Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
jet_dee
May 20, 2007
Blah blah blah Nationstates is cool blah blah blah
Is there anyone here familiar with NoScript? I often browse ft.com (the Financial Times' website) but when clicking on links to op-eds in the bannerhead NoScript returns me to the front page and displays a notification about possible cross-scripting XSS attempts. Clicking the link again (or selecting Unsafe reload from the NoScript options) bypasses this but it's a bit annoying.
The same happens when clicking links to the site from other websites.

Would anyone advise whitelisting ft.com for XSS protection, in any case?

Adbot
ADBOT LOVES YOU

tjl
Aug 6, 2005

Hex Darkstar posted:

I think I ran into its Canadian counter part yesterday afternoon it was a U KASH ransomware that installed SST.C's bootkit. Nothing works on it in terms of dedicated anti-malware tools that i've seen MBAM kills the ransomware but doesn't detect the MBR infection it even stops TDSSKiller & aswMBR from starting as well. I did however have luck with a program I found while googling around, it is a tool called MBRFixyou can run inside windows in case you're doing remote support. I tried it on an XP machine yesterday and it was able to fix/purge the infected MBR and allow me to run TDSSKiller to make sure nothing else was lurking in the background. I'm not sure how dependable it is but this was a last resort thing for me so use it at your own risk if you decide to try it.
Dealt with this exact rootkit today also. Probably the worst I've seen yet.

I had the same issues getting anything to scan. It would cause Combofix to crash the PC (maybe due to a Win Vista issue) and TDSS killer would not launch even when renamed to iexplore.exe in safe mode. All the Malware scanners in my arsenal could only find the associated payloads. GMER found no rootkits. Finally got an older version of TDSSkiller from last November to run (v 2.8.15.0) which immediately found it. Did a final full scan with MalwareBytes; Google is not getting redirected, so I think it's gone. It certainly left a mark though, Windows Update and Firewall are toast.

Diva Cupcake
Aug 15, 2005

I've been reading 'Practical Malware Analysis' out of general curiosity/interest and building out a segregated VMware test lab. I'm not interested in having it compromise other systems so a 30 minute test VM lifecycle while I log WireShark and procmon activity is really all I want to do.

Short of clicking on every link in my in my spam folders, is there any other way to get sample malware? Malc0de has a repository for blacklisted IP addresses so perhaps rolling around in that bag of AIDS needles would suffice?

goobernoodles
May 28, 2011

Wayne Leonard Kirby.

Orioles Magician.
They got me.

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

Ozu posted:

I've been reading 'Practical Malware Analysis' out of general curiosity/interest and building out a segregated VMware test lab. I'm not interested in having it compromise other systems so a 30 minute test VM lifecycle while I log WireShark and procmon activity is really all I want to do.

Short of clicking on every link in my in my spam folders, is there any other way to get sample malware? Malc0de has a repository for blacklisted IP addresses so perhaps rolling around in that bag of AIDS needles would suffice?

http://www.kernelmode.info/forum/viewforum.php?f=16
http://contagiodump.blogspot.ca/

These are two places where you can get some malware to try out.

Diva Cupcake
Aug 15, 2005

Thank you sir. Also found a script on github that I may try out.

quote:

mwcrawler is a simple python script that parses malicious url lists from well known websites (i.e. MDL, Malc0de) in order to automatically download the malicious code. It can be used to populate malware repositories or zoos.

Currently the script parses the following sources:

NovCon Minotaur: http://minotauranalysis.com/malwarelist-urls.aspx
Malware Domain List: http://www.malwaredomainlist.com/hostslist/mdl.xml
VX Vault: http://vxvault.siri-urz.net/URL_List.php
Malc0de: http://malc0de.com/rss
Malware Black List: http://www.malwareblacklist.com/mbl.xml
Sacour.cn: http://www.sacour.cn

https://github.com/ricardo-dias/mwcrawler

NecessaryEvil
Aug 10, 2006
Professional Slacker
A question about the other side of the malware coin...is there something I can run as a batch file to forcefully remove McAfee VirusScan Enterprise 8.7?

Moneypak, Qakbot, and a bunch of other crap is hitting a lot more often, and the AV software they're using hasn't been updated in over a year because they let their subscription lapse; we need to get ESet put on there, but first we have to remove McAfee, and I'd hate to go around touching 200 computers.

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender
A batch script it is not, but try to use this tool:
http://support.microsoft.com/mats/program_install_and_uninstall/

It might be automatable but I do know it works for force-removals of most applications.

Khablam
Mar 29, 2012

NecessaryEvil posted:

A question about the other side of the malware coin...is there something I can run as a batch file to forcefully remove McAfee VirusScan Enterprise 8.7?

Moneypak, Qakbot, and a bunch of other crap is hitting a lot more often, and the AV software they're using hasn't been updated in over a year because they let their subscription lapse; we need to get ESet put on there, but first we have to remove McAfee, and I'd hate to go around touching 200 computers.

This is the post-removal uninstallation tool: http://service.mcafee.com/FAQDocument.aspx?id=TS101331

If they are 200 machines running the same version of windows configured in the same way, you should be able to Autohotkey the removal process; create an exe of the script and run it on all the machines, then run the above tool to complete.

ESET itself has a pretty simple network installation process.

NecessaryEvil
Aug 10, 2006
Professional Slacker
Yeah, pushing out the new Eset will be easy, it's just the removal of the old that I fear will be more difficult. Especially with no McAfee server that could potentially automate it.

And I'd have no clue how to create an exe.

pixaal
Jan 8, 2004

All ice cream is now for all beings, no matter how many legs.


NecessaryEvil posted:

Yeah, pushing out the new Eset will be easy, it's just the removal of the old that I fear will be more difficult. Especially with no McAfee server that could potentially automate it.

And I'd have no clue how to create an exe.

I'm not sure how to make an EXE in autoHotKey (I don't use it) But if you install AutoIt and rightclick a script there is a compile option. If you don't know either pick either one you should look up both and figure out which one you think will be easier to learn. AHK and AutoIt are very useful if you are doing stuff on a lot of computers.

Khablam
Mar 29, 2012

NecessaryEvil posted:

Yeah, pushing out the new Eset will be easy, it's just the removal of the old that I fear will be more difficult. Especially with no McAfee server that could potentially automate it.

And I'd have no clue how to create an exe.

If you know how to use either AHK or AutoIt, see: http://www.autohotkey.com/docs/Scripts.htm and scroll down to the section on ahk2exe.

Hex Darkstar
May 28, 2004

I think I need another liver transplant.
I offer this suggestion with no practical experience with doing so on a large scale I normally do this just when I need to do an uninstall remotely without bothering a user so this is a use at your own risk idea.

If these were managed by ePO you can also use the following registry location to pull an uninstaller msiexec command:

Windows 64 Bit Environments: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Network Associates\ePolicy Orchestrator\Application Plugins\VIRUSCAN8800\Uninstall Command

Windows 32 Bit Environments: HKEY_LOCAL_MACHINE\SOFTWARE\Network Associates\ePolicy Orchestrator\Application Plugins\VIRUSCAN8800\Uninstall Command

It looks like based on the version of VSE installed (VIRUSCAN8800, VIRUSCAN8700, VIRUSCAN8500) is it is always the same i.e. my VSE 8.8 installs are all:

msiexec /x {CE15D1B6-19B6-4D4D-8F43-CF5D2C3356FF} REMOVE=ALL REBOOT=R /q

Executing that command with admin rights results in VSE completely uninstalling silently from the target machine. This can also be issued using psexec over the network rather than having to deploy a batch to the users machines.

Hex Darkstar fucked around with this message at 19:22 on Apr 8, 2013

Wowporn
May 31, 2012

HarumphHarumphHarumph
A few days ago I got my first extra-toolbar virus in my dozen or so years of internetting, it was pretty exciting (but also terrifying to see on my nice new self built pc). I know literally nothing about the software side of computers, so it took me way longer than it should have to realize that disconnecting from the internet would stop it from bringing up another download window every time I hit the uninstall program button. I think it was called sweetpacks pro, and it was hilarious to see a bing search bar in it's horrible 1998 era design.

Also, does anyone know how to completely get rid of Avast! off of a computer? I have an old Dell laptop that I don't use very often, but every time I turn it on I get like 2 or 3 pop up windows telling me that I should buy a subscription, and I've deleted every file that has the word 'avast' in it already.

vx15i
Feb 9, 2003
There is a removal tool for avast you can try running if you haven't already:

http://www.avast.com/uninstall-utility

Wowporn
May 31, 2012

HarumphHarumphHarumph
Wow, that's so simple looking it sure makes me feel like a dumbass. Thank you!

spunkshui
Oct 5, 2011



Fiancée picked up a lovely redirect virus/thing. "defaultsearchbar.exe"

She insists searchbar.exe in her add/remove probrams for Ie and chrome have been on her computer since she started using it, but I'm pretty sure its all this virus.

Microsoft security essentials and spybot dont seem to be doing anything. (spybot was not installed when she got infected)

Its been years since I had to deal with a virus and I think I'm out of the loop.

I'm going to have her update her Java, but I need programs that can sweep the thing for her.

Any advice?

Otacon
Aug 13, 2002


Combofix?

Gothmog1065
May 14, 2009
There's a virus thread in Haus specifically for removal, should be pretty up to date.

spunkshui
Oct 5, 2011



Gothmog1065 posted:

There's a virus thread in Haus specifically for removal, should be pretty up to date.

This worked great, never needed combofix.

Turns our I was talking to another teacher in my department about this ordeal and he said his new tabs "keep changing to something else."

:stare:

So I forwarded the advice to him too.

1 last question: Is spybot useful anymore? Or am I just wasting CPU cycles because MSE is enough on its own...

edit: 4 seconds of Google tells me its garbage and I'm living in the past.

spunkshui fucked around with this message at 07:34 on Apr 16, 2013

mindphlux
Jan 8, 2004

by R. Guyovich
everyone always needs combofix, they just don't know it yet.



possible new thread title....

mindphlux
Jan 8, 2004

by R. Guyovich
I've come across something that causes google chrome to just say 'loading....' no matter what page you go to. I can't even get to the settings menu on this computer. I've uninstalled and reinstalled with no luck. I've combofixed it, checked for rootkits, malwarebytes, etc - nothing is coming up. hosts file is fine, dns server is being set properly. all other browsers work perfectly. anyone know this one?

tjl
Aug 6, 2005

mindphlux posted:

I've come across something that causes google chrome to just say 'loading....' no matter what page you go to. I can't even get to the settings menu on this computer. I've uninstalled and reinstalled with no luck. I've combofixed it, checked for rootkits, malwarebytes, etc - nothing is coming up. hosts file is fine, dns server is being set properly. all other browsers work perfectly. anyone know this one?
Yes I've seen something similar to this before. In my case, I was almost certain it was the resident Symantec AV interfering with the program. I never took the time to mess with the AV settings though. I removed Chrome from the client's computer and that was that. (They thought it was Firefox having problems; they didn't even use Chrome and had no idea how it got installed.)

This was a while ago, but if memory serves correct it was on WinXP Sp3, with Symantec Endpoint Protection 12.

Gweenz
Jan 27, 2011
Forgive me if this virus has been discussed ad nauseum, but this one is new to me. One of our clients calls up and says there are porn.exe files all over the server shares and that every directory on there has an .exe on it. Despite my desires to keep the virus contained at the client, my boss had me go pick up an infected workstation and bring it in to the shop. No biggie, as long as someone else doesn't connect it to the network when I'm not here, despite my warnings (they will). Anywho, I get it back here and stick a flash drive in it. The virus instantly changed my folder names to .exe extensions and sexy.exe, porn.exe, and x.mp4 files suddenly appeared. Neat!

After a little investigating, it turns out the virus simply copies the existing files, changes their file names, and hides the original files. It probably attaches the hook to every file so that unsuspecting users double click the new .exes and the hook is reinstalled. Not terribly sophisticated. However, since so many files on the server have been altered, I am concerned about 1. data loss and 2. reinfection. Wiping the workstations is only an option if I feel like spending the 12 hours per computer installing iTunes, spotify, toolbars, printers, etc, basically making it exactly like it was before (they are clients, I am not their boss. Otherwise I would wipe with extreme prejudice).

Anyone fought this thing before? Any tips?

tjl
Aug 6, 2005

Gweenz posted:

Forgive me if this virus has been discussed ad nauseum, but this one is new to me. One of our clients calls up and says there are porn.exe files all over the server shares and that every directory on there has an .exe on it. Despite my desires to keep the virus contained at the client, my boss had me go pick up an infected workstation and bring it in to the shop. No biggie, as long as someone else doesn't connect it to the network when I'm not here, despite my warnings (they will). Anywho, I get it back here and stick a flash drive in it. The virus instantly changed my folder names to .exe extensions and sexy.exe, porn.exe, and x.mp4 files suddenly appeared. Neat!

After a little investigating, it turns out the virus simply copies the existing files, changes their file names, and hides the original files. It probably attaches the hook to every file so that unsuspecting users double click the new .exes and the hook is reinstalled. Not terribly sophisticated. However, since so many files on the server have been altered, I am concerned about 1. data loss and 2. reinfection. Wiping the workstations is only an option if I feel like spending the 12 hours per computer installing iTunes, spotify, toolbars, printers, etc, basically making it exactly like it was before (they are clients, I am not their boss. Otherwise I would wipe with extreme prejudice).

Anyone fought this thing before? Any tips?
I've fought it once, and it can be a real pain in the rear end if they don't let you temporarily disable the shares. Re-infection is very likely if you don't remove every last trace of it, as well as the vector it uses to initially infect. This guide is a good start: http://www.welivesecurity.com/2012/12/07/autorun-worm-continues-to-turn/

FuriousB
Aug 4, 2003

Gweenz posted:

Forgive me if this virus has been discussed ad nauseum, but this one is new to me. One of our clients calls up and says there are porn.exe files all over the server shares and that every directory on there has an .exe on it. Despite my desires to keep the virus contained at the client, my boss had me go pick up an infected workstation and bring it in to the shop. No biggie, as long as someone else doesn't connect it to the network when I'm not here, despite my warnings (they will). Anywho, I get it back here and stick a flash drive in it. The virus instantly changed my folder names to .exe extensions and sexy.exe, porn.exe, and x.mp4 files suddenly appeared. Neat!

After a little investigating, it turns out the virus simply copies the existing files, changes their file names, and hides the original files. It probably attaches the hook to every file so that unsuspecting users double click the new .exes and the hook is reinstalled. Not terribly sophisticated. However, since so many files on the server have been altered, I am concerned about 1. data loss and 2. reinfection. Wiping the workstations is only an option if I feel like spending the 12 hours per computer installing iTunes, spotify, toolbars, printers, etc, basically making it exactly like it was before (they are clients, I am not their boss. Otherwise I would wipe with extreme prejudice).

Anyone fought this thing before? Any tips?

I have had this at several of my customers. Disabling network shares while you clean it is the only way to go. Also make sure to disable auto-run on the network through group policy. I have had good luck with the free Kaspersky removal tool here:

http://www.kaspersky.com/antivirus-removal-tool?form=1

Plus this tool to unhide files and remove the system file status:

http://download.cnet.com/Attribute-Changer/3000-2248_4-13676.html

It comes in through email attachments like those fake UPS ones, letting people know not to open this stuff sometimes helps as well.

Honey Im Homme
Sep 3, 2009

We got hit by this today too. Win32/Vobfus.PY / Win32.changeup ~ published 8 days ago apparently. Going to be fun and games tracking which of our 1400~ machines is infected. McAfee as useless as ever.

Current plan is to try and boot into Windows Defender offline via pxe, and just blitz each computer room at a time.

Honey Im Homme fucked around with this message at 17:57 on May 7, 2013

Khablam
Mar 29, 2012

Shoot the person who didn't disable autorun via Group Policy?

I'm not sure why you're in a situation where there's ~1400 machines and you'd need to manually clean each one; that's surely an area that needs massive and immediate review in your business.
At this point, someone can use a USB stick in a coffee shop, bring it in, and cause dozens of man-hours in damage in seconds.

Honey Im Homme
Sep 3, 2009

Khablam posted:

Shoot the person who didn't disable autorun via Group Policy?

I'm not sure why you're in a situation where there's ~1400 machines and you'd need to manually clean each one; that's surely an area that needs massive and immediate review in your business.
At this point, someone can use a USB stick in a coffee shop, bring it in, and cause dozens of man-hours in damage in seconds.

Its a school. Autorun is disabled via GPO. It was probably a retarded teacher or a malicious student(heavily restricted - probably jumped onto a logged on staff machine during a lesson or whatever).

beyonder
Jun 23, 2007
Beyond hardcore.

Honey Im Homme posted:

Its a school. Autorun is disabled via GPO. It was probably a retarded teacher or a malicious student(heavily restricted - probably jumped onto a logged on staff machine during a lesson or whatever).

I hope you don't teach anything more advanced than Office use. Back when I was studying managerial side of IT, we had a course on AD and Windows networking. Now guess how long and how many rogue DCs it took to get funding for separate lab network? Two years and about half dozen incidents, each one taking down half of the ~1500 workstations before being rectified.

Khablam
Mar 29, 2012

Back in the year 2000 I crippled my schools IT room by running a dumb EXE/trojan and infecting all the machines on that network.
It took IT staff about an hour to flatten the whole room and write the machines back from images. No files or software were local since it was a domain, serving userspace and programs centrally. The PCs were glorified thin clients. This was 13 years ago and it's a lot easier to achieve similar now.

What I'm trying to say is that the scenario you presented shouldn't be the scenario you're working with, and there are some pretty cheap solutions out there to get this working on a school budget.

When you pass 1000 machines, the break-even point on expensive prevention rather than costly (time) solutions is usually a single incident - and since you can be pretty sure a single incident will always happen, it's a no brainer.
Someone somewhere needs to implement a decent IT policy, there.

Khablam fucked around with this message at 22:28 on May 7, 2013

Honey Im Homme
Sep 3, 2009

Khablam posted:

Back in the year 2000 I crippled my schools IT room by running a dumb EXE/trojan and infecting all the machines on that network.
It took IT staff about an hour to flatten the whole room and write the machines back from images. No files or software were local since it was a domain, serving userspace and programs centrally. The PCs were glorified thin clients. This was 13 years ago and it's a lot easier to achieve similar now.

What I'm trying to say is that the scenario you presented shouldn't be the scenario you're working with, and there are some pretty cheap solutions out there to get this working on a school budget.

When you pass 1000 machines, the break-even point on expensive prevention rather than costly (time) solutions is usually a single incident - and since you can be pretty sure a single incident will always happen, it's a no brainer.
Someone somewhere needs to implement a decent IT policy, there.

That's great. Thanks.

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

Khablam posted:

Back in the year 2000 I crippled my schools IT room by running a dumb EXE/trojan and infecting all the machines on that network.
It took IT staff about an hour to flatten the whole room and write the machines back from images. No files or software were local since it was a domain, serving userspace and programs centrally. The PCs were glorified thin clients. This was 13 years ago and it's a lot easier to achieve similar now.

What I'm trying to say is that the scenario you presented shouldn't be the scenario you're working with, and there are some pretty cheap solutions out there to get this working on a school budget.

When you pass 1000 machines, the break-even point on expensive prevention rather than costly (time) solutions is usually a single incident - and since you can be pretty sure a single incident will always happen, it's a no brainer.
Someone somewhere needs to implement a decent IT policy, there.

This is generally overlooked by most systems administrators whose first reaction is to blame the anti-virus vendor as opposed to actually investigating what made it get into their systems in the first place. If one user has the ability to compromise network shares and create headaches for your 1,000+ machine network all through one false move, you have a problem with an infection as well as your IT policy.

Anti-virus solves the layer 8 problem only so much. It isn't bullet-proof and considering the type of infection previously indicated, it's the type that the AV vendors struggle with a lot.

Lain Iwakura fucked around with this message at 06:44 on May 8, 2013

syscall girl
Nov 7, 2009

by FactsAreUseless
Fun Shoe
Anybody have a quick fix for mysearchresults.com hijacking Chrome?

I'm pretty sure something similar was mentioned recently in this thread. I'm waiting for a refreshed malwarebytes to finish scanning and just thought I'd take a chance in here that someone had the obvious solution at hand.

mindphlux
Jan 8, 2004

by R. Guyovich
try adwcleaner. I'd combofix it too first, but I combofix everything. Then check installed programs, check plugins/extensions, run a hijackthis, check hosts, and run malwarebytes again.

mindphlux
Jan 8, 2004

by R. Guyovich
I feel dense asking this, but is there any good way to do hardcore disinfection on an entire network of machines?

Like, let's assume there was a 1000 user network, and 30% of the machines had rootkits.

I mean, if I ran a 1000 user network, I'd just have system images, not store user data locally, and flatten machines left and right, but even that would involve a lot of work setting up profiles and poo poo again for users? unless all their programs were web based and literally nothing was really local. But anyways, let's assume there's a mismanaged network of 1000.

Or, more realistically, what about a 50 user network not being managed like an enterprise / without system images? I assume there's not an easy way other than taking individual machines off the network and giving them a lot of personal attention - but just wanted a sanity check from y'all.

sfwarlock
Aug 11, 2007

mindphlux posted:

I feel dense asking this, but is there any good way to do hardcore disinfection on an entire network of machines?

Like, let's assume there was a 1000 user network, and 30% of the machines had rootkits.

I mean, if I ran a 1000 user network, I'd just have system images, not store user data locally, and flatten machines left and right, but even that would involve a lot of work setting up profiles and poo poo again for users? unless all their programs were web based and literally nothing was really local. But anyways, let's assume there's a mismanaged network of 1000.

Or, more realistically, what about a 50 user network not being managed like an enterprise / without system images? I assume there's not an easy way other than taking individual machines off the network and giving them a lot of personal attention - but just wanted a sanity check from y'all.

I say we dust off and nuke the site from orbit. It's the only way to be sure.

Dice Dice Baby
Aug 30, 2004
I like "faggots"

mindphlux posted:

I feel dense asking this, but is there any good way to do hardcore disinfection on an entire network of machines?

Like, let's assume there was a 1000 user network, and 30% of the machines had rootkits.

I mean, if I ran a 1000 user network, I'd just have system images, not store user data locally, and flatten machines left and right, but even that would involve a lot of work setting up profiles and poo poo again for users? unless all their programs were web based and literally nothing was really local. But anyways, let's assume there's a mismanaged network of 1000.

Or, more realistically, what about a 50 user network not being managed like an enterprise / without system images? I assume there's not an easy way other than taking individual machines off the network and giving them a lot of personal attention - but just wanted a sanity check from y'all.

No system images? drat. I'd bet on this, though

Honey Im Homme posted:

Current plan is to try and boot into Windows Defender offline via pxe, and just blitz each computer room at a time.

To try to get at the rootkits

Now, the user software, there are solutions to storing user profiles on your network... but since I don't really know your situation aside from what you described above, I rather not keep shooting in the dark :shobon:

Glans Dillzig
Nov 23, 2011

:justpost::justpost::justpost::justpost::justpost::justpost::justpost::justpost:

knickerbocker expert
I've had someone get hit by 2 variants of the "FBI found kiddie porn!" virus in one week. As it's the same person, I'm inclined to think that there was something I didn't get the first go round that let the PC get reinfected. Besides MBAM and ComboFix, what else am I forgetting to do here?

Adbot
ADBOT LOVES YOU

sfwarlock
Aug 11, 2007

Walter_Sobchak posted:

I've had someone get hit by 2 variants of the "FBI found kiddie porn!" virus in one week. As it's the same person, I'm inclined to think that there was something I didn't get the first go round that let the PC get reinfected. Besides MBAM and ComboFix, what else am I forgetting to do here?

Sing it with me:

o/ Backup, format, reinstall, doo dah
backup, format, reinstall, virus goes away! o/

  • Locked thread