Stubborn Trojan found by SAS

Discussion in 'Malware Help (A Specialist Will Reply)' started by gvfbgvfb, Apr 8, 2012.

  1. gvfbgvfb

    gvfbgvfb Private E-2

    Hi, I have an XP machine running Comodo, Spyware Blaster and Super Anti-Spyware but still a nasty has crept through and refuses to die despite running the whole README. All help gratefully accepted.

    SAS finds and temporarily removes, hence the first SAS log doesn't have the Trojan having run SAS before starting the README but it was back by the time I scanned again after completing.

    Thanks


    John
     

    Attached Files:

  2. gvfbgvfb

    gvfbgvfb Private E-2

    Second SAS log and MG Tools log. MG Tools came up with "access denied" several times. When it asked me to edit the "hosts" file I did but didn't find the offending lines.

    Thanks


    John
     

    Attached Files:

  3. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Not finding much in your logs. It is a very bad idea to allow all users to have Admin. privileges!!

    Now download The Avenger by Swandog46 to your Desktop.

    See the download links under this icon http://forums.majorgeeks.com/chaslang/images/MGDownloadLoc.gif
    Extract avenger.exe from the Zip file and save it to your desktop.

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):


    1. Run avenger.exe by double-clicking on it.
    2. Click OK at the warning to continue to use The Avenger
    3. Do not change any of the check box options!
    4. Shut down your protection software now to avoid possible conflicts.
    5. Copy everything in the Quote box below, and paste it into the Input script here: part of The Avenger
    6. Now click the http://img33.imageshack.us/img33/9159/executeavenger.jpg button
    7. Click Yes to the prompt to confirm you want to execute.
    8. Click Yes to the Reboot now? question that will appear when The Avenger finishes running.
    9. Your PC should reboot, if not, reboot it yourself.
    10. A log file from The Avenger will be produced at C:\avenger.txt and it will pop-up for you to view when you login after reboot.
    11. Attach this log to your next message. (See: HOW TO: Attach Items To Your Post )


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below log:

    • C:\MGlogs.zip

    Make sure you tell me how things are working now!
     
  4. gvfbgvfb

    gvfbgvfb Private E-2

    Hi Tim, many thanks for the quick response. I have passworded my account and taken admin privileges from all other users, some will be cross but it's a price worth paying.

    Avenger ran as described. MG Tools ran better, no "access is denied" observed.
    Logs attached.

    The computer seems okay but I will check and then, if it's okay, complete the README close out.

    Thanks again.

    John
     
  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You didn't attach anything. But do let me know how things are running.
     
  6. gvfbgvfb

    gvfbgvfb Private E-2

    Hi Tim, here are the logs I meant to attach! Plus one from Malwarebytes that my wife ran in the mean time when a warning came up.

    Given what Malwarebytes found I wonder if I ned to run more scans though the computer seems to be running okay.

    Thanks

    John
     

    Attached Files:

  7. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You're welcome. I suggest that you keep MBAM updated and run scans on occasion as needed. Your logs are clean.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.We recommend them for doing backup scans when you suspect a malware infection.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:


    Malware removal from a National Chain = $149
    Malware removal from MajorGeeks = $0
     
  8. gvfbgvfb

    gvfbgvfb Private E-2

    Hi, what look like the same Malware items keep coming back, attached is the latest SAS log. What else should I do?

    Thanks


    John
     

    Attached Files:

  9. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    If you have become re-infected, please re-do the Read and Run First instructions.
     
  10. gvfbgvfb

    gvfbgvfb Private E-2

    Hi, so I re-read and re-ran the ReadMe First. The PC works okay but Super Anti-Spyware keeps finding a Trojan and a few other less scary things. Any suggestions as to getting rid?

    Everything looked to run okay, though I had to run RootRepeal separately for the C and L (Back-Up) drives. On the L drive it identified an MBR RootKit.

    All logs collected:
    - SAS that alerted me to problem on 27th but which refuses to Upload
    Attached
    - SAS on 28th but found nothing
    - Malaware
    - ComboFix
    - RootRepeal C Only


    Many thanks


    John
     

    Attached Files:

  11. gvfbgvfb

    gvfbgvfb Private E-2

    The other logs:
     

    Attached Files:

  12. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    SAS must be doing its job as I am not finding any malware in your logs. Do you know what this is:
    C:\WINDOWS\T7B85WMJ3TDXH1RB
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds