Virtumonde??? - help!

Discussion in 'Malware Help (A Specialist Will Reply)' started by BearCreekZeke, Apr 13, 2009.

  1. BearCreekZeke

    BearCreekZeke Private E-2

    I have had an extremely malevolent virus/malware wreak havoc on my network (three desktops attached to a netgear dsl router. I have already done two full restores, but am still trying to save the third machine. Four days (and about forty hours later) and I am still no further than where I started.

    The problem is blocking almost everything. I was able to fire up Spyware Doctor, but its efforts to fix the problems just seem to make the malware more angry.

    I tried to follow the Windows XP cleaning directions and got as far as running CCleaner (only after I copied from disc to the c:drive and ran it from there) on all user accounts.

    Very difficult to even get mbam, SuperAntiSpyware and MGTools to even open up, let alone run. They are all being blocked. For instance, I get MGTools to open up in a black box (like a dos command box?) and it closed up/disappers within a second or two. MBAM won't even open (tried renaming, which at least got it to my c:drive, but won't run). SuperAntiSpyware won't run, even on alternate start. Tried the "gpedit.msc" workaround, but computer states that it isn't installed.

    I would just save my data to an external hard drive and restore, but it won't recognize anything I connect. For whatever reason, it will let me write my data to my cd writer, but this is very slow, and only 650 mb at a time.

    I have disconnected this computer from my network/internet, because I suspect that whatever it was/is spread and that is how all three got infected in the first place.

    Any help would be greatly appreciated! :cry
    I feel like I am about to lose my mind.

    p.s. - I am running Windows XP SP3.
     
    Last edited: Apr 13, 2009
  2. BearCreekZeke

    BearCreekZeke Private E-2

    Also, I tried to use the "Botts"? method to clean this machine but could not get Process Explorer to run. When I tried to open it would flash the "start" screen and then disappear.

    Also, a couple of unknown processes can be seen in task manager: "nozfx768x.exe" and "397270126.exe".

    I have run several full scans with Spyware Doctor in normal mode and safe mode and safe mode w/networking, all to no avail. 100+ infections were found, with numerous processes, but no improvement after reboot. Also, was able to run MBAM in conjunction with Spyware Doctor on one machine, but that didn't seem to help either.

    Thanks in advance for any advice.
     
  3. BearCreekZeke

    BearCreekZeke Private E-2

    Sorry, not trying to bump this thread, just adding additional information after another couple hours battling this thing.

    I was finally able to get SAS installed. At approximately 1:00 into the scan, I get a blue screen error: PAGE_FAULT_IN-NONPAGED_AREA. This thing is really diabolical. I restarted and tried again three times, all with the same result.

    I am unable to get MBAM to even open.

    ComboFix opens in a black screen for a second or two. Occasionally I would get an error message that the Administrator has not granted permission to edit the registry. I am logged in as admin and can open regedit.exe just fine from the run box. I googled this problem and tried to manually edit the registry permissions. No luck, I still can't get ComboFix to stay open.

    Everytime I restart the machine I get an error: "cli.exe - application error. The application failed to initialize properly 0xc0000076" Also, my "documents" folder opens up, along with IE.

    I'm not sure this is helpful, but it's all I have at this point.

    Thanks again for any help.
     
  4. BearCreekZeke

    BearCreekZeke Private E-2

    Sorry, don't mean to bump. I know I am only delaying things, but I thought it would be helpful to post the logs I was able to obtain.

    After a little sleep and thinking a bit more clearly, I was able to get SAS to run in safe mode and not blue screen crash. I was also able to run Malware Bytes and ComboFix. Combofix, however, crashed writing the log, so there is no log. I am attaching the logs I was able to obtain. My system is still very slow, but it seems as though the steps taken have helped somewhat.

    Thank you for your patience.
     

    Attached Files:

  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!


    Please copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work. But continue on with the below no matter what.

    Also did you fix what was found by MBAM. You log shows you took no action. Just as a matter of precaution and also because the malware could have spread more by now, run SUPERAntiSpyware again and fix what it finds. REBOOT immediately after running this.

    Then run Malwarebytes again (make sure you update first) and fix what it finds before saving a log. Then also immediately reboot but boot into safe mode for the below.

