I was notified by my internet provider that I downloaded 87 gb worth of data in one day. While this may be trivial downloads to Netflix customers - I was not even home.
I scanned the system with full versions of Malwarebytes and Kaspersky (and neither found anything).
I then started a VM that had ClamAV on it, updated ClamAV, and started the scan.
It found....
win.trojan.ramnit -2215
virtool.clearlog found
win.worm.palevo-4055
For some reason this is where Malwarebytes decided to kick in on the machine, and it started popups all over the screen (blank windows), but stating malware was found.
I dug further and found that my hard drive was nearly full (temporary internet files starting with $ (numeric values)
There were folders that were locked, and I was unable to access. i.e. (folders that you would have normal access to).
I found all sorts of folders and files that were created in Windows/System32 dir and the list goes on...
What is strange is the system acted "completely normal" given that it was pwned. It was not sluggish, and until I started the scans, it seemed relatively "ok".
I knew that this system was completely pwnd, and was most likely downloading other variants of malware, which brings me to my original problem...
I cannot tell which malware infected the system, and where to attack.
I low-level wiped the HDD once (and reinstalled Win7 64 bit) - the world was good, and all was well.
Then I connected to the internet.
I was updating Windows updates, Malwarebytes, and Kaspersky
You guessed it - my HDD space was completely full a few hours later, and I found certain folders were inaccessable by the Admin account.
Sadly - I had fully updated (again) Malwarebytes and Kaspersky - which found nothing.
I am in the process of a low level wipe of the system again.
I have loaded up a temporary laptop on the home network and am NOT experencing any problems (thinking it could be an infected Cisco router???)
I am 1/2 way done, and no problems thusfar.
Now I am concerned... I have an HP Phoenix h9-1210t and wondering where this persistence infection is hiding. To be persistent you need either RAM or storage (which makes sense) I have killed the RAM - just by shutting the system off. Where could this malware be hiding?
I thought BIOS - but is that possible?
If so, I am having problems just getting the BIOS to boot from CD - it does not allow me to change the boot order.
I thought this may be due to the system being UEFI - again, I am unsure.
Any thoughts you have would be most appreciated.
I am beyond frustrated and would appreciate direction.
Thank you in advance...
I scanned the system with full versions of Malwarebytes and Kaspersky (and neither found anything).
I then started a VM that had ClamAV on it, updated ClamAV, and started the scan.
It found....
win.trojan.ramnit -2215
virtool.clearlog found
win.worm.palevo-4055
For some reason this is where Malwarebytes decided to kick in on the machine, and it started popups all over the screen (blank windows), but stating malware was found.
I dug further and found that my hard drive was nearly full (temporary internet files starting with $ (numeric values)
There were folders that were locked, and I was unable to access. i.e. (folders that you would have normal access to).
I found all sorts of folders and files that were created in Windows/System32 dir and the list goes on...
What is strange is the system acted "completely normal" given that it was pwned. It was not sluggish, and until I started the scans, it seemed relatively "ok".
I knew that this system was completely pwnd, and was most likely downloading other variants of malware, which brings me to my original problem...
I cannot tell which malware infected the system, and where to attack.
I low-level wiped the HDD once (and reinstalled Win7 64 bit) - the world was good, and all was well.
Then I connected to the internet.
I was updating Windows updates, Malwarebytes, and Kaspersky
You guessed it - my HDD space was completely full a few hours later, and I found certain folders were inaccessable by the Admin account.
Sadly - I had fully updated (again) Malwarebytes and Kaspersky - which found nothing.
I am in the process of a low level wipe of the system again.
I have loaded up a temporary laptop on the home network and am NOT experencing any problems (thinking it could be an infected Cisco router???)
I am 1/2 way done, and no problems thusfar.
Now I am concerned... I have an HP Phoenix h9-1210t and wondering where this persistence infection is hiding. To be persistent you need either RAM or storage (which makes sense) I have killed the RAM - just by shutting the system off. Where could this malware be hiding?
I thought BIOS - but is that possible?
If so, I am having problems just getting the BIOS to boot from CD - it does not allow me to change the boot order.
I thought this may be due to the system being UEFI - again, I am unsure.
Any thoughts you have would be most appreciated.
I am beyond frustrated and would appreciate direction.
Thank you in advance...