd\AppData\Roaming\ohipmn.dat

    C:\Windows\TEMP\2c64e.tmp
    C:\Windows\Temp\4a9ffdcf57e12c503faf261a.tmp

    I deleted everything in the c:\windows\temp\ folder but the the 2c64e.tmp was not present in that folder, I tried from the command line in case it was a hidden file but even with dir /a h or dir /a s did not find the file.
    .
    .
    .
    This file wont delete, I get a error saying "unable to read from file or source disk" this is my translation of the error since my OS is in french.

    C:\Windows\System32\drivers\wjudb.sys

    as for how my system is running, I was still unable to access the registry or the folder and search option to set the option to allow me to see hidden and system file along with file extension. Running the C:\MGtools\GetLogs.bat file as administrator (I have UAC disabled but I still did run as admin in case) gave me an error saying registry disabled by your administrator but it kept going and the file extension appeared on the folder so I tried again for registry and it's now working ( I had tried fixing the problem with the gpedit.msc method but to no avail I was locked out of registry. Now that I have access to registry i tried fixing "the folder and search option" that is greyed out in the registry but it seem that even changing the registry or the gpo doesn't fix the problem. Take note that when I first ran antispyware before coming to this forum 1 of them recognized regedit.exe was infected... so I had deleted the file but now it's back and I didn't put it back there...

    Again thanks for the help.
     

    Attached Files:

  5. cividan

    cividan Private E-2

    Re: rustock spambot log attached - update

    Ok litlle update, I connected the culprit computer to the wireless router wich has another ip address outside my main network and started to do some blacklist removal request has it had been listed already before I did the cleanup. I removed my ip from cbl last night and now this morning I'm listed again and their log says I sent spam about 4 hour ago. So my question is: does this rustock spambot propagate to other computer ? If no it mean I'm still infected, my computer froze overnight and on the reboot now I can access both registry and "search and folder option" I don't see my computer behaving suspicious, my firewall doesnt list anything suspect accessing internet (java, firefox, flashplayer) I will uninstall forticlient firewall and install zonealarm fresh so I can monitor exactly what is accessing the internet.
    Awaiting feedback.
     
  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    After clicking Fix, exit HJT.

    * Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
    If it is not on your Desktop, the below will not work.
    * Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    * If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    * Open Notepad and copy/paste the text in the below code box into it (make sure you scroll all the way down in the code box to get all lines selected ):
    Code:
    KILLALL::
    
    File::
    C:\Windows\System32\drivers\wjudb.sys
    C:\Windows\Temp\20daa33c.tmp
    C:\Users\danyd\AppData\Local\Temp\debug.exe
    C:\Users\danyd\AppData\Local\Temp\t9xo00b.dll
    C:\Users\danyd\AppData\Local\Temp\h3a39as1a3.exe
    C:\Users\danyd\AppData\Local\Temp\avp32.exe
    
    Folder::
    C:\Users\danyd\AppData\Roaming\Protection Center
    
    Rregistry::
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
    "sdr8gdrgdrgke49orkgsjkjfjhsd"=-
    "hsef87ehf3jishfs87fhuishfsgggfdgs4g"=-
    "mcexecwin"=-
    "hsehf98u34i9tjioaugy987iuegdsg"=-
    
    
    * Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    * At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    * You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    If it asks you to overide the previous file with the same name, click YES.
    * Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif
    * Follow the prompts.
    * When it finishes, a log will be produced named c:\combofix.txt
    * I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Download and save the below to your PC (save it anywhere you can find it. The Desktop is fine). Then doube click on it to run it.

    AVPFind.bat

    It should take a couple minutes to run. You will see a black command prompt window while it is running and it should close when it is finished. Once it finishes, attach the c:\avplog.txt file that is will hopefully create as long as the malware does not block the batch file from running.

    * Please download TDSSKiller to your Desktop
    * Extract its contents to your Desktop so that you have TDSSKiller.exe directly on your Desktop and not in any subfolder of the Desktop.
    * Click Start > Run and copy/paste the following bold command into Run box and hit Enter.

    "%userprofile%\Desktop\TDSSKiller.exe" -v

    * Follow the instructions to type in "delete" when it asks you what to do when if finds something.
    * When done, a log file should be created on your C: drive named something like TDSSKiller.2.1.1_27.12.2009_14.17.04_log.txt which is based on the program version # and date and time run. Please attach this log to your next reply.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\ComboFix.txt
    * C:\MGlogs.zip
     
  7. cividan

    cividan Private E-2

    Hi, thanks again for your help, here are the new log, also when I run combofix, the program tell me that I have cd emulation enable even if I uninstalled daemon tools from my computer from the read and run me first guide...
    new log are attached to this reply
     

    Attached Files:

  8. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Dameon tools are still showing here:
    c:\users\goldorak\AppData\Roaming\DAEMON Tools Pro
    c:\users\goldorak\AppData\Roaming\DAEMON Tools Lite
    c:\users\goldorak\AppData\Roaming\DAEMON Tools

    And your logs are still showing what could be a false positive about your MBR. Please go back to the Read and Run FIrst instructions and follow the instructions in step 6 to disable your disc emulation software.

    In the meantime, run CCLeaner and clean out these folders:
    C:\Windows\temp\
    C:\Users\danyd\AppData\Local\temp\

    As a precaution, let's have you do this:
    Please also download MBRCheck to your desktop

    * Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    * It will show a Black screen with some information that will contain either the below line if no problem is found:

    • Done! Press ENTER to exit...
    * Or you will see more information like below if a problem is found:

    • Found non-standard or infected MBR.

    • Enter 'Y' and hit ENTER for more options, or 'N' to exit:
    * Either way, just choose to exit the program at this point since we want to see only the scan results to begin with.
    * MBRCheck will create a log named similar to MBRCheck_07.16.10_00.32.33.txt which is random based on date and time.
    * Attach this log to your next message.


    Now run MGtools per the below instructions and attach the requested MGlogs.zip file

    * Using MGtools
     
  9. cividan

    cividan Private E-2

    I was not able to run defogger, it always say that it need to be run as an administrator even if I right click run as admin on it. I deleted the user profile containing the daemon tools file. here are the new log files.
    I will not be able to reply over the week-end as this computer is isolated from the corporate network and I will be on vacation for the next week. I will check back your reply from when I get back in the office.
    Thanks again for all your help !
     

    Attached Files:

  10. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Let's redo this:

    * Please download TDSSKiller to your Desktop
    * Extract its contents to your Desktop so that you have TDSSKiller.exe directly on your Desktop and not in any subfolder of the Desktop.
    * Click Start > Run and copy/paste the following bold command into Run box and hit Enter.

    "%userprofile%\Desktop\TDSSKiller.exe" -v

    * Follow the instructions to type in "delete" when it asks you what to do when if finds something.
    * When done, a log file should be created on your C: drive named something like TDSSKiller.2.1.1_27.12.2009_14.17.04_log.txt which is based on the program version # and date and time run. Please attach this log to your next reply.
     
  11. cividan

    cividan Private E-2

    I did not had to type delete, nothing was found...
    here is the log file
     

    Attached Files:

  12. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    The MBRCheck shows that you are good to go. I am just guessing that something is left over from Dameon tools that is still giving a false positive. What issues are you still having?
     
  13. cividan

    cividan Private E-2

    I was not seeing any behavior but my ip had been blacklisted again so I was wondering if the problem may have jumped out to another computer...
     
  14. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    How many computers are you running? Are they all going though a router? You may need to post the full logs for each system in their own threads.

    Did your ISP cut off your service?
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds