How to remove a Dubrute virus from Server

We have a Windows 2003 server (member server of a domain) that is used for terminal service connections (remote desktop).  About once a week, the cable internet slow down to a crawl.  We rebooted the server the first couple of weeks, but last week I was trying to figure out why it was slow before we rebooted it.  I logged into it via remote desktop, looked at a few things like event viewer and Anti Virus status things then logged out of the remote desktop.  When I logged out, I got a strange little window that said something to effect of dubrute.exe closing.  It appeared as if my logging out forced this dubrute application to force itself to shutdown.  When my session logged, out, the internet jumped back up to normal speeds and the remote users worked fine for a few days.  Yesterday, the internet went back down to a crawl, and after I logged back into the server remotely again, the same thing happened when I logged out.  The dbrute little window popped open and I clicked OK to close it (I presume) and the internet jumped back up to normal speeds.

I have AVG Server edition installed on this server, and while it has found problems in the past, all the scans I run on it now are clean.  I ran malwarebytes as well, and that comes up clean.  I have checked the startup services and startup apps in the MSCONFIG window, and nothing is out of the ordinary.  I did a search in the registry for dubrute and nothing came up.  I checked all installed applications in add/remove programs and everything looks normal in there.  I checked the task manger yesterday when the internet was really slow and didn't see anything called dubrute running as a server.  I am thinking about running combofix, but because this is a server, I am nervous about doing that.  Any ideas???
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Yes.  Rebuild the server.  It's the only way to be 100% certain that the problem has been resolved.  You cannot - cannot - trust any host once it has been compromised.
Please do not use ComboFix on any server platform. It is not designed for it and is not recommended.

Both RogueKiller and Malwarebytes are server safe and you should use them as described in these EE Articles:

DUBrute is fairly old (June 2010) so most tools can handle it properly. Here is a link to an EE solution for this problem from last year:

In the FWIW department - there are rare occasions that I am not able to be confident that a system has been thoroughly cleaned - 2 or 3 times a year out of a couple of hundred incidents.

A complete system rebuild is not sufficient to eliminate some malware variants and it is better to use the tools that can get the job done right.

As soon as you get the system running properly, please make sure that you run all patches/updates for the OS and all applications.
jbobstAuthor Commented:
Thanks for the advice.  By the way younghv, I am curious how a system rebuild is not sufficient in eliminating problems?  If you format the hard drive, or just put in a new hard drive (they are very cheap) how can that not get rid of a virus???
Big Business Goals? Which KPIs Will Help You

The most successful MSPs rely on metrics – known as key performance indicators (KPIs) – for making informed decisions that help their businesses thrive, rather than just survive. This eBook provides an overview of the most important KPIs used by top MSPs.

There are malware variants that infect the MBR, hidden partitions on the HDD, and even the BIOS ROM. A new hard drive would solve for the first two examples, but not for the third.

This is from an earlier post here on EE:

Storing the malicious code inside the BIOS ROM could actually become more than just a problem for security software, giv[en] the fact that even if antivirus detect(s) and clean(s) the MBR infection,
A complete system rebuild is not sufficient to eliminate some malware variants and it is better to use the tools that can get the job done right.

That's absolutly wrong.  Furthermore, leaving a malware-infected production server connected to the network after "cleaning" the malware is in direct opposition to security best practices.

Not one of my corporate customers would stand for such a response.  A once-compromised system is an unnaceptable risk to the entire organization.

BTW - there's un underlying root cause analysis that should be done any time a server is infected with malware.  Are your server admins browsing the Internet from the server console with elevated privs?  Either an unpatched vulnerability was exploited, or this is the result of poor practice.  If you don't take the time to figure out - and correct - the root cause, you'll be doing this again... soon.
I stand by the comments I made and I think the link I provided (more if needed) is ample proof that there is existing malware that cannot be removed by formating/replacing a hard drive.

Malware discussions are often joined by those with differing opions, some more obnoxious than others.
Another article on the function of the mebromi virus:
This is a really good reason to set the write protection in your motherboards BIOS, and most boards have it.

Meanwhile, the environment you work in tends to shape the philosophy that you use.

In some cases, it can be better to simply re-image the system, especially where you have the resources to automate the task and all documentation to streamline the process. In a medium enterprise environment, I would tend to re-image the machine, but not before I determined the infection, and the source, if possible. Doing a procedure audit is a good move in larger environments as well.

In most cases, I prefer to clean the infection, as this is very expedient. Not all users or even companies have proper documentation and backups to rebuild the system, not all infections are actually difficult to remove, and only a few have residual infection potential.

Now, down to business, DUBrute is a hack tool, so it is possible that you have an interloper on your network. Simply cleaning the system in this case might not get you very much value, instead you might want to focus on entry vectors, and open ports that might not be needed. Checking router logs for suspicious traffic, or enhanced logging may help to pinpoint and block perpetrators.

Sophos anti-virus claims to be capable of removing this threat, and they are usually good at their word.

However, if it isn't showing up in programs or processes, it could reside on another system. I would look for listening ports that are not used for your installed apps, one article mentions port 3389.

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
jbobstAuthor Commented:
Sorry for the delay in closing this question.  Thanks for the information!
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Anti-Virus Apps

From novice to tech pro — start learning today.