• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1189
  • Last Modified:

join.me.exe - quarantined on a windows 2008 server and a windows 2003 server

Two of the servers I work with, located as separate schools, which have our Managed Antivirus running, have detected a file called join.me.exe and quarantined it.  Here is the path of the file on one of the servers:

C:\users\administrator\appdata\local\apps\2.0\02D4YAAV.6BL\2Y6ZKXGR.0KX\join..tion_43a0dbe7f0f75062_0001.0000_9871fcdc8aa605d7\join.me.exe

Should I take any action to try and clean my system further, other than deleting this item out of quarantine.  Has anyone seen this file get picked up as a Trojan.win32.generic!bt

Any advice on further action, dealing with this infection?
0
redemption7
Asked:
redemption7
2 Solutions
 
rmailCommented:
Remediation ideas:
1) Make sure your antivirus definitions are up to date,
2) Run a full scan on the suspect servers
3) Consider using another anti-virus or some anti-spyware for a second opinion, just make sure that you don't run the servers with two active antivirus products afterward. I scan my personal PCs with Malwarebytes (malwarebytes.org).

Prevention ideas:
1) Don't browse the internet as an administrator.
0
 
Leon FesterCommented:
You always want to clean quarantined files.
The name itself indicates that this is a malicious file.

Generally the settings in Windows Explorer are to "Hide extension of known file types"
So this file when included in an email or seen in explorer will only show as "join.me" and the ".exe" is hidden, so people will click on the file.

If you cannot remove the file, then check if you can remove all permissions from this file.
This ensure that the file cannot be excuted by anybody including the system.

For more information on how to remove this trojan, I'd suggest that you view the manufacturers website of the AV software you're using.

Some tips from Symantec:
http://www.symantec.com/business/support/index?page=content&id=TECH122466
0
 
ThreeShieldCommented:
I believe this is a false positive in a recent VMware vCenter Protect (Shavlik) antivirus pattern update.  

Users who used the join.me service (same company as LogMeIn) show up in the quarantine with this file on December 22, 2012 (or subsequent antivirus scan) regardless of download date.  In all cases that we have tested, users downloaded the file directly from the Join.Me website. The parent directory contains other files from the same vendor.

This program is often used by vendors to provide remote support.  It's a well-known product that doesn't deserve a "high risk" rating from VMware/Shavlik. (although by definition, it does provide interactive access to a remote machine -- but only a the user's permission)
0
 
redemption7Author Commented:
thank you
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now