Visit the Ironworks Gaming Website Email the Webmaster Graphics Library Rules and Regulations Help Support Ironworks Forum with a Donation to Keep us Online - We rely totally on Donations from members Donation goal Meter

Ironworks Gaming Radio

Ironworks Gaming Forum

Go Back   Ironworks Gaming Forum > Ironworks Gaming Forums > General Discussion > General Conversation Archives (11/2000 - 01/2005)

 
 
Thread Tools Search this Thread
Old 05-28-2004, 12:49 PM   #1
Raistlin Majere
Ra
 

Join Date: March 26, 2002
Location: Finland
Age: 36
Posts: 2,323
After running a routine virus-check, I found a virus named "Worm/Agobot.14.AP", but my virus program couldnt remove it! So its still on my computer, and I dont really see a way to remove it...Its located on a file named "C:\WINDOWS\SYSTEM32\ntsyskrnl.exe", so I can see why the program couldnt remove it, but Id like to now: 1)What is it, 2)What does it do and 3)How do I get rid of it. Any help would be welcome!

edit]After checking recent test results, it seems that nearly everytime the program has found a "hidden extension"...what can I do to prevent this?

[ 05-28-2004, 12:51 PM: Message edited by: Raistlin Majere ]
__________________
If the radiance of a thousand suns were to burst forth at once in the sky, that would be like the splendor of the Mighty One.

"I am become death, the destroyer of worlds."
Raistlin Majere is offline  
Old 05-28-2004, 01:02 PM   #2
Gnarf
Emerald Dragon
 

Join Date: February 6, 2003
Location: Norway
Age: 38
Posts: 928
Could be this thing (didn't find agobot.14.AP at the site, only agobot.AP).
__________________
I want a hippo.
Gnarf is offline  
Old 05-28-2004, 01:06 PM   #3
Raistlin Majere
Ra
 

Join Date: March 26, 2002
Location: Finland
Age: 36
Posts: 2,323
hmmm...I cant open the page! very odd...
__________________
If the radiance of a thousand suns were to burst forth at once in the sky, that would be like the splendor of the Mighty One.

"I am become death, the destroyer of worlds."
Raistlin Majere is offline  
Old 05-28-2004, 01:10 PM   #4
Mack_Attack
Osiris - Egyptian God of the Underworld
 

Join Date: May 22, 2001
Location: Sherwoodpark,Alberta,Canada
Age: 51
Posts: 2,929
Overview Technical Details Statistics





QUICK LINKS Solution | Critical Update

--------------------------------------------------------------------------------

Virus type: Worm

Destructive: Yes

Aliases: W32.HLLW.Gaobot.AO

Pattern file needed: 679 (0.679.03)

Scan engine needed: 5.600

Overall risk rating: Low

--------------------------------------------------------------------------------

Reported infections: Low

Damage Potential: High

Distribution Potential: High



--------------------------------------------------------------------------------

Description:


This memory-resident worm propagates through network-shared folders.

Like the earlier AGOBOT variant, WORM_AGOBOT.AN, it also exploits certain vulnerabilities to propagate across the network. It takes advantage of the following Windows vulnerabilities:

Remote Procedure Call (RPC) Distributed Component Object Model (DCOM) vulnerability
IIS5/WEBDAV Buffer Overflow vulnerability
For more information about these Windows vulnerabilities, please refer to the following Microsoft Web pages:

Microsoft Security Bulletin MS03-026
Microsoft Security Bulletin MS03-001.
This worm also has backdoor capabilities. It randomly opens a TCP port where it waits for connection from a remote user. It also connects to an IRC channel and waits for commands from a remote malicious user.

It allows a remote user to perform the following malicious actions:

Log off user
Shut down the machine
Reboot the machine
Connect to a different IRC server
Reconnect to an IRC server
Send raw message to the IRC server
Quit from the IRC session
Send a private message
Leave a channel
Print netinfo
Perform a mode change
Join a channel
Disconnect from IRC server
It also terminates antivirus-related processes and steals CD keys of certain game applications.

It is compressed with Neolite and runs on Windows 2000 and XP.

Solution:


AUTOMATIC REMOVAL INSTRUCTIONS

To automatically remove this malware from your system, please use Trend Micro Damage Cleanup Services.

MANUAL REMOVAL INSTRUCTIONS

Disconnecting Network Connection

Unplug the Unshielded Twisted Pair (UTP) cable that is normally located at the back of the machine to disconnect from the network and avoid reinfection.

Apply the proceeding instructions. Once the malware is completely removed from all the machines in the network, it is then safe to plug the UTP cable and reconnect to the network.

Terminating the Malware Program

This procedure terminates the running malware process from memory.

Open Windows Task Manager. Press
CTRL+SHIFT+ESC, and click the Processes tab.
In the list of running programs, locate the process:
CSRRS.EXE
Select the malware process, then press either the End Task or the End Process button, depending on the version of Windows on your system.
To check if the malware process has been terminated, close Task Manager, and then open it again.
Close Task Manager.
Removing Autostart Entries from the Registry

Removing autostart entries from the registry prevents the malware from executing during startup.

To remove the malware autostart entries:

Open Registry Editor. To do this, click Start>Run, type Regedit, then press Enter.
In the left panel, double-click the following:
HKEY_LOCAL_MACHINE>Software>Microsoft>
Windows>CurrentVersion>Run
In the right panel, locate and delete the entry:
%System32%CSRRS.EXE
Note: %System32% is the Windows system folder, which is usually C:\WINNT\System32 on Windows NT and 2000, and C:\Windows\System32 on Windows XP.

In the left panel, double-click the following:
HKEY_LOCAL_MACHINE>Software>Microsoft>Windows>
CurrentVersion>RunServices
In the right panel, locate and delete the entry or entries:
%System32%CSRRS.EXE
Close Registry Editor.
NOTE: If you were not able to terminate the malware process from memory as described in the previous procedure, restart your system.
Applying Patches

This malware exploits known vulnerabilities affecting the Windows NT platforms. Download and install the following to patch your system.


IIS5/WEBDAV vulnerability patch
Windows NT

http://microsoft.com/downloads/detai...displaylang=en

Windows NT Terminal Server

http://microsoft.com/downloads/detai...displaylang=en

Windows XP 32 bit

http://microsoft.com/downloads/detai...displaylang=en

Windows XP 64 bit

http://microsoft.com/downloads/detai...displaylang=en


DCOM Patch
WindowsNT

http://microsoft.com/downloads/detai...displaylang=en

WindowsNT Terminal Server

http://microsoft.com/downloads/detai...displaylang=en

Windows 2000

http://microsoft.com/downloads/detai...displaylang=en

WindowsXP 32bit

http://microsoft.com/downloads/detai...displaylang=en

WindowsXP 64bit

http://microsoft.com/downloads/detai...displaylang=en


RPC Patch
Windows NT

http://www.microsoft.com/downloads/d...displaylang=en

Windows NT Terminal Server

http://www.microsoft.com/downloads/d...displaylang=en

Windows 2000

http://www.microsoft.com/downloads/d...displaylang=en

Windows XP 32 bit

http://www.microsoft.com/downloads/d...displaylang=en

Windows XP 64bit

http://www.microsoft.com/downloads/d...displaylang=en

Windows 2003 server 64 bit

http://www.microsoft.com/downloads/d...displaylang=en

Refrain from using the affected software until the appropriate patch has been installed.

Additional Windows XP Cleaning Instructions

Running Trend Micro Antivirus

Scan your system with Trend Micro antivirus and delete all files detected as WORM_AGOBOT.AP. To do this, Trend Micro customers must download the latest pattern file and scan their system. Other Internet users can use HouseCall, Trend Micro’s free online virus scanner.

Trend Micro offers best-of-breed antivirus and content-security solutions for your corporate network, small and medium business or home PC.


Here ya go then.
__________________
Mack_Attack is offline  
Old 05-28-2004, 01:18 PM   #5
Gnarf
Emerald Dragon
 

Join Date: February 6, 2003
Location: Norway
Age: 38
Posts: 928
... but this (agobot.ik) one seems to be the only one dealing with ntsyskrnl.exe ... so I dunno which is right, if any. It's likely to be the .ik one, as it dissables access to, amongst others, that trendmicro site.

For agobot.ik:
Quote:
Description:


This AGOBOT variant is a network worm and a backdoor. It propagates into machines unpatched to the following vulnerabilities:
Remote Procedure Call (RPC) Distributed Component Object Model (DCOM) vulnerability
Microsoft Security Bulletin MS03-026
http://www.microsoft.com/technet/tre...n/MS03-026.asp
RPC Locator vulnerability
Microsoft Security Bulletin MS03-001
http://www.microsoft.com/technet/tre...n/MS03-001.asp
IIS5/WEBDAV buffer overrun vulnerability
Microsoft Security Bulletin MS03-007
http://www.microsoft.com/technet/tre...n/MS03-007.asp

It also uses a list of user names and passwords to propagate into machines with weak passwords.

This malware has backdoor capabilities. It allows remote users to manipulate infected systems and steal information, including game CD keys. It also terminates different programs, including antivirus and firewall applications.

It runs on Windows NT, 2000, and XP.

Solution:


Terminating the Malware Program

This procedure terminates the running malware process from memory.
Open Windows Task Manager. Press
CTRL+SHIFT+ESC, and click the Processes tab.
In the list of running programs, locate the process:
ntsyskrnl.exe
Select the malware process, then press either the End Task or the End Process button, depending on the version of Windows on your system.
To check if the malware process has been terminated, close Task Manager, and then open it again.
Close Task Manager.

Removing Autostart Entries from the Registry

Removing autostart entries from the registry prevents the malware from executing during startup.
Open Registry Editor. To do this, click Start>Run, type REGEDIT, then press Enter.
In the left panel, double-click the following:
HKEY_LOCAL_MACHINE>Software>Microsoft>Windows>
CurrentVersion>RunServices
In the right panel, locate and delete the entry:
System Kernel = "ntsyskrnl.exe"
In the left panel, double-click the following: HKEY_LOCAL_MACHINE>Software>Microsoft>Windows> CurrentVersion>Run
In the right panel, locate and delete the entry:
System Kernel = "ntsyskrnl.exe"
Close Registry Editor.

NOTE: If you were not able to terminate the malware process from memory as described in the previous procedure, restart your system.

Cleaning the HOSTS file

This malware added loopback addresses to your hosts file. Cleaning this would enable access to the Web sites.
Using Notepad, edit the file ?hosts? located in the %System%\drivers\etc folder.
Remove the lines containing the following sites:

avp.com
ca.com
customer.symantec.com
dispatch.mcafee.com
download.mcafee.com
f-secure.com
kaspersky.com
liveupdate.symantec.com
liveupdate.symantecliveupdate.com
mast.mcafee.com
mcafee.com
my-etrust.com
nai.com
networkassociates.com
rads.mcafee.com
secure.nai.com
securityresponse.symantec.com
sophos.com
symantec.com
trendmicro.com
update.symantec.com
updates.symantec.com
us.mcafee.com
viruslist.com
viruslist.com
www.avp.com
www.ca.com
www.f-secure.com
www.kaspersky.com
www.mcafee.com
www.my-etrust.com
www.nai.com
www.networkassociates.com
www.sophos.com
www.symantec.com
www.trendmicro.com
www.viruslist.com

Note: %System% is the Windows system folder, which is C:\WINNT\System32 on Windows NT and 2000, and C:\Windows\System32 on Windows XP.

Additional Windows XP Cleaning Instructions

Running Trend Micro Antivirus

Scan your system with Trend Micro antivirus and delete all files detected as WORM_AGOBOT.IK. To do this, Trend Micro customers must download the latest pattern file and scan their system. Other Internet users can use HouseCall, Trend Micro's free online virus scanner.

Applying Patches

Download the latest patch. Information and download links on the vulnerabilities exploited by the malware can be found at the following links:
Microsoft Security Bulletin MS03-026
Microsoft Security Bulletin MS03-001
Microsoft Security Bulletin MS03-007

Trend Micro offers best-of-breed antivirus and content-security solutions for your corporate network, small and medium business or home PC.
Edit: Link to that housecall thing: http://housecall.antivirus.com/
Also, you can try using system restore, starting the puter in safe-mode then deleting file or... something.

[ 05-28-2004, 01:28 PM: Message edited by: Gnarf ]
__________________
I want a hippo.
Gnarf is offline  
Old 05-28-2004, 01:58 PM   #6
Raistlin Majere
Ra
 

Join Date: March 26, 2002
Location: Finland
Age: 36
Posts: 2,323
When I open the task manager and end the process, instead of ending it, it just switches its place, but remains on the list! Damn, I dont like this thing at all...
__________________
If the radiance of a thousand suns were to burst forth at once in the sky, that would be like the splendor of the Mighty One.

"I am become death, the destroyer of worlds."
Raistlin Majere is offline  
Old 05-28-2004, 02:05 PM   #7
Gnarf
Emerald Dragon
 

Join Date: February 6, 2003
Location: Norway
Age: 38
Posts: 928
Tried starting the puter in safe mode? It's likely that the ntsyskrnl.exe thing won't be loaded then, and you can delete it.
__________________
I want a hippo.
Gnarf is offline  
Old 05-28-2004, 02:50 PM   #8
Raistlin Majere
Ra
 

Join Date: March 26, 2002
Location: Finland
Age: 36
Posts: 2,323
How do I boot in safe mode? I dont remember what I have to press on the start up...Im running XP pro., btw
__________________
If the radiance of a thousand suns were to burst forth at once in the sky, that would be like the splendor of the Mighty One.

"I am become death, the destroyer of worlds."
Raistlin Majere is offline  
Old 05-28-2004, 03:08 PM   #9
Bungleau
40th Level Warrior
 

Join Date: October 29, 2001
Location: Western Wilds of Michigan
Posts: 11,752
Hmmm... I think it's either F5 or F8 while you're booting. I can never remember which one, so I usually alternate between them, about once every second or so, during the boot process.

Good luck in killing it...
__________________
*B*
Save Early, Save Often Save Before, Save After
Two-Star General, Spelling Soldiers
-+-+-+
Give 'em a hug one more time. It might be the last.
Bungleau is offline  
Old 05-28-2004, 03:50 PM   #10
Gnarf
Emerald Dragon
 

Join Date: February 6, 2003
Location: Norway
Age: 38
Posts: 928
You can probably do it with F8 or something, or:
start > run > "msconfig" > "boot.ini" tab > check /safeboot. You'll be prompted to restart puter after clicking "OK", do so.

Uncheck /safeboot when you want puter to return to normal.
__________________
I want a hippo.
Gnarf is offline  
 


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is On

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
I found a virus in a webpage Harkoliar General Discussion 4 11-14-2006 07:45 AM
Found Via virus scan... LordKathen General Conversation Archives (11/2000 - 01/2005) 8 01-24-2005 01:00 AM
New 9-11 virus Jorath Calar General Conversation Archives (11/2000 - 01/2005) 7 09-14-2002 09:39 PM
First Reported JPEG Virus Found! Ziroc General Conversation Archives (11/2000 - 01/2005) 7 06-14-2002 04:15 AM
VIRUS-ALERT get anti virus patch here TheCrimsomBlade General Conversation Archives (11/2000 - 01/2005) 2 09-20-2001 12:17 AM


All times are GMT -4. The time now is 08:41 PM.


Powered by vBulletin® Version 3.8.3
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
©2024 Ironworks Gaming & ©2024 The Great Escape Studios TM - All Rights Reserved