Solved

Trojan, Spyware ,Rootkit or just a virus?

Posted on 2006-11-29
4
373 Views
Last Modified: 2013-12-04
I have a rogue Windows XP SP2 machine.
Since 25 November I see the following behaviour of this machine, according to the Juniper firewall logs.

Once the machine is started up with a timeframe of 10 minutes it tries to make contact to
193.238.38.225 port 35618 and tries to do so every 10 minutes.
(According to ZoneAlarm which we installed later it tries to connect to 207.46.211.122:DNS (53) )
So somehow this "thing" can circumvent this.


After that we see that the machine is trying to send email to some random IP addresses.

Here is what we did.

1. We did a sfc /scannow to check the system files of windows xp.
2. Ran a complete virusscan of the machine with Kaspersky AntiVirus and AVG.
3. Did a full scan with Spybot Search & Destroy, Adware, Remover from G-Data.
4. Performed rootkit detection with Sysinternal Rootkit Detector, F-Secure Backlight.
5. Checked the %systemfolder%\system32\driver\etc\ files for any strange things but it is all default.

But no-one sees it.

Has anyone some good suggestions on how to proceed without suggesting reinstalling because I want to know what this is.
0
Comment
Question by:trenes
  • 2
4 Comments
 
LVL 11

Assisted Solution

by:M3rc74
M3rc74 earned 100 total points
ID: 18037687
0
 
LVL 11

Expert Comment

by:M3rc74
ID: 18037702
0
 
LVL 12

Accepted Solution

by:
Phil_Agcaoili earned 300 total points
ID: 18043567
As of 31/10/2006 193.238.38.225 is www.ultra-search.biz 

Sometimes the firewall logs lose track of state.
Have you looked to see if there are any source logs from 193.238.38.225?
If so, what port does it say is associated as the source port? TCP/80?

ultra-search.biz is a search engine site, but from what I've seen it's used only by spyware.


Have you tried using a tool like fport? fport reports all open TCP/IP and UDP ports and maps them to the owning application.
http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/proddesc/fport.htm

Even if you cannot isolate what malware is loaded on your system, you can determine when and what application is talking to 193.238.38.225.

I also suggest trying other antispyware tools such as Windows Defender, Spy Sweeper, etc. since Spybot alone cannot detect all spyware.
0
 
LVL 47

Assisted Solution

by:rpggamergirl
rpggamergirl earned 100 total points
ID: 18044004
Can we look at a hijackthis log? it might show something.

Please download HijackThis 1.99.1
http://www.cyberanswers.org/forum/uploads/HijackThis1991.exe
Open Hijackthis, click "Do a system scan and save a logfile" don't fix anything yet.

Then upload the logs to any hosting sites,
or go to the below link and login using your Experts-Exchange username and password.
http://www.ee-stuff.com
Click on "Expert Area" tab
type or paste the link to your Question
"Browse" your pc to the location of your Hijackthis log and click "Upload"
Copy the resulting "url" and post it back here.

OR: paste the log to either of these sites:
1. http://www.rafb.net/paste/
then at the bottom left corner click "paste"
Copy the address/url and post it here.

2. or at --> http://www.hijackthis.de/ 
and click "Analyse", click "Save".  Then post the link to the saved list here.


Also try this scanner, it's very good.
Download and install Superantispyware
http://www.superantispyware.com/downloadfile.html?productid=SUPERANTISPYWAREFREE
Load Superantispyware and click the "check for updates" button.
Once the update is finished, close SuperAntispyware again, we'll perform the scan later in safe mode

* Start Superantispyware.
Click the "scan your computer" button.
Check "Perform Complete Scan" and then next.
Superantispyware will now scan your computer and when its finished it will list all the infections it has

found.
Make sure that they all have a check next to them and press next.
Click finish and you will be taken back to the main interface.
Click "Preferences" and then click the "statistics/logs" tab. Click the dated log and press view log and a

text file will appear.
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Many functions in Excel can make decisions. The most simple of these is the IF function: it returns a value depending on whether a condition you describe is true or false. Once you get the hang of using the IF function, you will find it easier to us…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now