Wikiposts
Search
Computer/Internet Issues & Troubleshooting Anyone with questions about the terribly complex world of computers or the internet should try here. NOT FOR REPORTING ISSUES WITH PPRuNe FORUMS! Please use the subforum "PPRuNe Problems or Queries."

HTTP ZBOT activity

Thread Tools
 
Search this Thread
 
Old 1st Jan 2011, 23:34
  #1 (permalink)  
Thread Starter
 
Join Date: Feb 1998
Location: Formerly of Nam
Posts: 1,595
Likes: 0
Received 0 Likes on 0 Posts
HTTP ZBOT activity

I was a bit of a silly bastard the other day when I opened
an email (Subject: none) from a mate that said happy
new year with a supposed e-greeting that had an .exe
attachment.

Upon activating the .exe from WE downloads folder, Peter
Norton went completely nuts but did block it using its
Intrusion Prevention Lists.

After completing the recommended scan and deletions,
Norton still reports attacks almost every few minutes -

Attempted Intrusion "HTTP ZBOT Activity" from your
machine against ygla.ru(200.56.243.137) was detected
and blocked.
Intruder: localhost(3456).
Risk Level: High.
Protocol: TCP.
Attacked IP: ygla.ru(200.56.243.137).
Attacked Port: http(80).

Attempted Intrusion "HTTP ZBOT Activity" from your
machine against vpsnl.co.cc(212.117.180.245) was
detected and blocked.
Intruder: localhost(3466).
Risk Level: High.
Protocol: TCP.
Attacked IP: vpsnl.co.cc(212.117.180.245).
Attacked Port: http(80).


Is there any way to stop these attacks? Norton blocks it
each time so I'm safe, but I don't know if the problem is
now somewhere in the Registry.
Slasher is offline  
Old 2nd Jan 2011, 04:11
  #2 (permalink)  
 
Join Date: Jan 2008
Location: The Land of Beer and Chocolate
Age: 56
Posts: 798
Likes: 0
Received 0 Likes on 0 Posts
You have a nasty keylogger installed on your PC.

Symantec (since that is their name for it) say to make sure your AV is up to date and do a full system scan to remove it.

Also, this seems to be the full removal method.

How to remove Zeus (Zbot) - Zeus (Zbot) Removal | Malware Help. Org
hellsbrink is offline  
Old 2nd Jan 2011, 09:49
  #3 (permalink)  
 
Join Date: Dec 2005
Location: Wellington,NZ
Age: 66
Posts: 1,678
Received 10 Likes on 4 Posts
That url (200.56.243.137) produces an immediate antivirus block when connection is attempted; the AV info describes it as a malicious attack site.

As hellsbrink said, you have a malicious program (keylogger, or whatever) installed on your machine now that is attempting to connect outbound. Fortunately blocked by your AV.

MBAM is a very good demand scanner/cleaner. That's what I'd do next.
Tarq57 is offline  
Old 2nd Jan 2011, 09:58
  #4 (permalink)  
Thread Starter
 
Join Date: Feb 1998
Location: Formerly of Nam
Posts: 1,595
Likes: 0
Received 0 Likes on 0 Posts
Thanks for that link hellsbrink.

Repeated scans by Norton, Housecall and Superantispyware
appeared to have removed all traces of it in System32 and
the Registry, but yep a single bloody embedded HKEY_USER
register mentioned in your link was the friggin culprit for the
repeated attacks. REGEDIT took care of that.

Thanks again mate. Much appreciated.

Yeh I got the same thing on a Whois check Tarq.

PS: bloke who sent me that email was thoroughly verbally
trashed. Twit didn't even know that his machine had more
bots than an empty-packeted smokers meeting......
Slasher is offline  
Old 2nd Jan 2011, 10:34
  #5 (permalink)  
More bang for your buck
 
Join Date: Nov 2005
Location: land of the clanger
Age: 82
Posts: 3,512
Likes: 0
Received 0 Likes on 0 Posts
from sam spade
NS lookup 200.56.243.137
Canonicle name host112137.metrored.net.mx
green granite is offline  

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are Off
Pingbacks are Off
Refbacks are Off



Contact Us - Archive - Advertising - Cookie Policy - Privacy Statement - Terms of Service

Copyright © 2024 MH Sub I, LLC dba Internet Brands. All rights reserved. Use of this site indicates your consent to the Terms of Use.