TechSpot

Trojans Generic10.AOWW / SHeur.BSWK

By cam975
Jul 3, 2008
  1. Seperate to my other thread, I also have issues with my laptop which is being troubled by the Trojans mentioned in the subject title.

    Log files attached.

    Appreciation in advance.

    PS: Panda rootkit all clear.
     
  2. xxdanielxx

    xxdanielxx TS Rookie Posts: 1,069

    Please re-open HiJackThis and scan.**Check the boxes next to all the entries listed below.

    O2 - BHO: (no name) - {AA58ED58-01DD-4d91-8333-CF10577473F7} - (no file)
    O3 - Toolbar: (no name) - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - (no file)
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (file missing)
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (file missing)
    Now close all windows other than HiJackThis, then click Fix Checked.**Close HiJackThis.

    Also download SDFix from the link below to your desktop then run it SDFix will create a folder in your C drive boot into safe mode and go to C:\SDFix and run --->RunThis.bat. Post the log it creates here. to boot into safe mode reboot computer and start tapping the F8 key until you get to a menu select safe mode. Please post a fresh hijackthis log after running the software along with the log from SDFix

    SDFix:
    http://www.bleepingcomputer.com/files/sdfix.php
     
  3. cam975

    cam975 TS Rookie Topic Starter Posts: 36

    Logs attached as requested.

    Kind Regards,

    Cameron.
     
  4. cam975

    cam975 TS Rookie Topic Starter Posts: 36

    AVG picked up Generic10.AWML today.

    File location: Windows\System32\oB1UTr3B.dll

    :(
     
  5. xxdanielxx

    xxdanielxx TS Rookie Posts: 1,069

    Open Hijackthis and place a check next to the items below

    O2 - BHO: (no name) - {AA58ED58-01DD-4d91-8333-CF10577473F7} - (no file)
    O3 - Toolbar: (no name) - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - (no file)
    O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Control Panel present

    then post a fresh log. Also disable and enable system restore

    http://support.microsoft.com/kb/264887
     
  6. cam975

    cam975 TS Rookie Topic Starter Posts: 36

    Those items didn't appear in the Hijack This scan.

    Anyway, disabled system restore.

    Log attached.

    Thanks again.
     
  7. xxdanielxx

    xxdanielxx TS Rookie Posts: 1,069

    How is your computer running I do not see anything in your log I will double check to make sure
     
  8. cam975

    cam975 TS Rookie Topic Starter Posts: 36

    It is running ok. It's just AVG keeps coming up with these trojans.

    Will see what happens over next few days.

    Thanks for your help !
     
  9. xxdanielxx

    xxdanielxx TS Rookie Posts: 1,069

    If its telling you there is a trojan we are missing something let me double check your logs
     
  10. cam975

    cam975 TS Rookie Topic Starter Posts: 36

    Today's scan came up all clear. Hopefully it is ok now. Will post in this thread if any further infections.

    Thanks again.
     
  11. cam975

    cam975 TS Rookie Topic Starter Posts: 36

    accidently posted twice. oops :eek:
     
  12. cam975

    cam975 TS Rookie Topic Starter Posts: 36

    Again!

    No! AVG this morning detected Downloader.Generic7.YMO in System32 folder.

    Attached log.
     
  13. Blind Dragon

    Blind Dragon TS Evangelist Posts: 3,908

    Your Java is out of date this is an easy exploit for malware

    Update your Java Runtime Environment
    • Click the following link
      Java Runtime Environment 6 Update 6
    • The 5th option down is the one you want (click Download)
    • Check the box to agree to terms of service
    • Check the box for your operating system and click 'Download selected'at the bottom
    • After the install Go to Start-> Control Panel-> add/remove programs (Programs and features), and uninstall any old versions
    • Navigate to C:\programfiles\Java -> delete any subfolders except the jre1.6.0_06 folder

    -----------------------------------------------------------------

    Attach a fresh Combofix log since it's been a while
     
  14. cam975

    cam975 TS Rookie Topic Starter Posts: 36

    Java updated as advised.

    Combofix log attached.
     
  15. Blind Dragon

    Blind Dragon TS Evangelist Posts: 3,908

    lets try this - it definitely shouldn't be in your system32 folder - but just to see if anybody has definitions on it

    Upload a File to Virustotal
    Please visit Virustotal found HERE
    • Click the Browse... button
    • Navigate to the file C:\WINDOWS\system32\B5V6wcHi.exe.a_a
    • Click the Open button
    • Click the Send button
    • Copy and paste the results back here please.

    --------------------------------------------------------------------------------
     
  16. cam975

    cam975 TS Rookie Topic Starter Posts: 36

    0 bytes size received / Se ha recibido un archivo vacio
     
  17. xxdanielxx

    xxdanielxx TS Rookie Posts: 1,069

    Se ha recibido un archivo vacio

    a empty file was received
     
  18. Blind Dragon

    Blind Dragon TS Evangelist Posts: 3,908

    we are going to remove it but I am curious about this one

    Please upload this one the same way
    C:\WINDOWS\system32\{ba52c3fc-0c5e-77f1-4956-76bc18296ea2}.dll-uninst.exe
     
  19. cam975

    cam975 TS Rookie Topic Starter Posts: 36

    File 3a72e548ce714aca092e05c0212ebdf0. received on 07.10.2008 04:18:05 (CET)
    Current status: finished

    Result: 3/33 (9.09%)
    Compact Print results
    Antivirus Version Last Update Result
    AhnLab-V3 2008.7.10.0 2008.07.09 -
    AntiVir 7.8.0.64 2008.07.09 -
    Authentium 5.1.0.4 2008.07.08 -
    Avast 4.8.1195.0 2008.07.09 -
    AVG 7.5.0.516 2008.07.09 -
    BitDefender 7.2 2008.07.10 -
    CAT-QuickHeal 9.50 2008.07.09 -
    ClamAV 0.93.1 2008.07.10 -
    DrWeb 4.44.0.09170 2008.07.09 -
    eSafe 7.0.17.0 2008.07.09 -
    eTrust-Vet 31.6.5942 2008.07.10 -
    Ewido 4.0 2008.07.09 -
    F-Prot 4.4.4.56 2008.07.08 -
    F-Secure 7.60.13501.0 2008.07.08 -
    Fortinet 3.14.0.0 2008.07.10 W32/ZLOB.AIL!tr
    GData 2.0.7306.1023 2008.07.09 -
    Ikarus T3.1.1.26.0 2008.07.10 -
    Kaspersky 7.0.0.125 2008.07.10 -
    McAfee 5335 2008.07.09 -
    Microsoft 1.3704 2008.07.10 -
    NOD32v2 3256 2008.07.10 -
    Norman 5.80.02 2008.07.09 -
    Panda 9.0.0.4 2008.07.09 -
    Prevx1 V2 2008.07.10 Cloaked Malware
    Rising 20.52.22.00 2008.07.09 -
    Sophos 4.31.0 2008.07.10 -
    Sunbelt 3.1.1509.1 2008.07.04 -
    Symantec 10 2008.07.10 -
    TheHacker 6.2.96.374 2008.07.07 -
    TrendMicro 8.700.0.1004 2008.07.09 TROJ_ZLOB.AIL
    VBA32 3.12.6.8 2008.07.08 -
    VirusBuster 4.5.11.0 2008.07.09 -
    Webwasher-Gateway 6.6.2 2008.07.09 -
    Additional information
    File size: 63918 bytes
    MD5...: 3a72e548ce714aca092e05c0212ebdf0
    SHA1..: 3257fab37b435c64043762e3e61e5ed6055a0e0b
    SHA256: 62de4befd67dc8aedfb696fdefa3fd7557b522232481b9c2398100903e96a7d1
    SHA512: 856b6c61e445a22ca5c87cbbd5e73510d863e604020cbd0d6bc416debff96437
    aec1ed2b198643bad2085d2ed01070530c01d4b6ea2abbcaf38ea30db3f9c9fc
    PEiD..: -
    PEInfo: PE Structure information

    ( base data )
    entrypointaddress.: 0x403225
    timedatestamp.....: 0x47acc8b2 (Fri Feb 08 21:25:06 2008)
    machinetype.......: 0x14c (I386)

    ( 5 sections )
    name viradd virsiz rawdsiz ntrpy md5
    .text 0x1000 0x5934 0x5a00 6.46 663546ac41801daf2dc51f560ec05a56
    .rdata 0x7000 0x1190 0x1200 5.18 db16645055619c0cc73276ff5c3adb75
    .data 0x9000 0x1af98 0x400 4.70 f0511f18783910813a0de0de02bc1206
    .ndata 0x24000 0xc000 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e
    .rsrc 0x30000 0x6c8 0x800 2.76 7aa1e07300cf82d1881606e8a7e9d1c3

    ( 8 imports )
    > KERNEL32.dll: CompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetFileTime, GetTempPathA, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetWindowsDirectoryA
    > USER32.dll: EndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
    > GDI32.dll: SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
    > SHELL32.dll: SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
    > ADVAPI32.dll: RegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
    > COMCTL32.dll: ImageList_AddMasked, ImageList_Destroy, -, ImageList_Create
    > ole32.dll: CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
    > VERSION.dll: GetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
     
  20. Blind Dragon

    Blind Dragon TS Evangelist Posts: 3,908

    Did you ever run Malwarebytes Anti-malware on this system? It usually picks up zlob

    Run CFScript

    Open notepad and copy/paste the text in the code box below into it:
    NOTE* make sure to only highlight and copy what is inside the quote box nothing out side of it.
    Also ..

    Pay particular attention to this :-

    Make sure the word File:: is on the first line of the text file you save (no blank line above it, & no space in front of it)
    Save this as CFScript.txt

    Then drag the CFScript.txt into ComboFix.exe as you see in the screenshot below.

    [​IMG]

    This will start ComboFix again. After reboot, (in case it asks to reboot), attach Combofix.txt

    -------------------------------------------------------------------------

    Then if you haven't already run MBAM i suggest doing that as well ->
    Malwarebytes' Anti-Malware

    • Please download Malwarebytes' Anti-Malware to your desktop.
    • Double-click mbam-setup.exe and follow the prompts to install the program.
    • At the end, be sure a checkmark is placed next to
      • Update Malwarebytes' Anti-Malware
      • and Launch Malwarebytes' Anti-Malware
    • then click Finish.
    • If an update is found, it will download and install the latest version.
    • Once the program has loaded, select Perform full scan, then click Scan.
    • When the scan is complete, click OK, then Show Results to view the results.
    • Be sure that everything is checked, and click Remove Selected.
    • When completed, a log will open in Notepad. please attach this log with your reply
      • If you accidently close it, the log file is saved here and will be named like this:
      • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt
     
  21. cam975

    cam975 TS Rookie Topic Starter Posts: 36

    All done abd Logs attached. I may have overlooked that scan initially! Definately did it on my other system which I was trying to sort out at the same time.
     
  22. Blind Dragon

    Blind Dragon TS Evangelist Posts: 3,908

    Good work please post one more hijackthis for me and do the following:

    Download and Run ATF Cleaner
    Download ATF Cleaner by Atribune to your desktop.

    Double-click ATF Cleaner.exe to open it.

    Under Main choose:
    Windows Temp
    Current User Temp
    All Users Temp
    Cookies
    Temporary Internet Files
    Prefetch
    Java Cache

    *The other boxes are optional*
    Then click the Empty Selected button.

    Firefox or Opera:
    Click Firefox or Opera at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click NO at the prompt.

    Click Exit on the Main menu to close the program.

    --------------------------------------------------------------------

    Run Kaspersky Online AV Scanner

    Order to use it you have to use Internet Explorer.
    Go to Kaspersky and click the Accept button at the end of the page.

    Note for Internet Explorer 7 users: If at any time you have trouble with the accept button of the licence, click on the Zoom tool located at the right bottom of the IE window and set the zoom to 75 %. Once the license accepted, reset to 100%.
    • Read the Requirements and limitations before you click Accept.
    • Allow the ActiveX download if necessary.
    • Once the database has downloaded, click Next.
    • Click on "My Computer"
    • When the scan has completed, click Save Report As...
    • Enter a name for the file in the Filename: text box and then click the down arrow to the right of Save as type: and select text file (*.txt)
    • Click Save - by default the file will be saved to your Desktop, but you can change this if you wish.
    Attach the report into your next reply
     
  23. cam975

    cam975 TS Rookie Topic Starter Posts: 36

    kapersky scan log attatched. Takes a while that one!

    hijack log also. almost forgot about it.
     
  24. Blind Dragon

    Blind Dragon TS Evangelist Posts: 3,908

    good work -

    Uninstall Combofix
    * Click START then RUN
    * Now type Combofix /u in the runbox
    * Make sure there's a space between Combofix and /u
    * Then hit Enter.

    * The above procedure will:
    * Delete the following:
    * ComboFix and its associated files and folders.
    * Reset the clock settings.
    * Hide file extensions, if required.
    * Hide System/Hidden files, if required.
    * Set a new, clean Restore Point.

    -----------------------------------------------------------------------

    OTCleanit! by Oldtimer
    • Download OTCleanIt
    • Click the CleanUp! button.
      • It will go thorugh the list and remove all of the tools it finds and then delete itself (requiring a reboot).

    ---------------------------------------------------------------------------

    Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
    1. Set correct settings for files
      • Click Start > My Computer > Tools menu (at top of page) > Folder Options > View tab.
      • Under "Hidden files and folders" if necessary select Do not show hidden files and folders.
      • If unchecked please check Hide protected operating system files (Recommended)
      • If necessary check "Display content of system folders"
      • If necessary Uncheck Hide file extensions for known file types.
      • Click OK

      clear system restore points

      • This is a good time to clear your existing system restore points and establish a new clean restore point:
        • Go to Start > All Programs > Accessories > System Tools > System Restore
        • Select Create a restore point, and Ok it.
        • Next, go to Start > Run and type in cleanmgr
        • Select the More options tab
        • Choose the option to clean up system restore and OK it.
        This will remove all restore points except the new one you just created.

    2. Make your Internet Explorer more secure - This can be done by following these simple instructions:
      1. From within Internet Explorer click on the Tools menu and then click on Options.
      2. Click once on the Security tab
      3. Click once on the Internet icon so it becomes highlighted.
      4. Click once on the Custom Level button.
        • Change the Download signed ActiveX controls to Prompt
        • Change the Download unsigned ActiveX controls to Disable
        • Change the Initialize and script ActiveX controls not marked as safe to Disable
        • Change the Installation of desktop items to Prompt
        • Change the Launching programs and files in an IFRAME to Prompt
        • Change the Navigate sub-frames across different domains to Prompt
        • When all these settings have been made, click on the OK button.
        • If it prompts you as to whether or not you want to save the settings, press the Yes button.
      5. Next press the Apply button and then the OK to exit the Internet Properties page.
    3. Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

      See this link for a listing of some online & their stand-alone antivirus programs:

      Virus, Spyware, and Malware Protection and Removal Resources

    4. Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

    5. Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

      For a tutorial on Firewalls and a listing of some available ones see the link below:

      Understanding and Using Firewalls

    6. Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.This is done in Vista through control panel -> windows updates.

    7. Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

      A tutorial on installing & using this product can be found here:

      Using SpywareBlaster to protect your computer from Spyware and Malware

    8. Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
    Follow this list and your potential for being infected again will reduce dramatically.

    here are some additional utilities that will enhance your safety

    • IE/Spyad <= IE/Spyad places over 4000 websites and domains in the IE Restricted list which will severely impair attempts to infect your system. It basically prevents any downloads (Cookies etc) from the sites listed, although you will still be able to connect to the sites.
    • MVPS Hosts file <= The MVPS Hosts file replaces your current HOSTS file with one containing well know ad sites etc. Basically, this prevents your coputer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer
    • Google Toolbar <= Get the free google toolbar to help stop pop up windows.
    • Winpatrol <= Download and install the free version of Winpatrol. a tutorial for this product is located here:
      Using Winpatrol to protect your computer from malicious software
     
  25. cam975

    cam975 TS Rookie Topic Starter Posts: 36

    Done.

    Thanks once again for all the help.

    Will post again in this thread if any further issues.

    Have a good day.
     
Topic Status:
Not open for further replies.

Similar Topics

Add New Comment

You need to be a member to leave a comment. Join thousands of tech enthusiasts and participate.
TechSpot Account You may also...