Trojan pdhtil to site 10g.org

W

Walter Horowitz

I'm trying to fix a friends computer that has been infected with a Trojan.
The machine tries to access the site http://10g.org when he logs on. The
HTTP request it makes is included below.

The trojan creates a value in HKLM\Software\Microsoft\Windows\Current
Version\Run\pidhtil with string value "rundll32
C:\WINNT\system32:pidhtil.dll, Init 1"

If this key is deleted, it is recreated within 5 seconds. If I kill the
rundll32 process that does this, then the current explorer.exe process takes
over. If I kill the explorer.exe process, then taskman.exe or some other
process does it. I suspect that some system dll has been changed to contain
the Trojan code and when any appropriate task calls the common routine, then
the Trojan does its thing. I have not been able to identify the Trojan yet.
This will happen even if I start the machine in Safe Mode.

I have been unable to find any reference to pidhtil or 10g.org by searching
for strings on his machine. Does anyone have any idea on how to find and
remove this beastie


Frame 82 (365 bytes on wire, 365 bytes captured)
Arrival Time: Mar 21, 2004 14:21:43.602484000
Time delta from previous packet: 0.000379000 seconds
Time relative to first packet: 97.366265000 seconds
Frame Number: 82
Packet Length: 365 bytes
Capture Length: 365 bytes
Ethernet II, Src: 00:00:86:38:ba:90, Dst: 00:a0:c5:e1:3e:f4
Destination: 00:a0:c5:e1:3e:f4 (192.168.0.1)
Source: 00:00:86:38:ba:90 (192.168.0.3)
Type: IP (0x0800)
Internet Protocol, Src Addr: 192.168.0.3 (192.168.0.3), Dst Addr:
66.98.188.91 (66.98
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 351
Identification: 0x0043 (67)
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 128
Protocol: TCP (0x06)
Header checksum: 0x39ed (correct)
Source: 192.168.0.3 (192.168.0.3)
Destination: 66.98.188.91 (66.98.188.91)
Transmission Control Protocol, Src Port: 1029 (1029), Dst Port: http (80),
Seq: 24300
Source port: 1029 (1029)
Destination port: http (80)
Sequence number: 2430045908
Next sequence number: 2430046219
Acknowledgement number: 3588306347
Header length: 20 bytes
Flags: 0x0018 (PSH, ACK)
0... .... = Congestion Window Reduced (CWR): Not set
.0.. .... = ECN-Echo: Not set
..0. .... = Urgent: Not set
...1 .... = Acknowledgment: Set
.... 1... = Push: Set
.... .0.. = Reset: Not set
.... ..0. = Syn: Not set
.... ...0 = Fin: Not set
Window size: 65535
Checksum: 0x138c (correct)
Hypertext Transfer Protocol
POST /cgi-bin/ref.cgi?Sun%20Mar%2021%2015%3A22%3A44.489%202004
HTTP/1.0\r\n
Request Method: POST
Host: l0g.org\r\n
Content-Type: application/x-www-form-urlencoded\r\n
Content-Length: 40\r\n
Accept: */*\r\n
Accept-Language: en\r\n
Accept-Encoding: gzip, deflate\r\n
User-Agent: AF/2.6-test35\r\n
Connection: close\r\n
\r\n
Data (40 bytes)
0000 69 64 3d 34 30 35 38 30 32 31 31 37 31 26 76 65 id=4058021171&ve
0010 72 3d 32 36 33 35 26 73 79 73 3d 57 69 6e 4e 54 r=2635&sys=WinNT
0020 35 2e 30 2d 32 31 39 35 5.0-2195
 
J

jeff

Walter said:
I'm trying to fix a friends computer that has been infected with a Trojan.
The machine tries to access the site http://10g.org when he logs on. The
HTTP request it makes is included below.
Walter, I've got this too. Macafee doesn't clear it either.
 
D

David H. Lipman

1) Download the following three items...

Trend Sysclean Package
http://www.trendmicro.com/download/dcs.asp

Latest Trend signature files.
http://www.trendmicro.com/download/pattern.asp

Adaware SE (free personal version v1.05)
http://www.lavasoftusa.com/

Create a directory.
On drive "C:\"
(e.g., "c:\New Folder")
or the desktop
(e.g., "C:\Documents and Settings\lipman\Desktop\New Folder")

Download SYSCLEAN.COM and place it in that directory.
Download the Trend Pattern File by obtaining the ZIP file.
For example; lpt365.zip

Extract the contents of the ZIP file and place the contents in the same directory as
SYSCLEAN.COM.

2) Update Adaware with the latest definitions.
3) If you are using WinME or WinXP, disable System Restore
http://vil.nai.com/vil/SystemHelpDocs/DisableSysRestore.htm
4) Reboot your PC into Safe Mode and shutdown as many applications as possible.
5) Using both the Trend Sysclean utility and Adaware, perform a Full Scan of your
platform and clean/delete any infectors/parasites found.
(a few cycles may be needed)
6) Restart your PC and perform a "final" Full Scan of your platform using both the
Trend Sysclean utility and Adaware
7) If you are using WinME or WinXP,Re-enable System Restore and re-apply any
System Restore preferences, (e.g. HD space to use suggested 400 ~ 600MB),
8) Reboot your PC.
9) If you are using WinME or WinXP, create a new Restore point

* * * Please report back your results * * *


--
Dave
http://www.claymania.com/removal-trojan-adware.html



|
| Walter Horowitz wrote:
| > I'm trying to fix a friends computer that has been infected with a
| Trojan.
| > The machine tries to access the site http://10g.org when he logs on.
| The
| > HTTP request it makes is included below.
| >
| Walter, I've got this too. Macafee doesn't clear it either.
|
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top