Trogan Agent U

Discussion in 'Malware Help (A Specialist Will Reply)' started by rb3bm4, Nov 28, 2010.

  1. rb3bm4

    rb3bm4 Private E-2

    I using a Dell desktop with Windows 7 professional 64 bit. Have McAfee Security Center installed. Computer has four accounts, one admin and three standard. Yesterday I was looking for a post-Thanksgiving turkey recipe. By mistake I clicked on a video for the recipe, not the recipe itself. The video was not from the creator (FoodNetwork) either. Right away a Security Tools scan popped up. Couldn't close it so shut down the compute and the connection was blocked with the firewall. Ran a full Malwarebytes scan and it identified the Trojan Agent U trojan in a registry key and a file. Firefox seems to have slowed down a bit and am starting to get random popups. Went through the "read & run me first malware removal guide". Ran SuperAntiSpyware, Malwarebytes, and MgTools. Re-ran Malwarebytes full scan on all four accounts and it still shows up in one of the standard accounts. Am wondering how to proceed.
    Thanks, RB
     
  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Welcome to Major Geeks!

    Please read ALL of this message including the notes before doing anything.

    Pleases follow the instructions in the below link:

    READ & RUN ME FIRST. Malware Removal Guide


    and attach the requested logs when you finish these instructions.
    • **** If something does not run, write down the info to explain to us later but keep on going. ****
    • Do not assume that because one step does not work that they all will not. MGtools will frequently run even when all other tools will not.

    • After completing the READ & RUN ME and attaching your logs, make sure that you tell us what problems still remain ( if any still do )!
    Helpful Notes:

    1. If you run into problems trying to run the READ & RUN ME or any of the scans in normal boot mode, you can run the steps in safe boot mode but make sure you tell us what you did later when you post logs. See the below if you do not know how to boot in safe mode:
    2. If you have problems downloading on the problem PC, download the tools and the manual updates for SUPERAntiSpyware and Malwarebytes ( links are given in the READ & RUN ME) onto another PC and then burn to a CD. Then copy them to the problem PC. You will have to skip getting updates if (and only if) your internet connection does not work. Yes you could use a flash drive too but flash drives are writeable and infections can spread to them.
    3. If you cannot seem to login to an infected user account, try using a different user account (if you have one) in either normal or safe boot mode and running only SUPERAntiSpyware and Malwarebytes while logged into this other user account. Then reboot and see if you can log into the problem user account. If you can then run SUPERAntiSpyware, Malwarebytes, ComboFix and MGtools on the infected account as requested in the instructions.
    4. To avoid additional delay in getting a response, it is strongly advised that after completing the READ & RUN ME you also read this sticky:
    Any additional post is a bump which will add more delay. Once you attach the logs, your thread will be in the work queue and as stated our system works the oldest threads FIRST.
     
  3. rb3bm4

    rb3bm4 Private E-2

    Attached are the SuperAntiSpyware, Malwarebytes, and MGTools logs.
    RB
     

    Attached Files:

  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Which account? You should run MBAM and SAS scans on the account in question (If you have not done so already and show me the logs) Also you will need to run C:\MGTools.exe on this account and attach the resultant C:\MGlogs.zip.

    Use windows explorer to delete these files:

    • C:\Users\Robert\AppData\Local\Config_946EE51E.dat
    • C:\Users\Robert\AppData\Local\Index_946EE51E.dat
      [*]
    Now this folder seems normal

    C:\Users\Robert\AppData\Local\DataSafeOnline

    But what can you tell me about these as they are strangely named folders?

    C:\Users\Robert\AppData\Local\DataSafeOnlinee
    C:\Users\Robert\AppData\Local\DataSafeOnlinelinelinetaSafeOnlinefeOnlinefeOnline
    C:\Users\Robert\AppData\Local\DataSafeOnlinetaSafeOnlinefeOnlinefeOnline
    C:\Users\Robert\AppData\Local\DataSafeOnlinetaSafeOnlinelinetaSafeOnlinefeOnlinefeOnline
    C:\Users\Robert\AppData\Local\DataSafeOnline????????????????????????C???????????????????
    C:\Users\Robert\AppData\Local\DataSafeOnline????????????????????C???????????????????????
    C:\Users\Robert\AppData\Local\DataSafeOnline????????????????????????????????????????????

    Give this a run and REBOOT the machine afterwards.

    Go to TDSSKiller and Download TDSSKiller.zip to your Desktop

    • Extract its contents to your Desktop so that you have TDSSKiller.exe directly on your Desktop and not in any subfolder of the Desktop.
    • Now double click the TDSSkiller.exe file to run it ( if using Vista or Windows 7 do not double click on it but rather, right click and select Run As Administrartor.
    • Allow the application to run and a window will open showing that it is TDSSkiller from Kaspersky
    • Click Start scan
    • It will run rather quickly and will notify you of whether anything is found or not.
    • Follow the instructions to delete/quarantine if asks you what to do when if finds something.
    Whether an infection is found or not, a log file should be created on your C: drive ( or whatever drive you boot from) in the root folder named something like TDSSKiller.2.1.1_27.12.2009_14.17.04_log.txt which is based on the program version # and date and time run. Please attach this log to your next reply. (See: HOW TO: Attach Items To Your Post )
     
  5. rb3bm4

    rb3bm4 Private E-2

    On the account with the trojan:
    > MBAM, SAS, and MGlogs.zip logs attached. MBAM run as full scan not quick one. Quick one will not detect trojan but full does. When I ran MG, two things. Forgot to disable UAC and got an error message that SteelWerXWhoAmI was closing
    > Two files deleted.
    > Not exactly sure what the strangely names folders are. I suspect their related to Dell backup program which Dell prompts me to sign up for.
    > I assume give this a run and reboot refers to TDSSKiller.
    > TDSSKiller, downloaded, run and log attached.
    RB
     

    Attached Files:

  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    It shows no action taken, did you indeed fix what it found after you attached the log?? Do another full scan and then attach the log. Tell me what problems remain.
     
  7. rb3bm4

    rb3bm4 Private E-2

    In the affected account:
    > Ran MBAM
    > Took action: MBAM deletes registry key. Reboot and problem file is deleted
    > Ran MBAM again.
    Something interesting is happening though. If I look at the log in MBAM, it shows action is taken. If I then save the log, the saved file is different showing no action was taken. So I opened the log in MBAM and rather than saving it I selected all and then cut/pasted into notepad. If you go the cut/paste route, the log in MBAM and saved one is the same. So the first two attachments are the before/after logs saving out of MBAM (different from logs in MBAM). The second two attachments are the cut/paste route of before/after logs (same as log in MBAM). Is the the trojan messing with MBAM? Bottom line seems to be MBAM can detect the trojan but it can't kill it.
    RB
     

    Attached Files:

  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.

    Code:
    :reg
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
    "msusomazizufe"=-
    
    :files
    C:\Users\PJN\AppData\Local\usadukeqoda.dll
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into notepad, save it as something appropriate and attach it into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.

    Re-run Malware Bytes and see if it finds anything now.
     
  9. rb3bm4

    rb3bm4 Private E-2

    Downloaded and ran OTM. However, was not able to cut/paste results before OTM prompted me to reboot which I did. Found log file though. Re-ran MBAM. Both logs attached. Looks like the file got killed by the registry value remains.
    RB
     

    Attached Files:

  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.

    Re-run MBAM. STill there or not?
     
  11. rb3bm4

    rb3bm4 Private E-2

    Created the fixME.reg file and it merged successfully. Re-ran MBAM and the log is clean. The registry key is gone. Log attached. Success???
     

    Attached Files:

  12. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Yes, looks like all is well again. :)

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  13. rb3bm4

    rb3bm4 Private E-2

    At the outset, thanks for all your time and expertise. MG is a great resource. An update:
    1. Trojan: As I said in earlier post, no signs of trojan agent u, neither registry value nor file, in problem account. Ran MBAM scans in other three accounts. No problem in two of the three. In the third account which is admin it flagged trojan hiloti. It referred to the file in the account where the trojan agent u was. Removed it, rebooted, and ran second MBAN scan and it was clean. Still concerned the trojan is lurking and slithering. What's the best way to monitor this?
    2. Mystery files: Two desktop.ini files showed up on both the first account and the second one. (Two files from second account attached. They wouldn't upload directly. Had to cut/paste into new files)
    3. Migration: Am concerned about the migration of the trojan. When this episode started backed up all the files to an external hard drive. Could it be infected? This machine is connected to a router for a wireless network to which three laptops are connected. Could the trojan move via the router to these machines? Checked one of the three with MBAM and so far it's clean.
    4. Clean Up and Prevention: Thanks for the info in your post.
    Best, RB
     

    Attached Files:

    • di1.txt
      File size:
      174 bytes
      Views:
      1
    • di2.txt
      File size:
      282 bytes
      Views:
      1
  14. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Keep Malware Bytes and SUPERantispyware installed and scan regularly on all accounts.
    • Open Folder Options by clicking the Start button
    • Select Control Panel
    • Clicking Appearance and Personalization
    • And then click Folder Options.
    • Click the View tab.
    • Under Advanced settings, click Show hidden files and folders, and then click OK.

    Are the desktop.ini files still showing now?

    You could run scans with Malware Bytes and SUPERantispyware with your external hard drive plugged in, which will be scanned if you run a FULL scan.

    Yes run MBAM and SAS on the other accounts too, see if anything crops up.
     
  15. rb3bm4

    rb3bm4 Private E-2

    Two desktop.ini files are still showing on the desktop in both accounts, the one that had the trojan agent u and the admin account.
    RB
     
  16. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I think I know how to resolve that but I am just going to check first with Chaslang.
     
  17. rb3bm4

    rb3bm4 Private E-2

    Never mind. Unchecked the show hidden files in control panel and the two desktop.ini's are gone. Things seem to be stable with both the SAS and MBAM scans. I'm going back to do the clean up per your previous post. Thanks again for all your help.
    RB
     
  18. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Oh good! You are welcome for the help, no problem. :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds