wow account re-hacked, need help

Discussion in 'Malware Help (A Specialist Will Reply)' started by lstevens, Dec 14, 2010.

  1. lstevens

    lstevens Private E-2

    wow account was hacked this morning, went through account recovery on another computer, while running several scans on this one, found a few java viruses, cleaned them, combofix found and removed something, everything else came back clean. thought we were ok, even tried to add the 'dial in' authenticator to the account, and it said everything went fine, and then around midnight the account started logging in on it's own, went to stop it, and found out that they had changed the email address, after the 'dial in' authenticator was added. one, or both machines have a major security issue, and I really need some help here... I've spent the entire day on this BS only to have it start up again

    I'm including the combofix log, SuperAntiSpyware log, and the Avira log, and going to bed before I hurt myself, this is insane

    someone please help
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    If you have run the full procedures:

    READ & RUN ME FIRST. Malware Removal Guide Then you will see that you should have also attached logs from Malware Bytes, RootRepeal, and MGTools. Your version of SUPERantisptware is out of date so the below will need to be done.

    Important Notice: A new version of SUPERAntiSpyware is available.
    • Please uninstall your current version (this is necessary).
    • Then download this SUPERAntiSpyware
    • Install this new version. It may tell you that you need to reboot to complete the installation. You must reboot at this time.
    • After the reboot, run SUPERAntiSpyware and immediately click the Check for Updates button to get more updates for the database.
    • Now run a new full scan of your system. And attach this log later.

    You should also take a look at this:

    WoW Account Hacked?
     
  3. lstevens

    lstevens Private E-2

    Didn't post Malwarebytes log because it didn't find anything, ran it again anyway will post it now. Was really tired last night, sorry for not posting an MGtools log, I didn't have the time/patience to download and run another test at that time. Updated superantispyware, submitting new logs

    for some reason superantispyware log isn't uploading, maybe too many attachments? will try a second reply
     

    Attached Files:

  4. lstevens

    lstevens Private E-2

    Not sure what's up with the superantispyware log, but here it is:

    SUPERAntiSpyware Scan Log
    http://www.superantispyware.com

    Generated 12/14/2010 at 09:48 AM

    Application Version : 4.46.1000

    Core Rules Database Version : 5999
    Trace Rules Database Version: 3811

    Scan type : Quick Scan
    Total Scan Time : 00:14:13

    Memory items scanned : 648
    Memory threats detected : 0
    Registry items scanned : 2344
    Registry threats detected : 0
    File items scanned : 10258
    File threats detected : 0
     
  5. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Ask Toolbar <--- Uninstall this crap.
    McAfee Security Scan Plus <--- Uninstall this as you already have avira.
    WinSCP 4.2.7 <--- Uninstall this if you did not purposefully install it yourself.

    If you did not deliberately set this proxy yourself then please include it in the HJT fix below:
    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    After clicking Fix exit HJT.

    Use windows explorer to delete these files:

    Please go to virustotal and upload the following files for analysis, and let me know the results.
    • c:\windows\system32\SIntfNT.dll
    • c:\windows\system32\SIntf32.dll
    • c:\windows\system32\SIntf16.dll

    Go to TDSSKiller and Download TDSSKiller.zip to your Desktop

    • Extract its contents to your Desktop so that you have TDSSKiller.exe directly on your Desktop and not in any subfolder of the Desktop.
    • Now double click the TDSSkiller.exe file to run it ( if using Vista or Windows 7 do not double click on it but rather, right click and select Run As Administrartor.
    • Allow the application to run and a window will open showing that it is TDSSkiller from Kaspersky
    • Click Start scan
    • It will run rather quickly and will notify you of whether anything is found or not.
    • Follow the instructions to delete/quarantine if asks you what to do when if finds something.
    Whether an infection is found or not, a log file should be created on your C: drive ( or whatever drive you boot from) in the root folder named something like TDSSKiller.2.1.1_27.12.2009_14.17.04_log.txt which is based on the program version # and date and time run. Please attach this log to your next reply. (See: HOW TO: Attach Items To Your Post )

    Please also download MBRCheck to your desktop

    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some data on it
    • Right click on the screen and select > Select All
    • Press Control+C
    • Open a notepad and press Control+V
    • now please ATTACH that report to this thread

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.
     
  6. lstevens

    lstevens Private E-2

    Wow, where to start... ok

    Ask toolbar failed to uninstal using add remove programs

    McAfee removed

    We didn't install any proxy servers that I am aware of, that has been removed via add remove programs, all associated files should have also been removed... I hope.

    HJT fix run.

    C:\Documents and Settings\Compaq_Administrator\Templates\362110726
    C:\Documents and Settings\Compaq_Administrator\Templates\5mQ6cU6r72D8X
    deleted

    all three files submitted to virustotal came back with basically the same result:

    File already submitted: The file sent has already been analysed by VirusTotal in the past. This is same basic info regarding the sample itself and its last analysis:

    MD5: 9a7a95e48e629a075c6d883d0ee524c8
    Date first seen: 2006-11-30 05:54:22 (UTC)
    Date last seen: 2010-11-25 22:10:52 (UTC)
    Detection ratio: 0/42


    I did a reanalyze on one file, and nothing different came up, their system seems to be under heavy use atm, so I didn't reanalyze the other two, I assume that if the checksums match it's virtually impossible that the files have been altered since the previous times they were analyzed.

    TDSSKiller log should be attached

    MBR check detected a problem, but you didn't suggest how to respond, so it's still open and waiting, was tempted to attempt to fix the mbr but am just so glad to have assistance I'm willing to wait for further instructions :)

    getlogs.bat ran, new log attached, thank you very much for all the help
     

    Attached Files:

  7. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Do you have your XP CD? If so, follow these instructions:

    You will need to boot to the Recovery Console to remove this infection.

    Now boot to the Recovery Console and run the fixmbr to clear a Master Boot Record infection that you have.

    You can read the below to help you do this:

    http://support.microsoft.com/kb/307654


    Then boot back into normal mode.

    Now re-run MBRCheck and attach the log.
     
  8. lstevens

    lstevens Private E-2

    new mbrcheck

    MBRCheck, version 1.2.3
    (c) 2010, AD

    Command-line:
    Windows Version: Windows XP Professional
    Windows Information: Service Pack 3 (build 2600)
    Logical Drives Mask: 0x0000003c

    \\.\C: --> \\.\PhysicalDrive0 at offset 0x00000000`00007e00 (NTFS)
    \\.\D: --> \\.\PhysicalDrive0 at offset 0x00000072`53508000 (FAT32)

    Size Device Name MBR Status
    --------------------------------------------
    465 GB \\.\PhysicalDrive0 Windows XP MBR code detected
    SHA1: DA38B874B7713D1B51CBC449F4EF809B0DEC644A


    Done!
    Press ENTER to exit...
     
  9. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Good!! What issues are you still having, if any?
     
  10. lstevens

    lstevens Private E-2

    I'm not sure, other than the system being perhaps a bit sluggish, the only symptoms we had were when the battle.net account was hacked and started logging on wow when we weren't using it. If there are any more checks we can do to be sure it's clean I'd like to be as sure as possible before having blizzard restore the account.. again.
     
  11. lstevens

    lstevens Private E-2

    oh and advice on removing ask.com toolbar would be appreciated as well
     
  12. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Your logs are clean. Did you follow the instructions in the link that Kestel gave you for Wow Account Hacked?

    See if you can remove Ask Toolbar through CCLeaner.
     
  13. lstevens

    lstevens Private E-2

    Well, I was still working on step one, securing the computer and email, lthe email password was changed from another computer which I believe to be clean, looking over what we removed, is it likely that those things are what compromised the account, or do I need to look further? If the problem was this computer and its now clean, then I can continue, if it's unlikely the problem was caused by what we removed from this machine then I will have to investigate the other machine further.

    let me know if that was too confusing a question :)
     
  14. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    It was not an attack directed at your computer as far as I can tell. Having a Wow account hacked is usually an attack on that web site. You were not very infected, other than the MBR infection.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.We recommend them for doing backup scans when you suspect a malware infection.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:




    Help Support MajorGeeks
    Buy Discounted Software @ Majorgeeks Store. Giveaways Too!

    Majorgeeks Geek Wear. Hats, T-Shirts, Hoodies

    MajorGeeks on FaceBook
     
  15. lstevens

    lstevens Private E-2

    well the proxy server seemed rather suspicious to me, and considering they were able to re-hack the account within a matter of 2-3 hours from the time it was reenabled made me nervous about trying again.
     
  16. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    We are finding the majority of infections we deal with include a proxy server reset. I just suggest that you follow the instructions for making a very strong password on both the WOW account and your email account. Keep your AV and AS software updated and use SAS and MBAM frequently to ensure that your system stays clean.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds