Win32:MBRoot-J [Trj] reported by Avast. Please help essexboy or anyone...

Jeff –

Below the contents of the CKFiles.txt; the CKScanner programme finished rather quickly:

CKScanner - Additional Security Risks - These are not necessarily bad
scanner sequence 3.MN.11.TTAPUJ
----- EOF -----

Xander

Hi,

[*]Please open Notepad (Start → Run → type notepad in the Open field → OK) and copy and paste the text present inside the code box below:


ClearJavaCache::

File::
C:\Documents and Settings\All Users\Application Data\YouTube Downloader\ytd_installer.exe	
E:\Downloads\AVM\ruKernelTool\ruKernelTool.zip	
E:\Downloads\AVM\ruKernelTool\ruKernelTool\_Lib_\PrettyPrintFirmwareLinkListe.exe	
E:\Downloads\Euro Truck Simulator\SoftonicDownloader_for_euro-truck-simulator.exe	
E:\Downloads\IEPassview\iepv.zip	
E:\Downloads\YouTube Downloader\YouTubeDownloaderSetup34.exe	
M:\D800\D\Xander's Documents\My Downloads.NEW\Iso Files\Windows XP Live CD\MiKiCuN2.iso	
M:\D800\D\Xander's Documents\My Downloads.NEW\Nero\Ahead.Nero.Burning.ROM.v6.6.0.3.Ultra.Edition.zip	
W:\D800\D\Xander's Documents\My Downloads.NEW\Iso Files\Windows XP Live CD\MiKiCuN2.iso	
W:\D800\D\Xander's Documents\My Downloads.NEW\Nero\Ahead.Nero.Burning.ROM.v6.6.0.3.Ultra.Edition.zip	
W:\GertMuziekBackup\Music\Shared\Nero Burning Rom 6.3.0.0 + Vision Express 2.2 + KeyGen + DVD-PlugIn.zip

[*]Save this as CFScript.txt and change the “Save as type” to “All Files” and place it on your desktop.

http://img.photobucket.com/albums/v706/ried7/CFScriptB-4.gif

[*]Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before following the steps below. They can interfere with ComboFix or remove some of its embedded files which may cause “unpredictable results”.
[*]Referring to the screenshot above, drag CFScript.txt into ComboFix.exe.
[*]ComboFix will now run a scan on your system. It may reboot your system when it finishes. This is normal.
[*]When finished, it shall produce a log for you. Copy and paste the contents of the log in your next reply.

CAUTION: Do not mouse-click ComboFix’s window while it is running. That may cause it to stall.

In your next reply attach the log made by ComboFix and let me know how your system is running. :slight_smile:

Jeff –

Attached the logfile generated by ComboFix; it was 1.1 MB in size and as such have I zipped it following by renaming it into *.TXT because of the attachment restrictions.

The system is running fine ever since TDSSKiller.exe cured/quarantined “Rootkit.Boot.Sinowal.b”; Internet Explorer seems to noticeable perform much faster. Although after the last ComboFix session/reboot was I not able to start IE and not able to properly shutdown my laptop however this behaviour was limited to this one reboot.

Although we are well underway eliminating all the unwanted threats do I have the following questions which are in my mind for the last couple of days now:

  1. Why was Avast! not able to warn me for the rootkit “Win32:MBRoot-J [Trj]” before installation but only after it became active?
  2. What are the symptoms of “Win32:MBRoot-J [Trj]” / “Rootkit.Boot.Sinowal.b” and what is their severity; i.e. what is it intended to do?
  3. Are “Win32:MBRoot-J [Trj]” and “Rootkit.Boot.Sinowal.b” names for the same rootkit?
  4. Do we still need to eliminate the “malicious Win32:MBRoot code @ sector 312560643 !” which aswMBR.exe reported earlier?
  5. Was it necessary to delete/quarantine the 11 files as part of the last ComboFix run; i.e. did they contain severe threats?
  6. Was it indeed NOT necessary to delete/quarantine the 5 files related to Ultimate Boot CD (for DOS) and Ultimate Boot CD for Windows as reported by ESET?
    7.What is the reason for deleting (quarantine) the DLLs “rbap450.dll”, “NUBZWTP.DLL” and “plugin.dll” as well as others like “IsUn0413.exe”?
  7. Why was OTL not able to kill the processes (Killing processes. DO NOT INTERRUPT) and continue as expected?

If you have any answers then please go ahead, so I can “empty” my mind…

Thank you, Xander

Hi,

Let me work through these…

1. Why was Avast! not able to warn me for the rootkit "Win32:MBRoot-J [Trj]" before installation but only after it became active?
Viruses and other malware change daily so no matter what antivirus program you use there is no way to catch 100% of infections.
2. What are the symptoms of "Win32:MBRoot-J [Trj]" / "Rootkit.Boot.Sinowal.b" and what is their severity; i.e. what is it intended to do?
Any type of rootkit will normally cause redirects in your internet and always have the possibility of stealing information.
4. Do we still need to eliminate the "malicious Win32:MBRoot code @ sector 312560643 !" which aswMBR.exe reported earlier?
No that is fine. It is a residual entry made by the infection but it has been neutralized so that is nothing to be concerned about. :)
6. Was it indeed NOT necessary to delete/quarantine the 5 files related to Ultimate Boot CD (for DOS) and Ultimate Boot CD for Windows as reported by ESET?
Everything that ESET finds is not necessarily bad and occasionally will report entries that do not need to go and that is why we have you not allow ESET to remove them automatically.
7.What is the reason for deleting (quarantine) the DLLs "rbap450.dll", "NUBZWTP.DLL" and "plugin.dll" as well as others like "IsUn0413.exe"?
I am just briefly looking over the logs but they were either infections themselves, orphaned files or part of an infection.
8. Why was OTL not able to kill the processes (Killing processes. DO NOT INTERRUPT) and continue as expected?
Sometimes malware will prevent some of our tools from functioning properly so that is why we have many at our disposal.

Could you just attach the ComboFix.txt log that was created without zipping it. It did not come out right.

Jeff –

I’m trying to attach the original ComboFix.txt log however it is responding with the following error: 413 Request Entity Too Large.

It is 1.1 Mb in size; what to do?

Thank you for the anwers; are you still able to anwer questions 3 and 5?

Thank you, Xander

Jeff; In regards to your latest post:

If I download the attachment “ComboFix.zip.txt” followed by renaming it to ComboFix.zip am I able to correctly open the zipped file.

Cheers, Xander

Hi,

I got it opened. :slight_smile:

Yes those two rootkits are the same thing. :slight_smile:

The entries we removed were found to have threats in them per ESET and we did need to remove them. :slight_smile:

Let’s update your Java…
Please download JavaRa to your desktop and unzip it to its own
folder
[*]Run JavaRa.exe (double-click for XP/right-click and Run as Administrator for Vista), pick the language of your choice and click Select. Then
click Remove Older Versions.
[*]Accept any prompts.
[*]Open JavaRa.exe (double-click for XP/right-click and Run as Administrator for Vista) again and select Search For Updates.
[*]Select Update Using Sun Java’s Website then click Search and click on the Open Webpage button. Download and install the latest
Java Runtime Environment (JRE) version for your computer.


Run a new scan with OTL and attach that log to your next reply. Let me know if have any remaining malware related problems. :slight_smile:

Jeff –

I executed JavaRa and it apparently removed older Java versions according to the log; see attachment. I also installed the latest Java Runtime Environment (JRE) “Java™ 7 Update 3” on my computer.

However when accessing “Add or Remove Programs” via Control Panel it still lists “Java™ 6 Update 23” as installed (see attachment) and when I try to remove it I gives an error “Java™ 6 Update 19 - Internal Error 2753.regutils.dll”; see attachment.

Will start OTL shortly, Xander

Jeff –

In regards to my previous post regarding “Add or Remove Programs” via Control Panel would I like to add that it also lists “YouTube Downloader Toolbar v5.4” and “Ask Toolbar” as installed; see attachments. Weren’t these programs removed as part of the several “cleaning” processes? They are not active as part of Internet Explorer anymore.

Xander

Hi Xander,

As far as the Java error…

Let’s try to get Java uninstalled comepletely and install the newest version.
[*]If you are able, uninstall all previous versions of Java in Add/Remove Programs in your Control Panel.
[*]Next, you may download the current version of Java here: http://java.com/en/download/manual.jsp
(I recommend that you use the offline installer version.)
[*]Please download and run this automated tool to fix the Java MSI problem on all versions of windows: JavaMSIFix
[*]Now you may install the version of Java that you had downloaded in the previous steps.


For the two Toolbars go ahead and just remove those. :slight_smile:

Hello Jeff –

I have finally succeeded in removing Java completely followed by successfully installing “Java™ 6 Update 31” as instructed in your post. I did experience some problems (Unknown Error #87) using JavaMSIFix followed by the same error “Java™ 6 Update 19 - Internal Error 2753.regutils.dll” when trying to reinstall Java however rebooting in combination with running JavaMSIFix again did do the trick. After this was I able to reinstall Java.

Any reason for directing me to use “Java 6 Update 31” this time compared to initially using “Java 7 Update 3”?

I also successfully removed “YouTube Downloader Toolbar v5.4” and “Ask Toolbar” however removing “Ask Toolbar Updater” resulted in an error “It may have already been uninstalled”; see attachment. I responded “Yes” towards the prompt in regards to removing it from the “Add or Remove programs list”.

Please also find attached the requested OTL log. (OTL was executed in NORMAL MODE from a USB-stick WITHOUT any text written inside of the code box into the Custom Scans/Fixes. The buttons “Scan all users”, “LOP Check” and “Purity” are NOT checked. Note: Avast is running in the background).

I’m not experiencing any remaining malware related problems.

Let me know how to proceed and/or how to remove any of the used tools; the quarantine folder of ComboFix (Qoobox) is taking up quite some space…

Thank you, Xander

PS. I really appreciate all your hard work, instructions & dedication regarding getting my PC up-to-speed again!!!

Jeff –

I performed additional scans using Malwarebytes’ Anti-Malware, TDSSKiller and aswMBR.

None reported “errors” except for the known entry “malicious Win32:MBRoot code @ sector 312560643” by aswMBR; see attachments.

Regards, Xander

Hi,

Sounds like things are running well. Logs look good.

Any reason for directing me to use "Java 6 Update 31" this time compared to initially using "Java 7 Update 3"?
You can update to Java7 update 3 if you want. :) ----------
None reported "errors" except for the known entry "malicious Win32:MBRoot code @ sector 312560643" by aswMBR; see attachments.
Nope...that is fine. It is a residual entry found by aswMBR but is just fine. It is not an infection. :) ----------

Providing there are no more malware related problems…

IT APPEARS THAT YOUR LOGS ARE NOW CLEAN :smiley: SO LETS DO A COUPLE OF THINGS TO WRAP THIS UP!! :smiley:

This infection appears to have been cleaned, but I can not give you any absolute guarantees. As a precaution, I would go ahead and change all of your passwords as this is especially important after an infection.

The following will implement some cleanup procedures as well as reset System Restore points:

Click Start > Run and copy/paste the following text into the Run box as shown and click OK.
Combofix /Uninstall
(Note: There is a space between the …X and the /U that needs to be there.)

http://i1224.photobucket.com/albums/ee380/jeffce74/CF.jpg


Clean up with OTL:

[*]Right-click and Run as Administrator OTL.exe to start the program.
[*]Close all other programs apart from OTL as this step will require a reboot
[*]On the OTL main screen, press the CLEANUP button
[*]Say Yes to the prompt and then allow the program to reboot your computer.


Any of the logs that you created for use in the forums or remaining tools that have not yet been removed can be deleted using right-click > delete so they aren’t cluttering up your desktop.

Here are some tips to reduce the potential for spyware infection in the future:

1. Make your Internet Explorer more secure - This can be done by following these simple instructions:

[*]From within Internet Explorer click on the Tools menu and then click on Options.
[*]Click once on the Security tab
[*]Click once on the Internet icon so it becomes highlighted.
[*]Click once on the Custom Level button.
[*]Change the Download signed ActiveX controls to Prompt
[*]Change the Download unsigned ActiveX controls to Disable
[*]Change the Initialize and script ActiveX controls not marked as safe to Disable
[*]Change the Installation of desktop items to Prompt
[*]Change the Launching programs and files in an IFRAME to Prompt
[*]Change the Navigate sub-frames across different domains to Prompt
[*]When all these settings have been made, click on the OK button.
[*]If it prompts you as to whether or not you want to save the settings, press the Yes button.
[*]Next press the Apply button and then the OK to exit the Internet Properties page.

2. Enable Protected Mode in Internet Explorer. This helps Windows Vista users stay more protected from attack by running Internet Explorer with restricted privileges as well as reducing the ability to write, alter or destroy data on your system or install malicious code. To make sure this is running follow these steps:
[*]Open Internet Explorer
[*]Click on Tools > Internet Options
[*]Press Security tab
[*]Select Internet zone then place check next to Enable Protected Mode if not already done
[*]Do the same for Local Intranet, Trusted Sites and Restricted Sites and then press Apply
[*]Restart Internet Explorer and in the bottom right corner of your screen you will see Protected Mode: On showing you it is enabled.

3. Use and update an anti-virus software - I can not overemphasize the need for you to use and update your anti-virus application on a regular basis. With the ever increasing number of new variants of malware arriving on the scene daily, you become very susceptible to an attack without updated protection.

4. Firewall
Using a third-party firewall will allow you to give/deny access for applications that want to go online. Without a firewall your computer is susceptible to being hacked and taken over. Simply using a firewall in its default configuration can lower your risk greatly. A tutorial on firewalls can be found [color=blue]here. **There are firewalls listed in this tutorial that could be downloaded and used but I would personally only recommend using one of the following two below:
Online Armor Free
Agnitum Outpost Firewall Free

5. Make sure you keep your Windows OS current. Windows XP users can visit Windows update regularly to download and install any critical updates and service packs. Windows Vista/7 users can open the Start menu > All Programs > Windows Update > Check for Updates (in left hand task pane) to update these systems. Without these you are leaving the back door open.

6. WOT (Web of Trust) As “Googling” is such an integral part of internet life, this free browser add on warns you about risky websites that try to scam visitors, deliver malware or send spam. It is especially helpful when browsing or searching in unfamiliar territory. WOT’s color-coded icons show you ratings for 21 million websites, helping you avoid the dangerous sites. WOT has an add-on available for Firefox, Internet Explorer as well as Google Chrome.

7. Finally, I strongly recommend that you read TonyKlein’s good advice So how did I get infected in the first place?

Please reply to this thread once more if you are satisfied so that we can mark the problem as resolved.

Jeff –

I accidentally executed the CLEAN-UP process vice versa; I executed clean up via OTL before Combofix /Uninstall. OTL apparently cleaned up also any Combofix related material since Combofix was not existing anymore. Since I was not sure if any Combofix related material was still present did I reinstall Combofix using the special mode: - REDUCED FUNCTIONALITY MODE -; see attached log. After the reinstall did I perform the requested actions “Combofix /Uninstall” followed by “clean up via OTL”. Everything seems to work fine however I hope I didn’t screw anything up…

Also do I still have a folder named “TDSSKiller_Quarantine” including contents; see attachment. Can I just delete this folder or do I have to follow specific removal procedures.

In regards to your

Here are some tips to reduce the potential for spyware infection in the future:
do I have the following info/questions:
  1. All settings were already in place
  2. Unable to locate Protected Mode in Internet Explorer; where is it located in IE8 as part of XP SP3?
  3. Paid license of Avast! Internet Security is in place
  4. Is the implemented Firewall as part of Avast! Internet Security good enough?
  5. Already in place
  6. Is “WOT (Web of Trust)” identical to using Avast! Webrep and Avast! Phishing filter?
  7. Ok; is there a reason for (next to MalwareBytes) installing all three listed AntiSpyware programs (SpywareBlaster, SpywareGuard and SuperAntiSpyware)?

Xander

PS. You can mark the problem as solved since I don’t experience any problems anymore. Thanks again for your dedicated support :slight_smile:

Hi Xander,

I think you cleaned it up just fine. There should be no problems.

Just delete the TDSSKiller-Quarantine folder using right-click > delete

Unable to locate Protected Mode in Internet Explorer; where is it located in IE8 as part of XP SP3?
Sorry...that is only for Vista/7 operating systems. ----------

If you are already using Avast don’t worry about WOT. :slight_smile:

7. Ok; is there a reason for (next to MalwareBytes) installing all three listed AntiSpyware programs (SpywareBlaster, SpywareGuard and SuperAntiSpyware)?
You do not need to install all of them if you don't want to do so. I only have SuperantiSpyware along with Malwarebytes myself. These are just suggestions. :)

I hope I answered your questions? :slight_smile:

Hi Jeff –

All clear, thank you! :slight_smile:

You are more than welcome! Glad I could help. :slight_smile: