Removing Malware

Discussion in 'Security Discussion' started by PimpDaddyC, Mar 5, 2016.

Removing Malware
  1. Unread #1 - Mar 5, 2016 at 3:23 AM
  2. PimpDaddyC
    Joined:
    Nov 5, 2015
    Posts:
    82
    Referrals:
    0
    Sythe Gold:
    0

    PimpDaddyC Member
    Banned

    Removing Malware

    Hey Sythe, Pimp here. Wrote this guide for my clan about a month ago and figured i'd share with you all too!


    I notice a lot of people thinking they might be ratted, or getting hacked out of the blue and having their pins bypassed, so i'll make a little guide on how to check for malware, and remove it.

    First off, you're probably asking what a RAT is. Simply put, a "RAT" is a remote administration tool. Most remote administration tools can be used for legal purposes (Teamviewer is a good example of a remote administration tool that is used legally among many people) but many are used for illegal purposes, such as keylogging, password stealing, using your computer as a slave to mine crypto-currencies, hit people offline, and so on. The possibilities are endless.

    Computers usually get infected by opening infected files such as .exe's, .jar's, or .scr's. While it is rare, there is some exploits out there to infect .doc's and .pdf files, so be careful that you do not open these types of extensions from unknown sources. Also please do not get paranoid and think all of these file extensions are infected, as there is many programs that use them and are clean. If you're ever skeptical about running software, run it sandboxed, and/or on a virtual machine. You can download sandboxie here: http://www.sandboxie.com/index.php?DownloadSandboxie I'll write a guide in the future about setting up a virtual machine.

    Anyways, upon opening one of these infected files, the malware executes and is USUALLY enabled on startup. The reason people enable startup on malware is so it will re-connect to you next time you boot your computer and they do not lose you as an infect. With that being said, we can check our startup for anything suspicious.

    1. Navigate to your windows button, type system configuration, and click it.

    [​IMG]

    2. Now head over to your "Startup" tab and search for anything suspicious. Usually files with HKCU and unknown manufacturers are malware. Below in the picture i've underlined an example of a fake teamspeak on startup. This is how easy you can be tricked into thinking something isn't malware. By default i disable everything here, because these are just the files that load when you boot your computer.

    [​IMG]

    Now that you know the name of the file, you can check for it in your processes. Go to your windows button/search bar and type taskmgr.exe

    [​IMG]

    Search for the name of the file (in this case, we'll be looking for teamspeak.exe, the fake teamspeak) and end the process. Some malware might be renamed, and hidden from startup and you can still be infected, so we aren't done yet. Also some malware might pop up back on your processes after you exit it. Follow me.

    We're going to check %appdata% and %temp% for any files outside of folders.

    Navigate to %appdata% > Roaming

    [​IMG]

    Search for any files outside of folders, usually .exe or .jar, and delete them.

    [​IMG]

    Now we're going to do the same for %temp%

    [​IMG]

    Go ahead and delete all files in %temp% once you've navigated there. This can speed your PC up a lot if you haven't done this.


    [​IMG]

    Now finally we can check out our registry for anything hidden on startup. This is actually very interesting so pay attention.

    Navigate to windows button > type regedit.exe > click regedit.exe (lol)
    [​IMG]


    Click HKEY_CURRENT_USER
    [​IMG]


    Click Software.
    [​IMG]


    Click Microsoft.
    [​IMG]


    Click Windows.
    [​IMG]


    Click CurrentVersion
    [​IMG]

    Check your Run and Runonce folders for any malicious/suspicious files. Delete them.
    [​IMG]

    Congratulations. You've possibly just successfully removed fully undetectable malware all by yourself. Without any software. Cool huh?

    Now just to be safe, go run Malwarebytes and Kaspersky so they can pick up any other junk that you may have missed. (junk extensions for chrome/mozilla, etc etc.)
     
  3. Unread #2 - Mar 5, 2016 at 3:52 AM
  4. Jon
    Joined:
    Jun 11, 2011
    Posts:
    1,745
    Referrals:
    3
    Sythe Gold:
    11
    420 yolo swag blaze it fuck the popo legalize it anyone got some chips Two Factor Authentication User Easter 2016 Valentine's Day 2016 Community Development Team Member Tier 1 Prizebox Halloween 2015 Christmas 2015

    Jon Jon passed away July 20, 2016. May he rest in peace.
    $200 USD Donor New Cancer Warrior Heavenly

    Removing Malware

    Not a bad guide. Actually, you would want to boot into safe mode without network connections and then do these steps. That way if they have persistence on it is easier to kill. If there is persistence, the .exe/'server'/virus will just reboot itself. This USUALLY requires internet to work though.
     
  5. Unread #3 - Mar 5, 2016 at 6:30 PM
  6. PimpDaddyC
    Joined:
    Nov 5, 2015
    Posts:
    82
    Referrals:
    0
    Sythe Gold:
    0

    PimpDaddyC Member
    Banned

    Removing Malware

    That is true, forgot to include that :) Thanks!
     
  7. Unread #4 - Mar 6, 2016 at 11:22 PM
  8. FeelsBadMan
    Joined:
    Dec 6, 2015
    Posts:
    99
    Referrals:
    0
    Sythe Gold:
    0

    FeelsBadMan Member
    Banned

    Removing Malware

    Appreciate this, Nice guide
     
  9. Unread #5 - Mar 7, 2016 at 3:26 AM
  10. PimpDaddyC
    Joined:
    Nov 5, 2015
    Posts:
    82
    Referrals:
    0
    Sythe Gold:
    0

    PimpDaddyC Member
    Banned

    Removing Malware

    No problem yo
     
< Can Skype usernames still be resolved for ip's? | >

Users viewing this thread
1 guest


 
 
Adblock breaks this site