Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
TwoKnives
Dec 25, 2004

Horrible, horrible shoes!
Did you ever want to know what a botnet looks like from space?

http://www.f-secure.com/weblog/archives/00002428.html

Adbot
ADBOT LOVES YOU

pixaal
Jan 8, 2004

All ice cream is now for all beings, no matter how many legs.


TwoKnives posted:

Did you ever want to know what a botnet looks like from space?

http://www.f-secure.com/weblog/archives/00002428.html

While this image is great it looks like it was taken in google earth, do you happen to have the file? I'd love to zoom around and check the population of local towns infected (I know this is just one of many botnets but still would be fun).

TwoKnives
Dec 25, 2004

Horrible, horrible shoes!
Unfortunately, I don't. It may be added later in an update. I found an interactive map of the ZeuS trojan, but it's not as interesting since it was nowhere near as prolific.

http://www.f-secure.com/weblog/archives/00002424.html

Hex Darkstar
May 28, 2004

I think I need another liver transplant.
https://www.damballa.com/press/2012_09_17bPR.php
http://threatpost.com/en_us/blogs/new-iteration-tdsstdl-4-botnet-uses-domain-fluxing-avoid-detection-091712

TDL back from the dead with new toys?

IE Zero Day is out in the wild being exploited at the moment too! Should make for some interesting times ahead.

Farecoal
Oct 15, 2011

There he go
I disabled my Java v6 in Chrome, am I protected from this Zero-day thing?

mindphlux
Jan 8, 2004

by R. Guyovich

Revitalized posted:

I am indeed using Firefox, and I tried the GooRedFix. It was done in a second but I still seem to get redirected on first click. I just decided to google "What exactly does Combofix do?" and the first link was to a forum post. Clicking on it redirected me to a Norton Security advertisement page, but I went back and clicked the link again and it took me through to the forum post.

I have combofix from when I was dealing with the Siefer previously, but it sounds a bit extreme, and also takes forever without moving, so I have no idea if my combofix died in the process or something. I guess I can just combofix before I go to sleep or something.

so, I've been having this happen on my personal machine, which is embarrassing considering I fix computers for a living. can't seem to get the bugger. done gooredfix, combofix, tdss, gmer scan, checked stuff with hijackthis, and no dice.

did you ever end up figuring this one out?

Independence
Jul 12, 2006

The Wriggler

mindphlux posted:

so, I've been having this happen on my personal machine, which is embarrassing considering I fix computers for a living. can't seem to get the bugger. done gooredfix, combofix, tdss, gmer scan, checked stuff with hijackthis, and no dice.

did you ever end up figuring this one out?

Windows offline defender fixed it for me. Had to do a full scan but it worked.

Hex Darkstar
May 28, 2004

I think I need another liver transplant.
Worth a shot but give RogueKiller a run and see if it detects anything on your machine http://www.sur-la-toile.com/RogueKiller/ the site is all in french but the application will run in english. It has been useful in the past for diagnosing various crapware that other applications couldn't find.

e: if it is SST or a bootkit based on Alureon I used Windows Offline Defender against it and it rendered the machine I was fixing unbootable I had to use bootrec to fix things.

pixaal
Jan 8, 2004

All ice cream is now for all beings, no matter how many legs.


mindphlux posted:

so, I've been having this happen on my personal machine, which is embarrassing considering I fix computers for a living. can't seem to get the bugger. done gooredfix, combofix, tdss, gmer scan, checked stuff with hijackthis, and no dice.

did you ever end up figuring this one out?

Do these redirects happen on other machines on the network? It could be the DNS given by your router. Some viruses will attempt to attack the router and change the DNS to a hackers, and they could hijack whatever links they want with it.

Basically it might not be you, but someone else on your network and you are chasing the wrong target. Virus makers are clever bastards.

co199
Oct 28, 2009

I AM A LOUSY FUCKING COMPUTER JANITOR WHO DOES NOT KNOW ANYTHING ABOUT CYBER COMPUTER HACKER SHIT.

PLEASE DO NOT LISTEN TO MY FUCKING AWFUL OPINIONS AS I HAVE NO FUCKING IDEA WHAT I AM TALKING ABOUT.
Less of a traditional virus, but this came out of the Pwn2Own contest today:

http://www.networkworld.com/news/2012/091912-galaxy-s3-hacked-via-nfc-262590.html?source=nww_rss

NFC exploit on an S3 allows root access on the phone with no user interation.

Scaramouche
Mar 26, 2001

SPACE FACE! SPACE FACE!

All you Oracle admins might want to check this one out:
http://techcrunch.com/2012/09/20/authentication-flaw-allows-hackers-to-easily-crack-oracle-database/

It is a Big Deal.

Boing!
May 23, 2012
Weird....my machine was working fine for a while (tdsskiller found nothing, MSE seemed to agree, but just now I went to watch a video and not only did the video driver crash but it then told me no boot object was found and to install an operating system--so I turned it off and turned it back on, and it seems okay now. Anyone ever encounter this or know what exactly was the gently caress?

omeg
Sep 3, 2012

When it comes to manual removal of Bad Stuff I didn't see one useful technique mentioned in this thread (or just missed it). Let's say you browse through processes with Process Explorer and you identify some rogue ones (or just injected threads). You kill one only to see it being resurrected by another one.

What you can do is to suspend bad threads one by one. You're not killing them so most "safeguards" will not raise alarm, but the malware will be effectively non-functioning. After everything suspicious is sent to bed you can safely kill/remove it most of the time.

Khablam
Mar 29, 2012

omeg posted:

When it comes to manual removal of Bad Stuff I didn't see one useful technique mentioned in this thread (or just missed it). Let's say you browse through processes with Process Explorer and you identify some rogue ones (or just injected threads). You kill one only to see it being resurrected by another one.

What you can do is to suspend bad threads one by one. You're not killing them so most "safeguards" will not raise alarm, but the malware will be effectively non-functioning. After everything suspicious is sent to bed you can safely kill/remove it most of the time.
This is made redundant by safemode, though. Anything that still loads up in safemode is going to take more than ending processes and threads to remove.

Glans Dillzig
Nov 23, 2011

:justpost::justpost::justpost::justpost::justpost::justpost::justpost::justpost:

knickerbocker expert
Huh, wonder what's going on. We gotten no less than 4 separate detections this morning for "LooksLike.HTML.Blacole.a (v)". Anyone else been seeing this pop up recently?

Hex Darkstar
May 28, 2004

I think I need another liver transplant.
Guessing that would be the IE zero day that was going around that Microsoft patched. Blackhole probably incorporated it into their attack platform.

Khablam
Mar 29, 2012

Walter_Sobchak posted:

Huh, wonder what's going on. We gotten no less than 4 separate detections this morning for "LooksLike.HTML.Blacole.a (v)". Anyone else been seeing this pop up recently?
This seems to be a heuristic hit from VIPRE which is pretty false-positive happy. VirusTotal a sample and get a wider picture.

slightpirate
Dec 26, 2006
i am the dance commander
weeeeeeee User sent in a machine loaded with the 'FBI ransomeware' variant that accuses them of downloading child porn and music and whatnot and demands they go to walmart/cvs/walgreens/k-mart to get a MoneyPak worth $200 to get the FBI to release the machine, or you can put in your credit card information right from that interface! How convenient! I admire the thought put into this one though.

I've got it running the MS Defender-Offline boot disc, we'll see how well that works.

Hex Darkstar
May 28, 2004

I think I need another liver transplant.
If it doesn't remove/detect it boot up into Safe mode and go to Start Button=>All Programs =>Startup and look for "ctfmon" (not related to the real ctfmon) right click the shortcut and check the properties that'll point you to the exe or dll file it is running.

For all the work he put into making the window look presentable the actual malware itself is lazy. Although that could just be the author realizing that if someone doesn't pony up the cash they're probably taking the machine to a shop/relative/friend to have it fixed so it isn't worth trying to protect their malware with elaborate setups or all that other junk. Just some quick cash.

Khablam
Mar 29, 2012

slightpirate posted:

weeeeeeee User sent in a machine loaded with the 'FBI ransomeware' variant that accuses them of downloading child porn and music and whatnot and demands they go to walmart/cvs/walgreens/k-mart to get a MoneyPak worth $200 to get the FBI to release the machine, or you can put in your credit card information right from that interface! How convenient! I admire the thought put into this one though.

I've got it running the MS Defender-Offline boot disc, we'll see how well that works.

The variants I have seen of this in the UK (looks different, same thing) simply disappear after a reboot, leaving behind a couple of files that don't seem to be properly linked to run at startup. If you get major issues, there's probably something else alongside it.

Farecoal
Oct 15, 2011

There he go
Is a MalwareByte/Essentials combination good enough for anti-virus protection?

tjl
Aug 6, 2005

Farecoal posted:

Is a MalwareByte/Essentials combination good enough for anti-virus protection?
About as good as it gets for $0.00, and arguably better than paid alternatives too. I would add staying current with updates to the combination as well.

NecessaryEvil
Aug 10, 2006
Professional Slacker
Throw in a sprinkle of SuperAntiSpyware and maybe a dash of SpywareBlaster.

SAS and MBAM are reactionary programs.

SB basically just blocks known bad sites in hosts file...I don't know if I still use it out of habit, or if it's doing me much good ever since I switched to browsers that have proper ad blockers...but it doesn't hurt.

Khablam
Mar 29, 2012

NecessaryEvil posted:

Throw in a sprinkle of SuperAntiSpyware and maybe a dash of SpywareBlaster.

SAS and MBAM are reactionary programs.

SB basically just blocks known bad sites in hosts file...I don't know if I still use it out of habit, or if it's doing me much good ever since I switched to browsers that have proper ad blockers...but it doesn't hurt.

At which point your machine will be at 75% of it's actual performance or so. Multiple programs with an active resident is just not good. MSE is already an anti-virus/spyware/malware program so just stacking that isn't helpful.

No-script will keep you safe from 99% of web-based threats, and sandboxing your browser will take that to 99.999999% (there is no known attack vector yet) - neither of which impact system performance.

Neither is a good choice for a computer novice, but if you know what you're doing (to some level) simply preventing the intrusion / preventing it from leaving the browser is the best way to go.

Sit behind a NAT-router, install MSE and consider it an on-demand scanner for things you're not sure about (USB sticks, etc) and sandbox your browser. You'll never encounter anything that will affect your system.

You'll also enjoy much better performance as you won't have multiple residents bogging you down, and multiple services updating their engines every few minutes.

E:
vvvvvv I slightly misread and thought you were suggesting the non-free versions.

Khablam fucked around with this message at 15:43 on Oct 14, 2012

NecessaryEvil
Aug 10, 2006
Professional Slacker

Khablam posted:

At which point your machine will be at 75% of it's actual performance or so. Multiple programs with an active resident is just not good...You'll also enjoy much better performance as you won't have multiple residents bogging you down, and multiple services updating their engines every few minutes.

Which is good advice, other than the fact that the free versions of MalwareBytes AntiMalware, SuperAntiSpyware, and SpywareBlaster aren't active residents. They're normally run manually. You tell it when to update, you tell it when to scan. And when you're closed out of them, they're not doing anything to bog the computer down. If they were automated like MSE, I'd agree.

skipdogg
Nov 29, 2004
Resident SRT-4 Expert

slightpirate posted:

weeeeeeee User sent in a machine loaded with the 'FBI ransomeware' variant that accuses them of downloading child porn and music and whatnot and demands they go to walmart/cvs/walgreens/k-mart to get a MoneyPak worth $200 to get the FBI to release the machine, or you can put in your credit card information right from that interface! How convenient! I admire the thought put into this one though.

I've got it running the MS Defender-Offline boot disc, we'll see how well that works.

ugh, a guy just showed up with one of these and he actually sent them 200 bucks

Khablam
Mar 29, 2012

skipdogg posted:

ugh, a guy just showed up with one of these and he actually sent them 200 bucks
In fairness, some variants do actually encrypt your documents - if said user had no backup for some reason*, there's data that's worth $200 for a slim chance of recovery, to some people. This is why this particular threat model is being repeated.

*the reason isn't always retardation

NecessaryEvil
Aug 10, 2006
Professional Slacker
Virus:Win32/Xpaj.gen!F can kiss my rear end.

It got past MSE, Combofix, TDSSkiller, Windows Defender Offline, MBAM, SuperAntiSpyware.

Hours put into scanning this, and now hours into backing stuff up and rebuilding the machines that are infected. It's been a long long time since I've run into anything this malicious.

Tapedump
Aug 31, 2007
College Slice
Isn't that like a year old, or am I off-base here?

What kind of system, AV, and environment? All your scans were done against the hard drive slaved to another system, right (with the exception of those than cannot do so, i.e.; ComboFix)?

Hex Darkstar
May 28, 2004

I think I need another liver transplant.
Tried out Kaspersky's utility "XpajKiller"? (I'm not sure if it'll work but they have a killer devoted to it so I would hope it does since their Zbot one is a miracle worker.)

mindphlux
Jan 8, 2004

by R. Guyovich
This dumb google redirect thing on my laptop has gotten past every scanner I've thrown at it, and I can't track it down with like hijackthis or anything, though I see symptoms of it in my registry.

anyone run into a really hard to find redirect recently?

Hex Darkstar
May 28, 2004

I think I need another liver transplant.
If possible can you provide examples/screenshots what you're seeing in the registry? Also if you haven't already try giving that rogue killer application I recommended above a run.

NecessaryEvil
Aug 10, 2006
Professional Slacker

Tapedump posted:

Isn't that like a year old, or am I off-base here?

What kind of system, AV, and environment? All your scans were done against the hard drive slaved to another system, right (with the exception of those than cannot do so, i.e.; ComboFix)?


That's kind of what I thought as well...but I've also never run into that one before.

Yes. Scan were done both on the system, outside of the Windows environment. Only thing that I didn't do was the slaving, simply because at that point they'd been unable to work for almost a day due to the scans running, and it was decided to just blow it away, especially since it took out 1/3 of the company during their crunch time.


Hex Darkstar posted:

Tried out Kaspersky's utility "XpajKiller"? (I'm not sure if it'll work but they have a killer devoted to it so I would hope it does since their Zbot one is a miracle worker.)

Downloaded. Hopefully if it pops up again that will do something.

NecessaryEvil fucked around with this message at 01:55 on Oct 18, 2012

Tapedump
Aug 31, 2007
College Slice

mindphlux posted:

This dumb google redirect thing on my laptop has gotten past every scanner I've thrown at it, and I can't track it down with like hijackthis or anything, though I see symptoms of it in my registry.

anyone run into a really hard to find redirect recently?
Don't suppose Disk Management shows an extra 10MB or so partition hanging off the end of your hard drive? Even if not, check using gparted/linux live cd. Try TDSSKiller, too.

Khablam
Mar 29, 2012

NecessaryEvil posted:

That's kind of what I thought as well...but I've also never run into that one before.

Yes. Scan were done both on the system, outside of the Windows environment. Only thing that I didn't do was the slaving, simply because at that point they'd been unable to work for almost a day due to the scans running, and it was decided to just blow it away, especially since it took out 1/3 of the company during their crunch time.

Your company's IT structure needs a heavy handed professional look. A year old virus should not take out 1/3 of one system, let alone your entire workstation count. Especially when any combination of machine firewalls, an enterprise level AV or even just security updates would have prevented this.

Unless you were just using weird plurals and superlatives to describe a single computer :confused:

What's confusing me is that removal of this particular virus is not at all complicated; when you say it is malicious, are you meaning it is reappearing or you are simply failing to find anything and think you're still infected?

It sounds more likely you have contracted a much newer rootkit which has pulled down the virus you're discussing as an additional payload.

mindphlux
Jan 8, 2004

by R. Guyovich

Hex Darkstar posted:

If possible can you provide examples/screenshots what you're seeing in the registry? Also if you haven't already try giving that rogue killer application I recommended above a run.

So, when I run hijackthis, there are tons of references to files that no longer exist - basically anything that says "file missing". And yeah, I did give that rogue killer app a run too. no dice.

O23 - Service: Bluetooth OBEX Service - Intel Corporation - C:\Program Files (x86)\Intel\Bluetooth\obexsrv.exe
O23 - Service: Intel(R) Centrino(R) Wireless Bluetooth(R) + High Speed Security Service (BTHSSecurityMgr) - Intel(R) Corporation - C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe
O23 - Service: Intel(R) Content Protection HECI Service (cphs) - Intel Corporation - C:\Windows\SysWow64\IntelCpHeciSvc.exe
O23 - Service: Intel(R) Dynamic Platform & Thermal Framework Processor Participant Service Application (DptfParticipantProcessorService) - Unknown owner - C:\Windows\SysWOW64\DptfParticipantProcessorService.exe
O23 - Service: Intel(R) Dynamic Platform & Thermal Framework Config TDP Service Application (DptfPolicyConfigTDPService) - Unknown owner - C:\Windows\SysWOW64\DptfPolicyConfigTDPService.exe
O23 - Service: @%SystemRoot%\system32\efssvc.dll,-100 (EFS) - Unknown owner - C:\Windows\System32\lsass.exe (file missing)
O23 - Service: Intel(R) PROSet/Wireless Event Log (EvtEng) - Intel(R) Corporation - C:\Program Files\Intel\WiFi\bin\EvtEng.exe
O23 - Service: @%systemroot%\system32\fxsresm.dll,-118 (Fax) - Unknown owner - C:\Windows\system32\fxssvc.exe (file missing)
O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: Mozilla Maintenance Service (MozillaMaintenance) - Mozilla Foundation - C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
O23 - Service: @comres.dll,-2797 (MSDTC) - Unknown owner - C:\Windows\System32\msdtc.exe (file missing)
O23 - Service: Wireless PAN DHCP Server (MyWiFiDHCPDNS) - Unknown owner - C:\Program Files\Intel\WiFi\bin\PanDhcpDns.exe
O23 - Service: @%SystemRoot%\System32\netlogon.dll,-102 (Netlogon) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\psbase.dll,-300 (ProtectedStorage) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: Intel(R) PROSet/Wireless Registry Service (RegSrvc) - Intel(R) Corporation - C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe
O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\Windows\system32\locator.exe (file missing)
O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: Skype C2C Service - Skype Technologies S.A. - C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe
O23 - Service: Skype Updater (SkypeUpdate) - Skype Technologies - C:\Program Files (x86)\Skype\Updater\Updater.exe
O23 - Service: @%SystemRoot%\system32\snmptrap.exe,-3 (SNMPTRAP) - Unknown owner - C:\Windows\System32\snmptrap.exe (file missing)
O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\Windows\System32\spoolsv.exe (file missing)
O23 - Service: @%SystemRoot%\system32\sppsvc.exe,-101 (sppsvc) - Unknown owner - C:\Windows\system32\sppsvc.exe (file missing)
O23 - Service: Steam Client Service - Valve Corporation - C:\Program Files (x86)\Common Files\Steam\SteamService.exe
O23 - Service: TeamViewer 7 (TeamViewer7) - TeamViewer GmbH - C:\Program Files (x86)\TeamViewer\Version7\TeamViewer_Service.exe
O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\Windows\system32\UI0Detect.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vaultsvc.dll,-1003 (VaultSvc) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\Windows\System32\vds.exe (file missing)
O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\Windows\system32\vssvc.exe (file missing)
O23 - Service: @%systemroot%\system32\wbengine.exe,-104 (wbengine) - Unknown owner - C:\Windows\system32\wbengine.exe (file missing)
O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\Windows\system32\wbem\WmiApSrv.exe (file missing)
O23 - Service: @%PROGRAMFILES%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing)
O23 - Service: Intel(R) PROSet/Wireless Zero Configuration Service (ZeroConfigService) - Intel® Corporation - C:\Program Files\Intel\WiFi\bin\ZeroConfigService.exe

mindphlux
Jan 8, 2004

by R. Guyovich

Tapedump posted:

Don't suppose Disk Management shows an extra 10MB or so partition hanging off the end of your hard drive? Even if not, check using gparted/linux live cd. Try TDSSKiller, too.

nope - I'm 1000% sure of this too, because I just made an image of my win7 partition, wiped my disk clean, installed backtrack linux and grub, then restored my win 7 backup to a different partition. I basically just got done making sweet love to my entire partition table, I know it like uhhh the back of my hand or something.

now that I think about it, I don't know why I didn't just reinstall windows while I was going to all that trouble, but I guess I want to get to the bottom of this since it's my job and all. it's been like 4 years since there was a virus/malware I couldn't track down.

Matlock
Sep 12, 2004

Childs Play Charity 2011 Total: $1755
I've been seeing a lot of infections hanging out in the recovery partition lately. Not that it's all that unique historically, but there seems to be a pattern.

Khablam
Mar 29, 2012

mindphlux posted:

So, when I run hijackthis, there are tons of references to files that no longer exist - basically anything that says "file missing". And yeah, I did give that rogue killer app a run too. no dice.

O23 - Service: Bluetooth OBEX Service - Intel Corporation - C:\Program Files (x86)\Intel\Bluetooth\obexsrv.exe
O23 - Service: Intel(R) Centrino(R) Wireless Bluetooth(R) + High Speed Security Service (BTHSSecurityMgr) - Intel(R) Corporation - C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe
O23 - Service: Intel(R) Content Protection HECI Service (cphs) - Intel Corporation - C:\Windows\SysWow64\IntelCpHeciSvc.exe
O23 - Service: Intel(R) Dynamic Platform & Thermal Framework Processor Participant Service Application (DptfParticipantProcessorService) - Unknown owner - C:\Windows\SysWOW64\DptfParticipantProcessorService.exe
O23 - Service: Intel(R) Dynamic Platform & Thermal Framework Config TDP Service Application (DptfPolicyConfigTDPService) - Unknown owner - C:\Windows\SysWOW64\DptfPolicyConfigTDPService.exe
O23 - Service: @%SystemRoot%\system32\efssvc.dll,-100 (EFS) - Unknown owner - C:\Windows\System32\lsass.exe (file missing)
O23 - Service: Intel(R) PROSet/Wireless Event Log (EvtEng) - Intel(R) Corporation - C:\Program Files\Intel\WiFi\bin\EvtEng.exe
O23 - Service: @%systemroot%\system32\fxsresm.dll,-118 (Fax) - Unknown owner - C:\Windows\system32\fxssvc.exe (file missing)
O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: Mozilla Maintenance Service (MozillaMaintenance) - Mozilla Foundation - C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
O23 - Service: @comres.dll,-2797 (MSDTC) - Unknown owner - C:\Windows\System32\msdtc.exe (file missing)
O23 - Service: Wireless PAN DHCP Server (MyWiFiDHCPDNS) - Unknown owner - C:\Program Files\Intel\WiFi\bin\PanDhcpDns.exe
O23 - Service: @%SystemRoot%\System32\netlogon.dll,-102 (Netlogon) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\psbase.dll,-300 (ProtectedStorage) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: Intel(R) PROSet/Wireless Registry Service (RegSrvc) - Intel(R) Corporation - C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe
O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\Windows\system32\locator.exe (file missing)
O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: Skype C2C Service - Skype Technologies S.A. - C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe
O23 - Service: Skype Updater (SkypeUpdate) - Skype Technologies - C:\Program Files (x86)\Skype\Updater\Updater.exe
O23 - Service: @%SystemRoot%\system32\snmptrap.exe,-3 (SNMPTRAP) - Unknown owner - C:\Windows\System32\snmptrap.exe (file missing)
O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\Windows\System32\spoolsv.exe (file missing)
O23 - Service: @%SystemRoot%\system32\sppsvc.exe,-101 (sppsvc) - Unknown owner - C:\Windows\system32\sppsvc.exe (file missing)
O23 - Service: Steam Client Service - Valve Corporation - C:\Program Files (x86)\Common Files\Steam\SteamService.exe
O23 - Service: TeamViewer 7 (TeamViewer7) - TeamViewer GmbH - C:\Program Files (x86)\TeamViewer\Version7\TeamViewer_Service.exe
O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\Windows\system32\UI0Detect.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vaultsvc.dll,-1003 (VaultSvc) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\Windows\System32\vds.exe (file missing)
O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\Windows\system32\vssvc.exe (file missing)
O23 - Service: @%systemroot%\system32\wbengine.exe,-104 (wbengine) - Unknown owner - C:\Windows\system32\wbengine.exe (file missing)
O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\Windows\system32\wbem\WmiApSrv.exe (file missing)
O23 - Service: @%PROGRAMFILES%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing)
O23 - Service: Intel(R) PROSet/Wireless Zero Configuration Service (ZeroConfigService) - Intel® Corporation - C:\Program Files\Intel\WiFi\bin\ZeroConfigService.exe

You could very well have a system file that has been replaced with a modified version. Open a command prompt and hit "sfc /scannow" and let it verify your Windows files. You may need your installation media.

If this doesn't work, backup and do a clean install, as there's no option available to you that would take less time, so you may as well invest that time in a guaranteed fix.

I assume both your hosts file and DNS addresses are standard? If so, it looks like the dns dll has been modified, which is something a few rootkits do.

Adbot
ADBOT LOVES YOU

NecessaryEvil
Aug 10, 2006
Professional Slacker

Khablam posted:

Your company's IT structure needs a heavy handed professional look. A year old virus should not take out 1/3 of one system, let alone your entire workstation count. Especially when any combination of machine firewalls, an enterprise level AV or even just security updates would have prevented this.

Unless you were just using weird plurals and superlatives to describe a single computer :confused:

What's confusing me is that removal of this particular virus is not at all complicated; when you say it is malicious, are you meaning it is reappearing or you are simply failing to find anything and think you're still infected?

It sounds more likely you have contracted a much newer rootkit which has pulled down the virus you're discussing as an additional payload.

I certainly don't disagree that there need to be some changes, especially after actually being there for the past few days. Some more details:
2 computers (maybe a third), out of a company of 7 architects (and 4 administrative people) are confirmed.

They are being kept up to date on Windows updates, their AV updates are up to date, their firewalls are on, and they're not running local admin.

The xpajkiller program sees nothing while MSE goes crazy detecting items every minute or so. Apparently the Trend version they're using is incompatible with Windows 7 64bit, which is why these machines are running MSE.

After reformatting the machines (DBAN included in case of a screwed up boot record), it got reinfected upon putting it back on their network. I think it's got to be something on their network, as those machines were clean. I'm going to have to go back there today and look into it.

2 XP machines had no AV. Installed MSE, and set it to scan last night.
2 XP/MSE machines detect nothing.
2 XP/Trend machines detect nothing.
2 7/MSE machines (put in 2 years ago) show clean.
2 7/MSE machines (the originally infected) are reinfected
1 7/MSE machines had MSE installed, but wouldn't run. After trying to uninstall and reinstall, I found it wouldn't reinstall. Neither would Forefront. Neither would Avast Free. Rootkit scans haven't found anything. I've got it running a slaved scan overnight, and will check on it this morning. I'm thinking this might be the culprit.

But, if it was something on the network, it should be hitting more systems...especially the ones where there is local admin, or where there's no AV whatsoever. And a rootkit shouldn't get past a rebuilt boot record, should it?



**Update**

On site now. Everything but Trend machines say they're infected. Network rebuild from the ground up time? I imagine so, at this point. Unless I can find some single computer that's screwing everything else up...

**Update2**
1 Trend PC says it has bad drive. That happened before this malware...so I get to definitely rebuild that one.

The other, just started doing this

NecessaryEvil fucked around with this message at 15:59 on Oct 19, 2012

  • Locked thread