| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Trojan Blues |
From: Ellen K. Wow, whoever wrote that is good. :( On Wed, 28 Dec 2005 19:04:03 -0600, "Glenn Meadows" wrote in message : >OK, spent the day bashing one of our XP machines that seems to have been hit >by a Trojan, along with some other nefarious malware. > >Stared with a rouge install of Winhound, a bogus anti-spyware program. > >Got all that cleaned up, but there are remnants (active) of a Trojan >downloader that I've been unable to remove. > >The key to this, seems to be a file named: > >browsela.dll > >Goggling on that, give limited online information about it's removal, all >centered around using a tool called Killbox, which allows one to list >specific files to delete, as well as marking a file for deletion on the next >boot. The info on this DLL, is that it loads way early in the Windows boot >process, such that it can't be killed or deleted while windows is running in >any fashion. That includes running from a command line boot. > >When using Killbox to mark the file for deletion on the next boot, after >about 5 seconds, an error message comes up, that says that an external >process removed the entry for file rename at re-boot. Ergo, I've been >unable to delete the file. The info about the file is that it opens a >backdoor for hackers to download and run programs. > >I've even searched fully through the registry, and the running DLL will >re-add the registry keys when deleted. Even if I've run 4-5 times through >the registry, and deleted an browsela.dll entries/keys, and I get 2 full >searches of no entry found, then PULL THE PLUG on the computer, so that a >shutdown doesn't re-write the registry entry, the keys are back in place on >the next boot. I've been unable to find the process/file/startup entry >that's re-writing these entries. I've used HijackThis to scan the registry, >and all of the remaining entries LOOK like normal items. I've compared that >list to various goggled links that list files/keys to delete. > >One last thing...the Sophos Anti-Virus CLAIMS to be able to remove this >item. I'll be downloading a 30 day demo of their Small Business AV program, >to give it a try. AVG sees it, identifies it as a threat, claims that it's >removed it, but it's still there. > >There's NO hit in the Symantec Knowledge base on this file (all goggled >links appear to be VERY recent infections, as in the past 4-5 days... > >Anyone here have any other brilliant suggestions? > >I'm seriously thinking of removing the HD, strapping it in as a second drive >on another system, and deleteing the file from a different booted system. >Thoughts on that approach? --- BBBS/NT v4.01 Flag-5* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45) SEEN-BY: 633/267 270 5030/786 @PATH: 379/45 1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.