Probable virus redirecting DNS queries

S

sdl;kfj

I'm pretty sure I'm dealing with a virus here, but it has me stumped. I've
run several of the majoy anti-virus, anti-malware programs available and
they did clean up quite a bit. However, I've still got one nagging problem.
All DNS requests for anti-virus sites return 127.0.0.1 (ping, tracert,
browser lookups, etc.) NSLookup yeilds the correct IP address. I've checked
and double checked the hosts and lmhosts file. They were at their defaults.
I've even tried adding my own entries into the hosts file and they were
ignored. (Yes, I've made sure that there is no extension on the hosts file.)
I don't know where else to look for anyting that will answer DNS queries.

Any help you could provide would be appreciated.

Ken
 
E

Elmo

sdl;kfj said:
I'm pretty sure I'm dealing with a virus here, but it has me stumped. I've
run several of the major anti-virus, anti-malware programs available and
they did clean up quite a bit. However, I've still got one nagging problem.
All DNS requests for anti-virus sites return 127.0.0.1 (ping, tracert,
browser lookups, etc.) NSLookup yields the correct IP address. I've checked
and double checked the hosts and lmhosts file. They were at their defaults.
I've even tried adding my own entries into the hosts file and they were
ignored. (Yes, I've made sure that there is no extension on the hosts file.)
I don't know where else to look for anything that will answer DNS queries.

Any help you could provide would be appreciated.

Ken

A Google search netted this possible cause/solution:

http://www.mihaiu.name/2005/windows-hosts-file-ignored/
 
1

1PW

I'm pretty sure I'm dealing with a virus here, but it has me stumped. I've
run several of the major anti-virus, anti-malware programs available and
they did clean up quite a bit. However, I've still got one nagging problem.
All DNS requests for anti-virus sites return 127.0.0.1 (ping, tracert,
browser lookups, etc.) NSLookup yields the correct IP address. I've checked
and double checked the hosts and lmhosts file. They were at their defaults.
I've even tried adding my own entries into the hosts file and they were
ignored. (Yes, I've made sure that there is no extension on the hosts file.)
I don't know where else to look for anything that will answer DNS queries.

Any help you could provide would be appreciated.

Ken

Hello Ken:

At least some likelihood exists that you are still infected with a
"DNSChanger" Trojan or variant.

Please reply with all manner of details that would help us to help you:

What exact OS are you using. What /are/ *ALL* the antimalware programs
you tried.

Some would have you "level and rebuild". However, some antimalware
solutions may further assist you in making that decision.

Are you familiar with MBAM and/or SAS?

Best wishes to you Ken.

Pete
 
S

sdl;kfj

1PW said:
Hello Ken:

At least some likelihood exists that you are still infected with a
"DNSChanger" Trojan or variant.

Please reply with all manner of details that would help us to help you:

What exact OS are you using. What /are/ *ALL* the antimalware programs
you tried.

Some would have you "level and rebuild". However, some antimalware
solutions may further assist you in making that decision.

Are you familiar with MBAM and/or SAS?

Best wishes to you Ken.

Pete

Sorry about that...
I'm running XP Pro SP2. I've run AVG 8.0, AntiVir, MBAM, Spybot S&D, and
Ad-Aware. I've never heard of SAS. I'll look for it and give it a try.

Thank for your help
Ken
 
S

sdl;kfj

1PW said:
Hello Ken:

At least some likelihood exists that you are still infected with a
"DNSChanger" Trojan or variant.

Please reply with all manner of details that would help us to help you:

What exact OS are you using. What /are/ *ALL* the antimalware programs
you tried.

Some would have you "level and rebuild". However, some antimalware
solutions may further assist you in making that decision.

Are you familiar with MBAM and/or SAS?

Best wishes to you Ken.

Pete

It turned out to be a rootkit. SAS (SuperAntiSpyware) caught it and cleaned
it up.

Thanks for all your help.

Ken
 
B

Buffalo

sdl;kfj wrote:
[snip]
It turned out to be a rootkit. SAS (SuperAntiSpyware) caught it and
cleaned it up.

Thanks for all your help.

Ken

Thanks for posting the rememdy and problem.
SAS and MBAM are two great free programs that catch and correct most malware
when used together (one at a time).
Buffalo
 
1

1PW

It turned out to be a rootkit. SAS (SuperAntiSpyware) caught it and cleaned
it up.

Thanks for all your help.

Ken

Hello Ken:

We are collectively happy for you. Buffalo is right on - we are very
pleased with SAS & MBAM.

Did SUPERAntiSpyware identify the malware specifically by name? Its
logs may have this if you don't remember.

Some will caution that your system may *NOT* have completely been
sanitized, and they may be unquestionably correct.

Proceed at your risk. At the very minimum, your system /may/ at least
be able to do a selective backup of your data files prior to "level and
rebuild". YMMV

Please don't thank just me - please thank those whose shoulders I stand
upon.

Good wishes to you,

Pete
 
K

Kayman

It turned out to be a rootkit. SAS (SuperAntiSpyware) caught it and cleaned
it up.

It wouldn't hurt to create a HJT log and post it to an appropriate forum
for expert examination.

Download and execute HiJack This! (HJT)
http://www.trendsecure.com/portal/en-US/tools/security_tools/hijackthis

Please, do not post HJT logs to this newsgroup.

Fora where you can get expert advice for HiJack This! (HJT) logs.

http://www.thespykiller.co.uk/index.php?board=3.0
http://www.spywarewarrior.com/viewforum.php?f=5
http://forums.tomcoyote.org/index.php?showforum=27
http://www.bleepingcomputer.com/forums/forum22.html
http://www.malwarebytes.org/forums/index.php?showforum=7
http://www.5starsupport.com/ipboard/index.php?showforum=18
http://www.theeldergeek.com/forum/index.php?s=2e9ea4e19d3289dd877ab75a8220bff6&showforum=29

NOTE:
Registration is required in any of the above mentioned fora before posting
a HJT log and read the 'stickies' (instructions/guidelines) for the
respective HJT forum.

Additional Information:
GMER - is an application that detects and removes rootkits.
http://www.gmer.net/index.php
http://antirootkit.com/forums/index.php?sid=9e746bb696ac0bb38781ffe4361c3a17

Good luck :)
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top