win32:Ranky-FZ (trj) help wanted

Hi there,
I have a virus/trojan horse problem.
When I start up my computer the following appears:

Warning you have a problem etc
File name:C:\WINNT\system32\sxe2.tmp
Malware name:win32:Ranky-FZ(trj)
Malware Type:Trojan horse

When I try to move this to the chest after trying a few times the following message appears:
An error has occured while executing this program. Free up hard drive space and try again.
I have 7GB on my hard drive so I do not understand this…Additionally, when I do a full scan with AVAST this trojan horse is not detected. I have also scanned with superantispyware and that does not pick this up…
I am using windows 2000 and am at a loss over this…
any help would be greatly appreciated.
thanks
mh

Hi mh,

Here is the description on this trojan:
Method of propagation:
• No own spreading routine

Aliases:
• Mcafee: Proxy-FBSR
• Kaspersky: Trojan-Proxy.Win32.Ranky.z
• TrendMicro: BKDR_RANKY.FZ
• F-Secure: W32/Ranky.RP
• Bitdefender: Trojan.Proxy.Ranky.Z

Platforms / OS:
• Windows 95
• Windows 98
• Windows 98 SE
• Windows NT
• Windows ME
• Windows 2000
• Windows XP
• Windows 2003

Side effects:
• Registry modification

Registry The following registry key is added in order to run the process after reboot:

– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
• “Sxcasdwqas”=“%malware execution directory%%executed file%”

Backdoor The following port is opened:

– %executed file% on a random TCP port in order to provide a proxy server.

Contact server:
All of the following:
• http://.homeunix.net/b.php
• http://
.hopto.org/b.php
• http://.bounceme.net/b.php
• http://
.shacknet.nu/b.php
• http://**********.bounceme.net/b.php

As a result it may send some information. This is done via the HTTP GET request on a PHP script.

Sends information about:
• Opened port

Miscellaneous Mutex:
It creates the following Mutex:
• Sdwqsdghq

Stop the following Trojanspy.win32.Ranky processes:
3007cdf6829484531218d69c4c4e71eb.exe

Locate and delete the following Trojanspy.win32.Ranky files:
3007cdf6829484531218d69c4c4e71eb.exe

///////////////////////////////////////////////////////////////////////////////////
Please download DrWeb-CureIt from here: http://www.majorgeeks.com/downloadget.php?id=4783&file=10&evp=ef9669e4f16e6e75d95abcde8f88163d
& save it to your desktop. DO NOT perform a scan yet.

You should copy/print the following because you need to be in Safe Mode from here on.

Reboot your computer into SAFE MODE" using the F8 method.
To do this,restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly.
A menu will appear with several options.
Use the arrow keys on your keyboard to navigate and select the option to run Windows in “Safe Mode”.

Scan with DrWeb-CureIt as follows:

  • Double-click on drweb-cureit.exe to start the program. An “Express Scan of your PC” notice will appear.
  • Under “Start the Express Scan Now”, Click “OK” to start. This is a short scan that will scan the files currently running in memory and when something is found, click the Yes button when it asks you if you want to cure it.
  • Once the short scan has finished, Click Options > Change settings
  • Choose the “Scan tab” and UNcheck “Heuristic analysis”
  • Back at the main window, click “Select drives” (a red dot will show which drives have been chosen)
  • Then click the “Start/Stop Scanning” button (green arrow on the right) and the scan will start.
  • When done, a message will be displayed at the bottom advising if any viruses were found.
  • Click “Yes to all” if it asks if you want to cure/move the file.
  • When the scan has finished, look if you can see the icon next to the files found. If so, click it, then click the next icon right below and select “Move incurable”.
    (This will move it to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if it can’t be cured)
  • Next, in the Dr.Web CureIt menu on top, click file and choose save report list.
  • Save the DrWeb.csv report to your desktop.
  • Exit Dr.Web Cureit when done.
  • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report) and attach this to your next posting. Or post it as a txt report.

polonus

hi there,
firstly thanks for your advice
i kind of did what you said but i deleted the files as I just clicked yes to all on the options and before i knew it the files were deleted…
the report is below
zeodq.exe;C:\WINNT\system32;Trojan.Proxy.28;Deleted.;tjdufpp.exe;C:\WINNT\system32;Trojan.Proxy.28;
Deleted.;irddptm.exe;C:\WINNT\system32;Trojan.Proxy.28;Deleted.;gxkzhvia.exe;C:\WINNT\system32;
Trojan.Proxy.28;Deleted.;ibvns.exe;C:\WINNT\system32;Trojan.Proxy.28;Deleted.;nnwhkbra.exe;
C:\WINNT\system32;Trojan.Proxy.28;Deleted.;bprzvzaz.exe;C:\WINNT\system32;Trojan.Proxy.28;
Deleted.;gxruiax.exe;C:\WINNT\system32;Trojan.Proxy.28;Deleted.;gfsjwwb.exe;C:\WINNT\system32;
Trojan.Proxy.28;Deleted.;gfwysgak.exe;C:\WINNT\system32;Trojan.Proxy.28;Deleted.;lbgtjlh.exe;
C:\WINNT\system32;Trojan.Proxy.28;Deleted.;laqmayo.exe;C:\WINNT\system32;Trojan.Proxy.28;
Deleted.;ymby.exe;C:\WINNT\system32;Trojan.Proxy.28;Deleted.;yyaix.exe;C:\WINNT\system32;
Trojan.Proxy.28;Deleted.;wfirj.exe;C:\WINNT\system32;Trojan.Proxy.28;Deleted.;

Really hoping that I have no messed up my system as over the last few weeks i have had sooo many problems and i have had to reset my image three times. kind of scratching my head over this as i have avast, plus i only use MOZILLA now (IE seems like it has far too mayn problems), plus i use the yahoo toolbar with spyware for added protection.

Anyway, I will see how it goes. if there are any major problems then i guess i will have to reformat again… :cry:

mh

Hi mh,

You also have to adjust the registry in safe mode:
When Backdoor.Ranky.C is executed, it does the following:

  1. Opens TCP port 41934, so that it can receive commands from remote hackers. It runs as a proxy server on a compromised machine.

  2. Adds the value:

    “rngmf” = “”

    to the registry key:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

    so that the Trojan runs when you start Windows,

polonus

thanks
fixed the problem now
mh