Trojan Dialer.28.A & Dialer.CID

Discussion in 'Malware Help (A Specialist Will Reply)' started by woolieback, Oct 6, 2006.

  1. woolieback

    woolieback Private E-2

    Hi, the above 2 trojans have appeared in the last couple of days and keep getting picked up by my AVG AntiVirus and I have been quaranteening them, but not deleting them The DIALER.CID throws random file names and appears in my Windows/temp dir and the DIALER.28.A again throws random files names and appears in my temporary internet files directory. Also when I first load up IE and visit the first website I go to I get the following pop-up
    http://www.imageviper.com/displayimage/57085/0/spware_warning.jpg I have not clicked anything on it, just closed it down with Red X

    I have downloaded several programs, updated them and scanned and found various objects which have been deleted (SPYBOT SEARCH & DESTROY, AVG ANTI-SPYWARE, AD-ADWARE SE, XOFTSPY & CWS SHREDDER). I feel like I am wasting my time.

    I have downloaded the latest HJT version and my latest log is attached.

    Could someone please help if you can before I open up my hard drive and get the nasties personally!
     

    Attached Files:

  2. woolieback

    woolieback Private E-2

    I forgot to add that if I delete the trojans from AVG Virus Vault they just keep coming back.:mad:
     
  3. DavidGP

    DavidGP MajorGeeks Forum Administrator - Grand Pooh-Bah Staff Member

    Welcome to Majorgeeks!

    Please follow our standard cleaning procedures which are necessary for us to provide you support. Also there are steps included for installing, running, and posting HijackThis logs as attachments.
    • Run ALL the steps in this Sticky thread READ & RUN ME FIRST Before Asking for Support
    • Make sure you check version numbers and get all updates.
    • Very Important: Make sure you tell us the results from running the tutorial...was anything found? Were you unable to complete any of the scans?...Were you unable to download any of the tools?...Did you do the on-line scans as suggested? etc.
    • After doing ALL of the above you still have a problem make sure you have booted to normal mode and run the steps in the below link to properly use HijackThis and attach a log:
    Downloading, Installing, and Running HijackThis

    Make sure you also rename HijackThis.exe as suggested in the procedures. Use analyse.exe for the new name. This is very important due to some new infections going around.


    • When you return to make your next post, make sure you attach the following logs and that you have run these scans in the following order too:
      • CounterSpy - ONLY IF you were not able to run Windows Defender
      • Bitdefender - from step 6
      • Panda Scan - from step 6
      • runkeys.txt - the log from GetRunKey.bat
      • newfiles.txt - the log from ShowNew.bat
      • HijackThis
    NOTE: You can only attach 3 files in a single message so it will require that you use two messages to attach all of these logs!
     
  4. woolieback

    woolieback Private E-2

    Hi, I have completed all the steps as laid down in the READ & RUN ME FIRST Before Asking for Support section. Everything downloaded, installed exactly per your lists.

    It seems the DIALER.28.A & DIALER.CID have dissapeared as AVG has not picked them up now. The image I sent in my first post when you first go on to IE has also gone. But I am not sure if there is anything else, so I am attaching all the logs in the READ & RUN ME FIRST Before Asking for Support section just in case.

    In the meantime I will continue to monitor for anything unusual.
     

    Attached Files:

  5. woolieback

    woolieback Private E-2

    Here are the other 3 files

    Regards,

    Stuart.............//
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Your Windows OS & IE Versions are way out of date and represent a major security risk. After we remove your malware, you must correct this situation. I will give you steps to do this.

    Uninstall the below old versions of software:
    J2SE Runtime Environment 5.0 Update 6
    Mozilla Firefox (1.0)

    Now install the current version of Sun Java from: Sun Java Runtime Environment

    Then install the current version of FireFox from: Mozilla Firefox

    Did you knowingly install and do you use Kontiki Delivery Management System? It is not malware but many times people do not know it is there and always running and often they do not use it. Read more about it here:

    http://www.bleepingcomputer.com/startups/KHost.exe-2404.html

    Start by downloading two tools we will need- Pocket KillBox

    Extract it to its own folder somewhere that you will be able to locate it later.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = local.,
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
    O4 - HKLM\..\Run: [wtlttwj.dll] C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\wtlttwj.dll,veaxuf
    O20 - Winlogon Notify: winykm32 - winykm32.dll (file missing)

    After clicking Fix, exit HJT.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

    c:\windows\help\SPAlert.chm
    C:\WINDOWS\system32\bwltkve.dll
    C:\WINDOWS\system32\jpxhtmvi.dll
    C:\WINDOWS\system32\wtlttwj.dll
    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.
    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But please let me know if you receive this message!).
    If Killbox does not reboot just reboot your PC yourself.
    After reboot locate the below folder and delete it if found:
    C:\Program Files\Common Files\{208D4EB9-0881-2057-0516-03031008002c}

    Also delete all files in the below folders except ones from the current date (Windows will not let you delete the files from the current day).
    C:\WINDOWS\Temp
    C:\Documents and Settings\Stuart Wolstenholme\Local Settings\Temp

    Now attach a the below new logs and tell me how the above steps went.
    1. GetRunKey
    2. ShowNew
    3. HJT

    Make sure you tell me how things are working now!

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  7. woolieback

    woolieback Private E-2

    Hi Chaslang,

    In my last post I reported the image in my first post as gone. It did return this morning and was present when I was reading your post.

    I have uninstalled my versions of Java & Mozilla and re-installed ther versions with no problems - all working.

    I do not use the Kontiki system and had never heard of it until you mentioned it in your post.

    Everything else went as per your post, there were no warning messages in the use of Killbox and after the Killbox reboot I found the Common Files folder 208D4EB9-0881 bla bla deleted it and all the other files you mentioned in the temp dirs. Cleaned from Recycle bin also.

    The antispyware img in my first post has not yet popped up and would have done by now, I have jumped to several websites and back with no re-occurrence (pesky thing).

    Once we have the machine clean I will upgrade to SP2 - or what do you suggest? Is it worth trying IE7 yet or is that still BETA.

    I attach the logs as requested.

    Regards,

    Stuart.....
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    The fixme.reg patch to the registry did not work as required. It is possible some tools blocked it. Uninstall CounterSpy and then reboot. After reboot, shutdown AVG AntiSpyware and then reapply the fixme.reg patch. Tell me if you receive a success message.

    Then run HijackThis and fix the below line:
    O4 - HKCU\..\Run: [kdx] C:\WINDOWS\kdx\KHost.exe -all

    Now reboot and delete the below folder after reboot:
    C:\WINDOWS\kdx


    Then attach a new log from GetRunKey and a new log from HJT.
     
  9. woolieback

    woolieback Private E-2

    Hi Chaslang,

    All done, and the fixme.reg replied SUCCESS

    Logs as requested attached.

    Regards,

    Stuart.....//
     

    Attached Files:

  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That's better!

    Your log is clean. If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    3. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and enable System Restore to create a new clean Restore Point.
    4. After doing the above, you should work thru the below link (make sure you get your Windows updates):
     
  11. woolieback

    woolieback Private E-2

    Hi Chaslang,

    Thank you very much for all your help - I really had thought I would be re-formatting my hard drive and starting from scratch - you have saved me a couple of days work - where do I go to make a voluntary paypal contribution. Regards, Stuart.....//
     
  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf Safely!

    PM me with an email address and I will give you PayPal info if you like.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds