Solved

removing malware and trojan

Posted on 2010-09-06
10
1,033 Views
Last Modified: 2013-11-22
Okay, I am a bit confused as to what my next step should be.  I am a network administrator/network security person for my company.  We have three servers, DC01, DC02 and EX01.  We use Windows 2003 for our servers, XP for workstations and Exchange 2003 for exchange services.  Last week we had someone do a baseline config on the HDD (servers).  When they returned and we put back online we noticed some issues.  When you double click to open the shared drive (on DC02) we get a DOS window that says at the top left PjSiEq.eXe.  I looked this up and noted it to be malware.  So, I ran malwarebytes on each server and workstation.  On the workstations I get "hijack.connectioncontrol" and on the server (DC02) I found a trojan (trojan.vundo) in the shared drive.  I quarantined both things but am having the same issue.  how do I return my system back to normal?

I ran my Norton and found nothing on servers or workstations.  I ran the Malwarebytes again and now find nothing on servers but still have the "hijack.connectioncontrol" on the workstations.  My users need the share drive.  Any assistance will be greatly appreciated.

This is a difficult one.
0
Comment
Question by:lpetrowicz
10 Comments
 
LVL 2

Expert Comment

by:kaar
ID: 33613735
you could download the Avira rescue boot CD and run on the workstations, choosing the rename options on threats found.

Cheers
Fabio
0
 
LVL 65

Expert Comment

by:rockiroads
ID: 33613767
have u tried running mb in safe mode?
0
 
LVL 65

Expert Comment

by:rockiroads
ID: 33613772
ha, wait a mo. I checked mb forums and it seems it might be a false positive. Something to do with group policy.
See this http://forums.malwarebytes.org/index.php?showtopic=45986
0
Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

 
LVL 4

Expert Comment

by:bigg_oil
ID: 33613790
check the registry key

HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Internet Explorer\control panel\ConnectionsTab (Hijack.ConnectionControl) -> Bad: (1) Good:

malwarebytes belives this to be a false positive
0
 
LVL 65

Expert Comment

by:rockiroads
ID: 33613828
mb has reported it to be a false positive so maybe you could try running another spyware checker and see what that produces. There is no harm in having two, Maybe run hijack this as well
0
 

Author Comment

by:lpetrowicz
ID: 33614013
I have read that and that only solves the minor workstation thing.  What about the bigger problem; when I click on my share drive and a DOS window opens reading PJSIEQ.EXE?  How do I indentify what the cause of this is if I have already run Antivirus and Malwarebytes?
0
 
LVL 22

Expert Comment

by:optoma
ID: 33614086
0
 
LVL 65

Expert Comment

by:rockiroads
ID: 33614161
you have tried running full scan in safe mode right?
as I said before, it might be worth trying out another spyware like superantispyware (has a free version). one of their pages also mentions PJSIEQ.EXE. http://www.superantispyware.com/malwaredailyfiles/2010-03-01.html
0
 
LVL 30

Accepted Solution

by:
Sudeep Sharma earned 500 total points
ID: 33615863

If the exe PJSIEQ.EXE is in your user profile and then probably your system is infected by virus named DunDun (W32/DunDun.a) (W32.SillyFDC).

Click on Start --> Run --> Type %UserProfile% and click ok. A window would open and you would see exe named PJSIEQ.EXE there (make sure that you select Show Hidden and System File in Explorer Folder Option)

More details:
http://www.threatexpert.com/report.aspx?md5=605787093d636b0f3c4720a88c9e5a89

Sudeep
0
 

Author Closing Comment

by:lpetrowicz
ID: 33651343
we did find a W32.Silly in one of our profiles.  Thanks.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Some of the most commonly posted questions in the "Virus & Malware" Zones are related to the family of rogue malware with the date "2012" somewhere in the title. Examples: XP Antispyware 2012 XP Antivirus 2012 XP Security 2012   XP Home Sec…
Learn about cloud computing and its benefits for small business owners.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question