    Your MGtools log is very incomplete. Please try running MGtools in safe boot mode. Make sure you click twice on the Accept button to accept the license agreement for TrendMicro HijackThis. Also watch for error messages like those mentioned on the Using MGtools instructions page. I betting you may not be noticing that you are getting Error Message Type 1 and should just run the fix for this anyway.

    Now you can reboot normally and come back and attach these three new logs.
     
    Last edited: Apr 19, 2009
  6. BearCreekZeke

    BearCreekZeke Private E-2

    Thank you so much for the reply.

    I did successfully add to the registry, as instructed.

    I did run SAS and reboot. Log attached.

    I did run MBAM and did fix infections found (or at least I thought I did--I clicked on fix errors, or whatever, and the process was completed). Log Attached.

    I also ran MGTools, and the log is attached.

    Unfortunately, after running SAS and MBAM, I have lost all internet connectivity.

    This happened to me earlier, but I was able to go into Firefox and change the network connectivity settings to auto-detect proxy settings, which re-enabled by connectivity. I suspect the hijacker had changed the settings to manual proxy configuration, HTTP Proxy: localhost Port 7171, No Proxy for: localhost, 127.0.0.1. I have no idea what the manual proxy configuration was, or how it was changed from auto-detect, but I sure didn't do it. At the same time I was experiencing this problem, I also could not turn off the firewall in Windows Security Center, which I suspect had been blocking my network connectivity. The turn off firewall option was greyed out.

    Now my Windows Security Center is showing both firewall and anti-virus as unmonitored, with the error message "windows cannot start the windows firewall/internet connection sharing service". I am unable to start the ICS using the prompts and I have no idea how to start this manually. Still no connectivity after reboot.

    I hope I have followed all steps properly as instructed. Thank you again for your willingness to help.
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay, now that your MGlogs.zip file is a full complete log, I can see the reason for your problems including connection problems. You did not have your PC properly protected and as a result, your Windows Operating system files have become infected and there is no known reliable fix for this. In addition there are many many other infected files. We could spend a lot of time trying to remove this infection but odds are that it will not work because the nature of the infection has so many executable system files infected that as soon as we fix one file, other files that are infected will almost immediately or upon the next reboot, just reinfect the files. In addition, your PC would still basically be unreliable/untrustworthy even if we manage to fix the infected files that we can see since there could be many more that we are not seeing.

    The safest thing for you to do is backup your personal data immediately since your PC could possible become unbootable at any point in time. Do not back up any executable files. This includes programs that you have downloaded since any of them could be infected.

    Once you backup, you need to delete all partitions, repartition, format partitions and reinstall Windows.
     
  8. BearCreekZeke

    BearCreekZeke Private E-2

    Thank you again for your help. I was afraid this is what you would recommend.

    My question at this point is how did I carry out your recommendations?

    I have already done system recovery on two of my three computers, and the viruses/malware are seeming to come back. I have taken a couple of programs I use off of one of my infected computers, copied them to a usb hard drive, and re-installed on recovered systems after running complete scans of the usb hard drive with SAS, Spyware Doctor, Norton, and Malware Bytes. I am not sure if this is what is causing me problems, or not. I do not have install disks for some of these programs, which were purchased online, downloaded and installed. I no longer have the download (zip) files.

    Also, I am not sure what you mean when you say I need to "delete all partitions, repartition, format partitions and reinstall Windows".

    What I have been doing is inserting the system recovery disks in my DVD drive and doing a system recovery from them. Is this not sufficient. Could you give step by step instructions as to deleting the partitions, etc.?

    Is it time for me to call in an IT person? Will they know exactly what to do?

    Thank you again for your help and advice.
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    As I stated in my previous message, any executable files could be infected and cannot be trusted. Do not reinstall from backups like this. After you reinstall your OS and before installing any other programs, make sure things look ok. Then install your protection software from clean new downloads that were downloaded on an uninfected system or from original CDs from the manufacturer. If you made your own backup CDs, they could be infected.

    You will have to work this out in the Software Forum or search the internet as we do not have time to guide you thru this in the Malware Forum. I'm sorry but we are just way to busy fighting malware.

    That is not what I would suggest due to the nature of the infection. I still suggest deleting partitions. However if you do this and are immediately reinfected after the recovery and before reinstalling any of your other non-Windows software backups, then obviously the recovery is infeffective. If you are clean until you reinstall your backups, then your backups are the problem.

    Depends on who you call. ;)
     
  10. BearCreekZeke

    BearCreekZeke Private E-2

    Thank you, Thank you, Thank you for all your help.

    I can't tell you how appreciative I am just knowing that there are people out there such as yourselves who are willing to help other people in need.

    Although I hope and pray that I am at the tail end of this almost two-week nightmare that has frozen me and my business in my tracks (knock on wood), I don't think I could have gotten through with my sanity intact without at least the hope that someone out there was willing to help.

    At times I felt as if I were going insane, running full scan after full scan after full scan of every conceivable anti-virus program, hour after hour after hour, only to have the malware come back again and again and again.

    I went through numerous complete system recoveries only to become reinfected over and over again.

    Your advice to delete all partitions and not install any executable files from the infected computers was good, as far as I can tell, so far so good, anyway. I am painstakingly trying to restore my systems piecemeal from uninfected backups/drives here and there.

    A couple days ago someone put me in touch with the network security guy at our local community college and he advised that there is some really nasty stuff out there right now that even Microsoft and the big security firms can't defeat. My computers were being reinfected just by inserting an infected thumb drive and doing nothing! The autorun would kick on as soon as the drive was inserted and start injecting worms and dropping payloads (not sure about the lingo) and all hell would break lose. Hours and hours of restoration work completely wiped out in a brief second of irreparable harm. The network security guy told me not to feel too bad, even people who do computer security for a living cannot defeat this malware (he specifically referenced the new Conflicker worm, even though I don't believe that is what I had, but who knows?). This did give me comfort, knowing I was not alone--the only insane idiot on the planet dealing with this mess. He indicated that thousands of people (or perhaps millions) were suffering the same fate.

    I continue to ponder why people would perpetrate such evil? Is it the security software people brewing this stuff up for job security? (Like the firemen in so many movies who turn out to be the arsonists--no offense meant to any of you fine firemen out there--thank you for your service).

    I could understand if there was ransom involved, like the Somali pirates. Believe me, if someone called me and demanded ransom to release me from this plague I would have gladly paid it.

    My computers were rendered totally inoperable. What use could they have been to the perpetrators?

    Are any of these people prosecuted? Is it even a crime to manufacture malware and infect millions of computers?

    I am convinced we need a little justice here. If there is no deterrence, these criminals will propagate just like their devilish diabolical creations.

    If anyone knows where these people live, I would be interested in going to pay them a visit, perhaps with my trusty Sig 5.56, perhaps loaded with some 75 grain hollow points manufactured in Serbia, which is probably pretty close to their home turf. I am hoping the US military gets serious with these people. Maybe Delta force can pay them a visit. We are talking about cyber-terrorism here, as far as I am concerned. But I digress.

    Thank you again for your help and for offering hope to the afflicted. Without hope, we surely all would be lost.
     
  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.

    Yes he was thinking of Conficker but it is no big deal to remove if you know what you are doing. We have fixed hundreds of these. Obviously when we have to guide someone on how to do it, it is more complex, but when I have access to a PC infected with Conficker, it only takes me about 20 minutes to remove the infection and most of the time is due to the reboots needed.

    No you did not have Conficker. You had loads of other malware and one of them which is the real reason you need to reboot is a Virut like infection that has all of your executable files infected. All of the other infections (like Vundo, SpamTool,...etc) that you see in the logs, are problems but they are not the reason for needing reinstalls.

    The problem with inserting USB drives and getting infected can be control by following the below sticky thread procedure:

    Disabling AutoRuns

    Also using this Flash Disinfector is quite handy and helps prevent infections in cases where an already infected flash drive is plugged into a system


    Several million people have had Conficker, but you are not one of them. At least not on this PC. ;)

    Some people just like to be destructive and some are trying to steal information.

    Very unlikely because the penalty if they were discovered doing this would be incredible.

    Rarely and it is only when it is and infection that is extremely widespread and news worthy which has cause significant financial losses. Many of the people writing this junk are not in the USA and our laws do not apply. There are actually thought to be gangs of different people in different locations developing much of these infections.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds