Jump to content

Malware Help - Trojan / Backdoor


Recommended Posts

I need some help, I have been trying to research and look through forums, but nothing I try seems to fix the problem. I saw that there is a scanner tool FRST which I could run and get a report that I could probably post here and have it analyzed by someone. 

A little background, about a month ago, people were getting pop ups on the bottom left saying threat identified. The first couple people clicked it to disinfect, when I found I advised against and ran malware... They were getting Trojan.Generic , Backdoor Agents, and a bunch of suspicious paths with a random numbers which also were under the services. In addtion, emails with invoice payments are being sent inter-company. 

I have attached the FRST log... 

FRST.txt

Link to post
Share on other sites

Yes, sorry, I guess I didnt really provide that information. The log is from a Server 2008 R2. I have not identified the source of origination, but the issue was reported by one user then it spread to most users and even the mail server... The log is for the mail server, the reason why I sent that one is because I feel that may be the source since it is the domain controller. 

Link to post
Share on other sites

  • Root Admin

Hello @Stingray1984

This looks to be a Terminal Server with many accounts. Please bear in mind that anytime a server is infected it really should be restored from backup as it is a business and could potentially affect the operation of the business.

Please read the following.
The complexity of finding, preventing, and cleanup from malware

I can try to assist you, but fully cleaning this server with so many accounts on it will be difficult, and going forward this server can never really be trusted. I know that's not what you want to hear, but the best advise would be to do a restore from tape. If you're not doing daily backups of the system then you're flirting with disaster daily.

Other methods to help to protect a Terminal Server

How-to: Deploying a whitelist Software Restriction Policy to prevent Cryptolocker and more

How to create an Application Whitelist Policy in Windows

Lock Down Remote Desktop Services Server 2012 / RDS 2012 R2

How to secure your remote desktop server with GPO

So how many servers are now infected? How many workstations?

Thank you

Ron

 

 

Link to post
Share on other sites

  • Root Admin

Without knowing specifically what infection at this point it's best if you isolate them from the network so that they cannot potentially reach out and infect other computers.

Please run the following on one of the infected workstations.

 

Please run the following steps and post back the logs as an attachment when ready.

STEP 01

  • If you're already running Malwarebytes 3 then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button.
  • If you don't have Malwarebytes 3 installed yet please download it from here and install it.
  • Once installed then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button.
  • Once the scan is completed click on the Export Summary button and save the file as a Text file to your desktop or other location you can find, and attach that log on your next reply.
  • If Malwarebytes won't run then please skip to the next step and let me know on your next reply.

STEP 02

Please download AdwCleaner by Malwarebytes and save the file to your Desktop.

  • Right-click on the program and select RunAsAdmin.jpg Run as Administrator to start the tool.
  • Accept the Terms of use.
  • Wait until the database is updated.
  • Click Scan.
  • When finished, please click Clean.
  • Your PC should reboot now if any items were found.
  • After reboot, a log file will be opened. Copy its content into your next reply.

STEP 03
Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here.
  • Please attach the Additions.txt log to your reply as well.

 

Thanks

Ron

 

Link to post
Share on other sites

  • Root Admin

Please run the following. The script will upload a file to VirusTotal to analyze it and provide a link about the file. It will also reset any proxy and clear out the temp folders.

S2 fltiso; C:\Windows\SysWOW64\fltiso.exe [91136 2017-09-27] (Microsoft Corporation) [File not signed]

 


Please download the attached fixlist.txt file and save it to the Desktop.
NOTE. It's important that both files, FRST or FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system.

Run FRST or FRST64 and press the Fix button just once and wait.
If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart.
The tool will make a log on the Desktop (Fixlog.txt). Please attach or post it to your next reply.

Note: If the tool warned you about an outdated version please download and run the updated version.

fixlist.txt

Thanks

Ron

 

Link to post
Share on other sites

I downloaded the fixlist in the same folder as FRST/FRST 64, which seems to  be the download folder in my case.. Ran the the fix and it went to create restore point and delete files (mostly Temp). The fltiso.exe still continues to appear... I have re-scanned using malwarebytes 3, adwcleaner, and FRST, logs attached...

 

mware9292017.txtFRST_09292017.txtAdwCleaner_09292017.txtAddition_09292017.txt

Link to post
Share on other sites

Just to provide an update... I have removed all the workstations from the domain.. Also, using the back up appliance I mentioned above, I started a restore of the domain controller/mail server.

I have been going around running the malwarebytes, adwcleaner, and the FRST... Here are the logs for another CPU that seems to have a lot of Malware...

 

mware_09302017md.txtFRST_09302017md.txtAdwCleaner_09302017md.txtAddition_09302017md.txt

Link to post
Share on other sites

  • Root Admin
9 hours ago, Stingray1984 said:

Just to provide an update... I have removed all the workstations from the domain.. Also, using the back up appliance I mentioned above, I started a restore of the domain controller/mail server.

I have been going around running the malwarebytes, adwcleaner, and the FRST... Here are the logs for another CPU that seems to have a lot of Malware...

 

mware_09302017md.txtFRST_09302017md.txtAdwCleaner_09302017md.txtAddition_09302017md.txt

Please run the following for THIS COMPUTER  RECEPTION2


Please download the attached fixlist.txt file and save it to the Desktop.
NOTE. It's important that both files, FRST or FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system.

Run FRST or FRST64 and press the Fix button just once and wait.
If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart.
The tool will make a log on the Desktop (Fixlog.txt). Please attach or post it to your next reply.

Note: If the tool warned you about an outdated version please download and run the updated version.

fixlist.txt

Thanks

Ron

 

Edited by AdvancedSetup
Link to post
Share on other sites

  • Root Admin
5 hours ago, Stingray1984 said:

I wanted to load the logs for a CPU that popped up with nothing in malwarebytes and adwcleaner... laptop had a lot of Trojans and malware prior...

 

mware_09302017so.txtFRST_09302017so.txtAdwCleaner_09302017so.txtAddition_09302017so.txt

on this computer: SOCORE-I7

Uninstall Java - if needed make sure it's up to date at all times.

Also, you're Google updater is very old. I'd uninstall that and if you want it then update it.

The attached fix is for SOCORE-I7  only.

 

Please download the attached fixlist.txt file and save it to the Desktop.
NOTE. It's important that both files, FRST or FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system.

Run FRST or FRST64 and press the Fix button just once and wait.
If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart.
The tool will make a log on the Desktop (Fixlog.txt). Please attach or post it to your next reply.

Note: If the tool warned you about an outdated version please download and run the updated version.

fixlist.txt

Ron

 

Link to post
Share on other sites

  • Root Admin

This is for computer:  LENDERSON-DT

CCleaner on this computer is infected. Please uninstall and update to the latest version.


Please download the attached fixlist.txt file and save it to the Desktop.
NOTE. It's important that both files, FRST or FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system.

Run FRST or FRST64 and press the Fix button just once and wait.
If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart.
The tool will make a log on the Desktop (Fixlog.txt). Please attach or post it to your next reply.

Note: If the tool warned you about an outdated version please download and run the updated version.

fixlist.txt

Thanks

Ron

 

Link to post
Share on other sites

  • 2 weeks later...
Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.