Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
Midelne
Jun 19, 2002

I shouldn't trust the phones. They're full of gas.

Luigi Thirty posted:

According to the writeup a few pages ago, Conficker and Antivirus XP are probably made by the same group. At least they both call home to the same city in Latvia or something. Test run? :gonk:

I guess it's not so much of a stretch to assume that two of the most wildly prevalent and successful pieces of malware out there have related dev families. On the other hand, it's at least a little comforting to think that there's no real way that anyone using anything less than Google-level infrastructure could handle the traffic that would be generated by attempting to install malware on six million computers simultaneously.

Adbot
ADBOT LOVES YOU

BillWh0re
Aug 6, 2001


Midelne posted:

I guess it's not so much of a stretch to assume that two of the most wildly prevalent and successful pieces of malware out there have related dev families. On the other hand, it's at least a little comforting to think that there's no real way that anyone using anything less than Google-level infrastructure could handle the traffic that would be generated by attempting to install malware on six million computers simultaneously.

Actually, they've solved that bandwidth problem.

Only a few Conficker infected computers will succeed in contacting their website to grab an update (each one only contacts a randomly chosen set of 500 domains a day out of a possible 50,000). Once those few succeed, they'll distribute it to the rest via a peer-to-peer network that Conficker has set up between infected machines.

Midelne
Jun 19, 2002

I shouldn't trust the phones. They're full of gas.

BillWh0re posted:

Actually, they've solved that bandwidth problem.

Only a few Conficker infected computers will succeed in contacting their website to grab an update (each one only contacts a randomly chosen set of 500 domains a day out of a possible 50,000). Once those few succeed, they'll distribute it to the rest via a peer-to-peer network that Conficker has set up between infected machines.

I noticed that doing further reading after I'd posted, but it didn't register that it would mitigate the bandwidth problem in addition to making it harder to track. That's a pretty bright move.

univbee
Jun 3, 2004




Is there a specific time Conficker is meant to go off on April 1st? I'm in the Pacific Time Zone and am a single Home/SOHO level IT support person and would like to know at what time poo poo is meant to hit the fan (like if New Zealanders will start receiving/distributing the infection early on the morning of the 31st my time and stuff like that). Can the "timebomb" part of the Conficker.C virus be removed pre-emptively to avoid April Fool's mega-infection (assuming that's what they're going for)? I want to be as ready as possible in case I end up with my service phone ringing off the hook on that day.

BillWh0re
Aug 6, 2001


univbee posted:

Is there a specific time Conficker is meant to go off on April 1st? I'm in the Pacific Time Zone and am a single Home/SOHO level IT support person and would like to know at what time poo poo is meant to hit the fan (like if New Zealanders will start receiving/distributing the infection early on the morning of the 31st my time and stuff like that). Can the "timebomb" part of the Conficker.C virus be removed pre-emptively to avoid April Fool's mega-infection (assuming that's what they're going for)? I want to be as ready as possible in case I end up with my service phone ringing off the hook on that day.

It's not really such a precise "timebomb" as no one knows when Conficker will actually succeed in downloading an update -- it depends when the authors choose to register one of the domains it's going to contact, and they can do this any time on or after April 1st. So there's a fair chance you won't see anything at all happen on that date (aside from the traffic to those randomly named domains), but perhaps some time afterwards. This was the case with the previous version too which started calling home from January 1st and was eventually updated in February and March.

The HTTP headers and user agents it uses are either completely normal (uses IE settings from the infected machine) or massively randomised so it'd be hard to write a signature for them. If you want to block the domains it contacts you can do that but it's 50,000 unique domains each day which might be tricky depending on your firewall or whatever you're using.

BillWh0re fucked around with this message at 20:44 on Mar 26, 2009

Customer Service
Jun 20, 2004

I'm not wearing any pants
Hrm. That article mentioned that if your computer has had a Windows Update sometime in March, it's probably okay. But how can I find out if mine has? (It may have but I honestly wouldn't remember.)

ymgve
Jan 2, 2004


:dukedog:
Offensive Clock
I still wonde why they picked such a "late" date for their update. It would seem like the less time the monitoring companies have to respond, the more successful the update will be. Or they could just have made it check for updates every other day, so nobody knew when it would hit.

LRADIKAL
Jun 10, 2001

Fun Shoe

Customer Service posted:

Hrm. That article mentioned that if your computer has had a Windows Update sometime in March, it's probably okay. But how can I find out if mine has? (It may have but I honestly wouldn't remember.)

Internet Explorer->Tools->Windows Update

Biggus Dickus
May 18, 2005

Roadies know where to focus the spotlight.
The actual update you need is 958644 (MS08-067).

http://support.microsoft.com/kb/962007

Delicious Sci Fi
Jul 17, 2006

You cannot lose if you do not play.
One of my users got a trojan I have never seen before. SuperAntiSpyWare picks it up as:

Trojan.Agent/Gen.RedDragon

I can't find anything on it. Google returns a whole bunch of reggae and D&D matches. Anyone know anything about it?

Also what is a good trusted site to look up info on trojans/ viruses?

darkforce898
Sep 11, 2007

Delicious Sci Fi posted:

One of my users got a trojan I have never seen before. SuperAntiSpyWare picks it up as:

Trojan.Agent/Gen.RedDragon

I can't find anything on it. Google returns a whole bunch of reggae and D&D matches. Anyone know anything about it?

Also what is a good trusted site to look up info on trojans/ viruses?

I would take the file and upload to a site to see if you can get a different name for it.

http://www.virustotal.com/
works well, I looked around but didn't really see anything. symantec and trendmicro have nothing by that name.

http://www.symantec.com/norton/security_response/threatexplorer/index.jsp
http://www.trendmicro.com/vinfo/

Doc Faustus
Sep 6, 2005

Philippe is such an angry eater
Posting this from a user's infected machine. They picked up a nasty piece that randomly redirects from google results (to playboy, among other places), crashes rededit and cmd. Crashes browsers if you attempt to find ways to remove it. I was able to get to the link below before, but now it just crashes.

A malwarebytes scan founds some stuff but didn't resolve the issue, superantispyware has found some things but the scan is still ongoing.

Anyone else seen this before. Based on the link, I'm inclined to think it's a fairly new variant of something.

http://www.bleepingcomputer.com/forums/lofiversion/index.php/t211718.html

Ensign Expendable
Nov 11, 2008

Lager beer is proof that god loves us
Pillbug
That does seem new, his antivirus didn't pick it up either. It doesn't appear to do anything drastically different than old hijackers, it will probably be added to the definitions soon enough.

cnrkb
Sep 29, 2008

The internet is
serious business
I've run into some malware on Vista 64, which is characterized by deleting my system restore points and preventing me from logging in now and then. When the latter happens, my log-in upon entering the password either loads the Loading log-in infinitely, or keeps at only displaying the log-in background. If I hold the shutdown button for a short while, the screen goes black, but with the mouse becoming active.

No other issues seem to exist currently. I've run about every free and online scanner available, along with Avira Free, Malwarebytes, CCleaner, the ESET Smart Security and removal tools, along with the bulk of Conficker removal tools.

I always keep my computer updated, but there were a couple of days where ESET SS wasn't installed due to some software snags with it, after deleting some malware on an external harddrive. It may or may not be the culprit.

Finding an all-round tool seems improbable, but if anyone recognizes the above symptoms as characteristic of a specific piece or bread of malware, let me know. According to ESET telephone support, it's a type of malware that would gently caress up my computer, if I tried to reformat, so I seem to be somewhat stuck. They didn't report back to me this Friday, and they haven't told me what type of malware they believe me to be infected with.

Ensign Expendable
Nov 11, 2008

Lager beer is proof that god loves us
Pillbug
That sounds like either winlogon.exe or userinit.exe is not initializing properly. Get a setup disk and manually copy the files over.

GREAT BOOK OF DICK
Aug 14, 2008

by Ozma
If the author(s) of Conficker are truly insane (like The Joker kind of crazy), they could simply use April Fool's day as a parting gift to the world. Force all infected clients to format C: on April 1st and delete everything, including Conficker.

I'd have to give a round of applause to that.

Otacon
Aug 13, 2002


Ensign Expendable posted:

That sounds like either winlogon.exe or userinit.exe is not initializing properly. Get a setup disk and manually copy the files over.

SFC /scannow - use it, brother.

cnrkb
Sep 29, 2008

The internet is
serious business

Otacon posted:

SFC /scannow - use it, brother.
After running said command and rebooting to accommodate the script's request in order for it to perform its thing - where two Windows updates (I did not see downloading nor installing) were installed upon shutting down - Windows now runs in a so-called test mode. At the first scan, it seemed to find a plethora of files to fix, but when running it again in Safe Mode - as no fixing process or prompt seemed to initialize after the reboot, it finds nothing.

Can't log in by the looks of it either, but this is probably the same sporadic thing which has plagued me for a while.

cnrkb fucked around with this message at 00:23 on Mar 30, 2009

Ensign Expendable
Nov 11, 2008

Lager beer is proof that god loves us
Pillbug

Otacon posted:

SFC /scannow - use it, brother.

Right, that's the command I was thinking of. I knew there was something that does that, but couldn't remember what it was.

devmd01
Mar 7, 2006

Elektronik
Supersonik

GREAT BOOK OF DICK posted:

If the author(s) of Conficker are truly insane (like The Joker kind of crazy), they could simply use April Fool's day as a parting gift to the world. Force all infected clients to format C: on April 1st and delete everything, including Conficker.

I'd have to give a round of applause to that.

It would be a refreshing change from running a botnet for sending out penis pill emails. Quick, someone buy stock in OnTrack!

Midelne
Jun 19, 2002

I shouldn't trust the phones. They're full of gas.
Conficker Network Signature Discovered

For those of you freaking out about Conficker, now you can use nmap to do large-scale infection-checks. There's officially no longer an excuse for not knowing whether you're infected or not, and not knowing whether your enterprise is infected or not.

brc64
Mar 21, 2008

I wear my sunglasses at night.

Midelne posted:

Conficker Network Signature Discovered

For those of you freaking out about Conficker, now you can use nmap to do large-scale infection-checks. There's officially no longer an excuse for not knowing whether you're infected or not, and not knowing whether your enterprise is infected or not.
I don't know much about nmap, so if anybody can clue me in on how exactly I'm supposed to use it to scan for conficker, that would be nice. The article isn't very specific on that.

Drighton
Nov 30, 2005

Put in your IP address range in the Target field. I'm not sure which scan to do though, and I'm not sure what you will see if you are infected. Big red CONFICKER label on the IP address or maybe you're looking for a specific port, I don't know.

brc64
Mar 21, 2008

I wear my sunglasses at night.

Drighton posted:

Put in your IP address range in the Target field. I'm not sure which scan to do though, and I'm not sure what you will see if you are infected. Big red CONFICKER label on the IP address or maybe you're looking for a specific port, I don't know.
That's sort of why I was asking. The article talked about updated "definitions" being available mid-Monday, so maybe the nmap folks are going to release an update or something. I don't know.

Drighton
Nov 30, 2005

Theres some instructions for running the Python script in the comments section. I'm putting that together now to give it a try.

Interestingly, did a scan of the another subnet with nmap and a few returned with a red "6129/tcp closed unknown".

edit:
So you need to download Python 2.6 for Windows and Impacket. I had to extract the files directly to the python directory in order for the install to run. Extract the SCS zip anywhere. Open the command prompt, navigate to the python directory, execute "python setup.py install". When finished you can run "python [directory]\scs.py [IP 1] [IP 2]". I had to run it on a computer without SEP, though.

Drighton fucked around with this message at 17:02 on Mar 30, 2009

Biggus Dickus
May 18, 2005

Roadies know where to focus the spotlight.
PoC (inc Download tool) for Conficker detection:
http://iv.cs.uni-bonn.de/wg/cs/applications/containing-conficker/

Cojawfee
May 31, 2006
I think the US is dumb for not using Celsius
Welp, I don't have conficker B or C on any of the machines in my house.

Customer Service
Jun 20, 2004

I'm not wearing any pants
I'm confused: do you absolutely have to use a special program just to detect Conficker, or just to remove it? NOD32 and Superantispyware didn't find anything on mine but I want to be sure.

BillWh0re
Aug 6, 2001


Customer Service posted:

I'm confused: do you absolutely have to use a special program just to detect Conficker, or just to remove it? NOD32 and Superantispyware didn't find anything on mine but I want to be sure.

No, the network scanning method is for checking remote computers that may or may not having working anti-virus installed. Your anti-virus product should detect it just fine on the local machine assuming it has the necessary updates (which it might not do if you're infected, since Conficker blocks that).

darkforce898
Sep 11, 2007

The university I work for is having a problem with DNS changer viruses and they are not fun at all. They seem to all be Trojan.Flush.M but they aren't at all. None of the files are the same, but they have the exact same symptoms.

http://arstechnica.com/security/news/2009/03/new-version-of-dns-server-trojan-flushm-spotted-in-the-pipe.ars

Seems to be exactly what they have but I can't get any removal information. The onyl thing that has been found has been through GMER and is a rootkit called 'gaopdxserv.sys'. Unfortunatly this can only be deleted through a recovery console or through another operating system. This isn't really a good solution and doesn't have anything to do with Flush.M.

The only thing I can think of is that the rootkit is hiding the files of the Flush.M virus and we need to remove the rootkit first. Another cool thing is that MAlwarebytes will not run at all. It installed fine but it crashed on load, even when changing the name of the process.

Tsercele
Sep 27, 2008

I've got a TDSServ infection on my 32-bit Vista machine, and it's dug in. The catch is, everything mentioned in the thread thus far seems ineffective. I've checked the Non-Plug and Play Drivers list, but there are no TDS variations. Spyware Doctor can detect it, but refuses to remove it unless I buy a full version. MalwareBytes always crashes before completing its scan. SUPERAntiSpyware didn't detect anything. GMER bluescreened the computer, even when renamed. ComboFix ran, had an adverse reaction to avast! (maybe?), and almost lobotomized my computer when it bluescreened on restart. Avira detected a couple of trojans, but not TDSServ, and then it crashed my computer. I'm starting to wonder if the trojan's creating fake bluescreens. Any help would be appreciated.

Edit: I'm also running Spyware Terminator, and - looking for more data online - it's suggested that it's a rogue program. God dammit.

Also, I double-checked the Device Manager, and it's running a driver called "catchme". Cheeky bastards.

Tsercele fucked around with this message at 03:18 on Mar 31, 2009

Ensign Expendable
Nov 11, 2008

Lager beer is proof that god loves us
Pillbug
Use the Ultimate Boot CD to scan the system from outside Windows. That should get rid of it if it keeps killing off your tools.

taiyoko
Jan 10, 2008


Trying to remotely fix a friend's computer right now. No idea what he's managed to get on his system offhand. He says IE and Firefox won't load any pages, but his instant messaging still works, so it's not a problem with the connection. We've tried MalwareBytes and SUPERAntiSpyware to no effect, though they can't access updates. Combofix does nothing. AVG didn't pick up anything. I'm unable to physically go over there and do anything, as I'm at college and don't have a car on campus.

Aside from sending him over AIM the installer for LogMeIn and me attempting to see if I can fiddle with stuff that way to fix it from here, I'm pretty much stumped.

Otacon
Aug 13, 2002


The Man with a Hat posted:

I've got a TDSServ infection on my 32-bit Vista machine, and it's dug in. The catch is, everything mentioned in the thread thus far seems ineffective. I've checked the Non-Plug and Play Drivers list, but there are no TDS variations. Spyware Doctor can detect it, but refuses to remove it unless I buy a full version. MalwareBytes always crashes before completing its scan. SUPERAntiSpyware didn't detect anything. GMER bluescreened the computer, even when renamed. ComboFix ran, had an adverse reaction to avast! (maybe?), and almost lobotomized my computer when it bluescreened on restart. Avira detected a couple of trojans, but not TDSServ, and then it crashed my computer. I'm starting to wonder if the trojan's creating fake bluescreens. Any help would be appreciated.

Edit: I'm also running Spyware Terminator, and - looking for more data online - it's suggested that it's a rogue program. God dammit.

Also, I double-checked the Device Manager, and it's running a driver called "catchme". Cheeky bastards.

Catchme is from Gmer, and is harmless. Give this a shot: Boot into Safe Mode, download Combofix, drop it in C: and rename it to 'cf.exe' - run this as administrator, and let it go through. If it reboots your machine and it blue screens, there should be a combofix.txt file in your root drive - paste the text and we'll get some more info. However, popping the drive into computer and running an external virus scan will help - just be prepared for blue screens as Windows tries to load device drivers that don't exist anymore.

taiyoko posted:

Trying to remotely fix a friend's computer right now. No idea what he's managed to get on his system offhand. He says IE and Firefox won't load any pages, but his instant messaging still works, so it's not a problem with the connection. We've tried MalwareBytes and SUPERAntiSpyware to no effect, though they can't access updates. Combofix does nothing. AVG didn't pick up anything. I'm unable to physically go over there and do anything, as I'm at college and don't have a car on campus.

Aside from sending him over AIM the installer for LogMeIn and me attempting to see if I can fiddle with stuff that way to fix it from here, I'm pretty much stumped.

Open up Notepad and look for the HOSTS file: c:\windows\system32\drivers\etc\ - it's not a text file, it's just called HOSTS. See if there is anything else other than 127.0.0.1 listed - if not, tell him to download Dial-A-Fix and to have that give a run through.

Otacon fucked around with this message at 03:47 on Mar 31, 2009

taiyoko
Jan 10, 2008


Otacon posted:

Open up Notepad and look for the HOSTS file: c:\windows\system32\drivers\etc\ - it's not a text file, it's just called HOSTS. See if there is anything else other than 127.0.0.1 listed - if not, tell him to download Dial-A-Fix and to have that give a run through.


Nothing out of the ordinary with the hosts file. Sending him Dial-A-Fix now to try that out.

Ensign Expendable
Nov 11, 2008

Lager beer is proof that god loves us
Pillbug
Check hosts and also look at proxy server settings for each browser. If hosts wasn't modified it's possible those were.

taiyoko
Jan 10, 2008


Ensign Expendable posted:

Check hosts and also look at proxy server settings for each browser. If hosts wasn't modified it's possible those were.

No proxy settings on IE or FF. Nothing suspicious listed in running processes, but this is rather strange to me...

Cojawfee
May 31, 2006
I think the US is dumb for not using Celsius
You didn't check to see what was using all that?

darkforce898
Sep 11, 2007

taiyoko posted:

No proxy settings on IE or FF. Nothing suspicious listed in running processes, but this is rather strange to me...



Might be a seismograph in an earthquake. Check his DNS settings to see if they point to something like 85.* or 64/63.*. If so he has Trojan.Flush.M

Run a scan in GMER and see if anything comes up as a rootkit.

Adbot
ADBOT LOVES YOU

taiyoko
Jan 10, 2008


Cojawfee posted:

You didn't check to see what was using all that?



As I said, nothing seemed particularly out of place at first glance.

darkforce898 posted:

Check his DNS settings to see if they point to something like 85.* or 64/63.*. If so he has Trojan.Flush.M

Run a scan in GMER and see if anything comes up as a rootkit.

I'll try that when he logs back on. It's a bit frustrating having to do everything via AIM.

  • Locked thread