• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 381
  • Last Modified:

Trojan, Spyware ,Rootkit or just a virus?

I have a rogue Windows XP SP2 machine.
Since 25 November I see the following behaviour of this machine, according to the Juniper firewall logs.

Once the machine is started up with a timeframe of 10 minutes it tries to make contact to
193.238.38.225 port 35618 and tries to do so every 10 minutes.
(According to ZoneAlarm which we installed later it tries to connect to 207.46.211.122:DNS (53) )
So somehow this "thing" can circumvent this.


After that we see that the machine is trying to send email to some random IP addresses.

Here is what we did.

1. We did a sfc /scannow to check the system files of windows xp.
2. Ran a complete virusscan of the machine with Kaspersky AntiVirus and AVG.
3. Did a full scan with Spybot Search & Destroy, Adware, Remover from G-Data.
4. Performed rootkit detection with Sysinternal Rootkit Detector, F-Secure Backlight.
5. Checked the %systemfolder%\system32\driver\etc\ files for any strange things but it is all default.

But no-one sees it.

Has anyone some good suggestions on how to proceed without suggesting reinstalling because I want to know what this is.
0
trenes
Asked:
trenes
  • 2
3 Solutions
 
Kruno DžoićSystem EngineerCommented:
0
 
Kruno DžoićSystem EngineerCommented:
0
 
Phil_AgcaoiliCommented:
As of 31/10/2006 193.238.38.225 is www.ultra-search.biz 

Sometimes the firewall logs lose track of state.
Have you looked to see if there are any source logs from 193.238.38.225?
If so, what port does it say is associated as the source port? TCP/80?

ultra-search.biz is a search engine site, but from what I've seen it's used only by spyware.


Have you tried using a tool like fport? fport reports all open TCP/IP and UDP ports and maps them to the owning application.
http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/proddesc/fport.htm

Even if you cannot isolate what malware is loaded on your system, you can determine when and what application is talking to 193.238.38.225.

I also suggest trying other antispyware tools such as Windows Defender, Spy Sweeper, etc. since Spybot alone cannot detect all spyware.
0
 
rpggamergirlCommented:
Can we look at a hijackthis log? it might show something.

Please download HijackThis 1.99.1
http://www.cyberanswers.org/forum/uploads/HijackThis1991.exe
Open Hijackthis, click "Do a system scan and save a logfile" don't fix anything yet.

Then upload the logs to any hosting sites,
or go to the below link and login using your Experts-Exchange username and password.
http://www.ee-stuff.com
Click on "Expert Area" tab
type or paste the link to your Question
"Browse" your pc to the location of your Hijackthis log and click "Upload"
Copy the resulting "url" and post it back here.

OR: paste the log to either of these sites:
1. http://www.rafb.net/paste/
then at the bottom left corner click "paste"
Copy the address/url and post it here.

2. or at --> http://www.hijackthis.de/ 
and click "Analyse", click "Save".  Then post the link to the saved list here.


Also try this scanner, it's very good.
Download and install Superantispyware
http://www.superantispyware.com/downloadfile.html?productid=SUPERANTISPYWAREFREE
Load Superantispyware and click the "check for updates" button.
Once the update is finished, close SuperAntispyware again, we'll perform the scan later in safe mode

* Start Superantispyware.
Click the "scan your computer" button.
Check "Perform Complete Scan" and then next.
Superantispyware will now scan your computer and when its finished it will list all the infections it has

found.
Make sure that they all have a check next to them and press next.
Click finish and you will be taken back to the main interface.
Click "Preferences" and then click the "statistics/logs" tab. Click the dated log and press view log and a

text file will appear.
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now