Welcome Guest ( Log In | Register )

18 Pages « < 2 3 4 5 6 > » Bottom

Outline · [ Standard ] · Linear+

Virus/Malware Virus /Rootkits Thread, Work In Progress

views
     
super macgyver
post Dec 27 2008, 04:41 PM

★~13k Spam Club~★
********
All Stars
19,323 posts

Joined: Jan 2003



QUOTE(saintangelius @ Dec 26 2008, 02:55 AM)
Greetings and Happy Holidays!

I come baring a not so delightful little 'gift'

At the end of last week I notice something strange with my desktop and my laptop. A series of scans showed me that I have been infected by a virus called Trojan Horse Crypt.AYG. I tried many means possible. Even took my lappy over to my IT guy in the office and the 2 of us couldn't crack it at all. Here is a summary of what I've done so far.

1. unplugged desktop from internet to stop it from further infestation. Since the lappy was newer and had less important stuff on it, I kinda used it to search around the net for solutions but to no avail.

2. I took the comps off the router and went direct dial but internet would cut itself off every 20 minutes because the dialer would have hung.
Noted an extra svchost.exe process running with massive mem usage. java.exe also takes more mem than usual. The only way to get back online was the restart the comp. It seems that if I'm on the LAN there is no problems with the connection but when I do direct dial it happens. At times FF3 would even autoshutdown.

3. AVG 8 picks up the virus, says it healed it/dumped it in the vault but then it pops up all over again. I have...
a) cleaning the vaults
b) manually deleting the folders/files and emptying the recycle bin each time. They come out in these:

C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5

C:\Documents and Settings\LocalService\Network Settings\Temporary Internet Files\Content.IE5

folders inside them would be in random 8 letter alpha numeric names( e.g. TwEot5FY) and the files in them would be 4 letter 1 number in bracket jpegs(e.g.rspw[1].jpg).

After healing/vaulting, a popup appears 10 minutes later with the same infection but a slightly dissimilar file name.
4. Tried the following without much luck:
a) AVG 8
b) hijack this (nothing unusual showed up)
c) system restore (no difference)
d)Panda online scan (wants me to pay to disinfect)
e)Tea Timer spybot search and destroy (couldn't find it)
f)Geekz Virus remover (couldn't even run the program for some strange reason says it's a runtime error)
g)a number of other BIOS and windows based ones my IT just has on his super secret weapon CD virus annihilator! (couldn't find it-it hides too well)

5. In my frustration I deleted all the contents of the C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5 above (specifically the desktop.ini and index.dat) and it seems to have stopped popping up on AVG now whenever I run a scan.

I'm not sure if what I did was right or wrong. I feel like I've just kinda put a lid on it but haven't cleared it out entirely. Please correct me if I'm wrong. My main desktop is still in suspended animation. I fear turning it on. Because it has less ram and processing power than my lappy, explorer.exe hangs every time the dialer dies.

This is a pretty obscure version of the crypt virus. I haven't been able to find one similar to it on google or trendmicro. Can it possibly be a dialer virus? I'm at my wits end trying to understand this one.
*
Did u ever tried to scan it during safe mode?
i think ur avg couldnt lean it properly becoz it was already loaded during windows startup.
*-a|i3n-*
post Dec 29 2008, 12:51 PM

I'm who i'm
****
Senior Member
681 posts

Joined: Nov 2006
From: Lowyat.net Malacca Status: Ultra Active



Topic starter can add Smart Virus Remover on it. it's just a small antivirus...but it can restore window defults...like cant view folder option...run...all and etc etc
Shafique
post Dec 30 2008, 01:43 PM

Casual
***
Junior Member
381 posts

Joined: Feb 2006
From: Somewhere Over The Rainbow



i check my autorun file in my usb drive and i found this:

CODE
[autorun]
open=RECYCLER\S-1-5-21-1482476501-1644491937-682003330-1013\e32.exe
icon=%SystemRoot%\system32\SHELL32.dll,4
action=Open folder to view files
shell\open=Open
shell\open\command=RECYCLER\S-1-5-21-1482476501-1644491937-682003330-1013\e32.exe
shell\open\default=1


How cani fix this? Everytime i plug in the usb drive the auto run refer to "Program". I left click and explore and find this file. I format it twice.. same problem happen.


Added on December 30, 2008, 1:57 pmUpdate: problem solved using Smart Virus Remover smile.gif

This post has been edited by Shafique: Dec 30 2008, 01:57 PM
mynewuser
post Jan 6 2009, 10:02 PM

Look at all my stars!!
*******
Senior Member
2,549 posts

Joined: Dec 2004
From: Sungai Petani, Kedah


QUOTE(saintangelius @ Dec 26 2008, 02:55 AM)
Greetings and Happy Holidays!

I come baring a not so delightful little 'gift'

At the end of last week I notice something strange with my desktop and my laptop. A series of scans showed me that I have been infected by a virus called Trojan Horse Crypt.AYG. I tried many means possible. Even took my lappy over to my IT guy in the office and the 2 of us couldn't crack it at all. Here is a summary of what I've done so far.

1. unplugged desktop from internet to stop it from further infestation. Since the lappy was newer and had less important stuff on it, I kinda used it to search around the net for solutions but to no avail.

2. I took the comps off the router and went direct dial but internet would cut itself off every 20 minutes because the dialer would have hung.
Noted an extra svchost.exe process running with massive mem usage. java.exe also takes more mem than usual. The only way to get back online was the restart the comp. It seems that if I'm on the LAN there is no problems with the connection but when I do direct dial it happens. At times FF3 would even autoshutdown.

3. AVG 8 picks up the virus, says it healed it/dumped it in the vault but then it pops up all over again. I have...
a) cleaning the vaults
b) manually deleting the folders/files and emptying the recycle bin each time. They come out in these:

C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5

C:\Documents and Settings\LocalService\Network Settings\Temporary Internet Files\Content.IE5

folders inside them would be in random 8 letter alpha numeric names( e.g. TwEot5FY) and the files in them would be 4 letter 1 number in bracket jpegs(e.g.rspw[1].jpg).

After healing/vaulting, a popup appears 10 minutes later with the same infection but a slightly dissimilar file name.
4. Tried the following without much luck:
a) AVG 8
b) hijack this (nothing unusual showed up)
c) system restore (no difference)
d)Panda online scan (wants me to pay to disinfect)
e)Tea Timer spybot search and destroy (couldn't find it)
f)Geekz Virus remover (couldn't even run the program for some strange reason says it's a runtime error)
g)a number of other BIOS and windows based ones my IT just has on his super secret weapon CD virus annihilator! (couldn't find it-it hides too well)

5. In my frustration I deleted all the contents of the C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5 above (specifically the desktop.ini and index.dat) and it seems to have stopped popping up on AVG now whenever I run a scan.

I'm not sure if what I did was right or wrong. I feel like I've just kinda put a lid on it but haven't cleared it out entirely. Please correct me if I'm wrong. My main desktop is still in suspended animation. I fear turning it on. Because it has less ram and processing power than my lappy, explorer.exe hangs every time the dialer dies.

This is a pretty obscure version of the crypt virus. I haven't been able to find one similar to it on google or trendmicro. Can it possibly be a dialer virus? I'm at my wits end trying to understand this one.
*
This a bit similar to what my company currently facing. Even we had install with antivirus software, it also cannot stop this virus from spread to others.

Worm:W32/Downadup.AL => http://www.f-secure.com/v-descs/worm_w32_downadup_al.shtml

am3433
post Jan 12 2009, 12:52 PM

New Member
*
Newbie
1 posts

Joined: Jan 2009
thank
zaff1984
post Jan 14 2009, 04:22 PM

Getting Started
**
Junior Member
187 posts

Joined: Jul 2006


Hi, my pc infected by Win32.Worm.Downadup.Gen detected by Bitdefender, its ruining my network software. and my AV still cannot clean them.
gyver
post Jan 14 2009, 04:29 PM

Regular
******
Senior Member
1,067 posts

Joined: Mar 2005
Don't use AVG. It's crap! A lot of virus such as the one spread by usb stick or thumbdrive cannot be clean. Do yourself a favor and buy Kaspersky (KIS 2009) license.

This post has been edited by gyver: Jan 14 2009, 04:30 PM
Shinnen
post Jan 21 2009, 01:41 PM

Getting Started
**
Junior Member
84 posts

Joined: Jun 2006
Got this article from my IT regional department.

http://www.computerworld.com/action/articl...&intsrc=kc_feat

FAQ: How to protect your PC against the Downadup worm
Biggest worm in years hits millions of PCs, but you can fend off attack
Gregg Keizer
January 20, 2009 (Computerworld) Security experts say it's the biggest worm attack in years, call it "amazing" and report that it infected nearly 9 million PCs in just two weeks.

Downadup is downright nasty. And that's even before it does much more than just spread.

But as analysts argue about how the compromised computers will be used -- to build a massive botnet, perhaps -- or how much information hackers will steal from infected machines, users like you have a more immediate concern: "How do I keep my PC from joining the ranks of the hacked?"

That's a simple question. Unfortunately, because of this worm's flexibility, the answers aren't.

What's the worm again? Thanks to the lack of an industry-wide labeling system, the worm goes by more than one name. Some companies dub it "Downadup," others call it "Conficker."

No matter the name, it's the same threat.

When did Downadup first appear? Security companies warned of the worm in late November 2008; Symantec Corp. was one of the first to sound the alarm when it raised its ThreatCon security alert level on Nov. 21. Within a week, Microsoft Corp. had added its voice to the chorus as it acknowledged a significant uptick in attacks.

However, the worm only really took off about a week ago as newer variations struck users and resulted in millions of infections.

How does it spread? One of Downadup's most intriguing aspects, say security researchers, is its multipronged attack strategy: It can spread three different ways.

The one that's gotten the most attention exploits a vulnerability in Windows that Microsoft patched nearly four months ago. The bug, which is in a file-sharing service that's included in all versions of the operating system, can be exploited remotely just by sending a malformed data packet to an unpatched PC.

But the worm can also spread by brute-force password attacks, and by copying itself to any removable USB-based devices such as flash drives and cameras. More on those two in a moment.

What machines are most vulnerable to Downadup attack? According to Microsoft, unpatched Windows 2000, Windows XP and Windows Server 2003 machines are at the greatest risk to exploits of the bug patched in October. That gibes with reports from security companies, which have highlighted the danger to PCs running Windows XP Service Pack 2 and XP SP3. Not coincidentally, those versions account for the bulk of Windows' market share.

Unpatched Windows Vista and Server 2008 systems, meanwhile, are less likely to fall victim to attack, since hackers must have authenticated access to the computer, or in other words, know the log-in username and password.

Any Windows-powered machines, however, can be compromised by the worm's password and USB attack strategies.

I'm running Windows 7 beta... am I safe? According to the Microsoft support document that details the October patch, yes you are.

Microsoft offered the fix as a security patch to users of the Windows 7 "pre-beta," the version it gave developers in late October and early November. It then integrated the patch into Windows 7 before it launched the public beta on Jan. 10.

OK, so how do I protect my PC? Because this thing is a triple threat, you'll need to take more than one defensive measure.

First of all, if you haven't already done so, apply the October fix that Microsoft tagged as MS08-067. If you have Windows Update set to automatically download and install patches, you should be protected, but it never hurts to double-check. You can verify that the patch has been installed by bringing up Windows Update, then clicking "Review your update history" and looking for a security update labeled as "KB958644."

If you are only now installing the patch, you might want to take Microsoft's advice and also download and install the January edition of its free Malicious Software Removal Tool (MSRT), which was updated last week so that it can detect, and then delete, Downadup infections.

What's this about password attacks? Although most of the news about Downadup's spread has focused on its exploitation of a patched bug in Windows, the worm also propagates by trying to guess other machines' administrative passwords.

Once the worm penetrates a corporate network -- perhaps by infecting a single unpatched machine, say a laptop, that is later connected to that network -- it tries to break into other PCs, including those that have been patched with the October emergency fix.

"One of the ways in which the Conficker worm (also known as Confick or Downadup) uses to spread is to try and batter its way into ADMIN$ shares using a long list of different passwords," said Graham Cluley, a senior technology consultant at Sophos, in an entry to a company blog last Friday. Cluley included the list of passwords that Downadup tries, which range from the ubiquitous password and the moronic secure to the slightly-more-clever letmein and nimda, or admin spelled backward.

Cluley urged users to steer clear of what he called "poorly-chosen passwords," while other security companies recommended that users not only pick stronger passwords but change them periodically as well.

Obviously, if you're using a password that's on the Downadup list, you should change it immediately.

And the worm can spread from flash drives, too? Yes.

From the moment Downadup infects a PC, it copies a file, named "autorun.inf" to the root of any USB storage devices, typically flash drives, that are connected to the compromised computer. That file name takes advantage of Windows' Autorun and Autoplay features to copy the worm to any machine that a flash drive, camera or other USB device is plugged into. Downadup will infect that PC when the drive or device is connected, or when the user double-clicks the device's icon within Windows Explorer or from the desktop.

Security experts have recommended that users disable both Autorun and Autoplay in Windows.

A December blog post by Symantec researcher Ben Nahorney spells out how to disable Autoplay, while a separate post on the Hackology blog outlines how to turn off Autorun by editing the registry.

What are the signs that my PC has been hit? Microsoft's advisory about Downadup lists several symptoms of infection, including these:


Account lockout policies are being tripped (because your password's been hijacked, and changed, by the attacker).
Automatic Updates are disabled (because Downadup tries to keep the PC unpatched by turning off Windows Update's automatic update, as well as Background Intelligent Transfer Service (BITS), the Windows component used by Windows Update to actually deliver the updates).
Various security-related Web sites cannot be accessed (because Downadup blocks access to a whole host of security companies' sites in an effort to prevent antivirus software from being updated, which could result in the worm's detection and eradication).
If your PC is exhibiting any of these symptoms -- or the others that Microsoft spells out here -- the company recommends that you immediately use the MSRT to clean the machine.

You can download the MSRT from Microsoft's site, or follow these instructions, posted at its support site, that walk administrators through the steps to deploy the tool in enterprise environments.

This post has been edited by Shinnen: Jan 21 2009, 01:43 PM
O-haiyo
post Jan 25 2009, 08:40 PM

Enthusiast
*****
Senior Member
857 posts

Joined: Jan 2005
From: Mlk, Klang


QUOTE(mynewuser @ Jan 6 2009, 10:02 PM)
This a bit similar to what my company currently facing. Even we had install with antivirus software, it also cannot stop this virus from spread to others.

Worm:W32/Downadup.AL => http://www.f-secure.com/v-descs/worm_w32_downadup_al.shtml
*
I think the file is corrupted. Can't open. sad.gif
felnarix
post Feb 1 2009, 11:15 PM

Casual
***
Junior Member
455 posts

Joined: Jan 2009
From: Ladies Room, KL



I just wondering if BitDefender really is the best anti virus ever..?
I googled it and the software list as the top antivirus remover.
I used it once. Kinda heavy and laggy
lasthopez
post Feb 3 2009, 06:02 PM

New Member
*
Newbie
2 posts

Joined: Feb 2009
Try this few anti virus scanner maybe it can help you solve your problems...

Unemployed Software


Just try to help smile.gif
toothfairy
post Feb 3 2009, 08:38 PM

New Member
*
Newbie
3 posts

Joined: Aug 2008
just want to share

i using clamwin portable av and a-square free ver to remove virus/spyware/etc..(both are standalone)
update it..
run the clamwin to remove the virus in ram(make sure change the setting to move to quarantine)
run the a-square..
remover the pest...
put both them in pendrive(format it)...

setel..

tx_2642
post Feb 13 2009, 01:15 AM

New Member
*
Junior Member
7 posts

Joined: Sep 2008
lately i always found virus with name.. sality.. can anybody help me..
felnarix
post Mar 2 2009, 11:54 PM

Casual
***
Junior Member
455 posts

Joined: Jan 2009
From: Ladies Room, KL



Sality is a low risk virus

Sality
fenzodahl512
post Mar 3 2009, 08:19 AM


Group Icon
Elite
1,089 posts

Joined: Jun 2008
Hello.. Sality is a polymorphic virus that infects Win32 PE executable files, or in other words, infects each .exe and .scr files..

If your computer has Sality on it, I recommend you to go to any Malware Removal forum for further assistance.. The list can be found in website below..

http://www.uniteagainstmalware.com/schools.php

http://asap.maddoktor2.com/

To be honest, the most efficient way to combat Sality is just to do a full-reformat to your computer.. If you choose to reformat the computer, please don't forget to backup all of your data first.. Do NOT include any .exe and .scr files.. Meaning that do not include any screensaver, installer, applications in your backup.. You risk infecting other computers as well..
shahlanibrahim
post Mar 11 2009, 08:41 PM

New Member
*
Junior Member
37 posts

Joined: Jan 2009


W32.Downadup/conficker prevention


Disable Autorun on ALL drives
- using tweak ui
http://www.pcdoctor-guide.com/wordpress/?page_id=1546
- using registry editor and gpedit.msc
http://antivirus.about.com/od/securitytips/ht/autorun.htm

(prevent most virus/worm/trojan that propogated through USB drives)

Disable System Restore

Disable hidden administrative share
http://www.petri.co.il/disable_administrative_shares.htm

Install Microsoft Patch MS08-067,
http://www.microsoft.com/technet/security/...n/MS08-067.mspx

Have w32.downadup remover handy
- http://www.symantec.com/security_response/...-011316-0247-99

Use strong password with all windows accounts

Read this thread, Virus Removal steps

Read Microsoft conficker guide

Fast detection of w32.downadup / conficker
1. Open Windows Explorer
2. Right click at any folder, click search
3. With normal uninfected system the folder you choose will appear in 'Look in:' , but with infected system, there will be nothing.



Anybody else have some more ideas?

This post has been edited by shahlanibrahim: Mar 11 2009, 10:38 PM
kekacang
post Mar 25 2009, 05:46 PM

Getting Started
**
Junior Member
175 posts

Joined: May 2008
Now i have this problem.

user posted image

damn that ACL.
i need to delete "$Secure" in ntfs partition.
is there is other solution?

This post has been edited by kekacang: Mar 25 2009, 05:47 PM
nicholas88
post Apr 4 2009, 07:50 AM

Enthusiast
*****
Senior Member
872 posts

Joined: Mar 2008
Does AVG really useful ?
bulkbiz
post Apr 29 2009, 11:22 AM

Be Wise
******
Senior Member
1,203 posts

Joined: Dec 2007
From: Bumi Kenyalang, Kuala Lumpur



QUOTE(nicholas88 @ Apr 4 2009, 07:50 AM)
Does AVG really useful ?
*
Try Node32 or kapersky, I have bad experience with AVG and I will never use it anymore.
dopeycheese
post Apr 30 2009, 01:00 AM

Getting Started
**
Junior Member
90 posts

Joined: Mar 2009


not sure if its been posted, but i have this "system.exe" which they say is a spyware

so i tried:
1-scanning using adware = failed(dling bitdefender now)
2-tried the solution frm majorgeeks by using killbox - failed
3-booting safe mode and killing the process then del the file in system32 = failed
4-Did step (2) in safe mode = failed
5-Tried Unlocker in safe mode = failed
6-AVG = failed

any more suggestions? cry.gif

maybe i should try spybot? kapersky? is the free version enough?


*update* = ahh nvm solved it with spybot S&D

This post has been edited by dopeycheese: May 2 2009, 01:24 PM


Attached thumbnail(s)
Attached Image

18 Pages « < 2 3 4 5 6 > » Top
 

Change to:
| Lo-Fi Version
0.0302sec    0.36    6 queries    GZIP Disabled
Time is now: 11th December 2025 - 06:27 PM