Results 1 to 5 of 5

Thread: Trojan.Dumaru detected by scanners, but not by S&D!

  1. #1
    Junior Member
    Join Date
    Dec 2006
    Posts
    5

    Default Trojan.Dumaru detected by scanners, but not by S&D!

    I have kept the definitions up-to-date, and this seems to be an old virus.
    Yesterday boot scanning found:
    Trojan.Dumaru [Spyware Doctor]
    Backdoor.Nibu [Symantec]
    Troj/Dumaru [Sophos]
    Backdoor.Dumador [Kaspersky]
    Threat Level: High
    Author: Smash and SARS
    Advice: Toss
    Spybot S&D: Full system scan found only 3 local_machine\software\microsoft\Security Center Firewall & Antivirus\ setting changes.
    All product ignores are off.
    How can I get S&D to find & toss this well known old trojan?

  2. #2
    Member of Team Spybot tashi's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    30,961

    Default

    Hello.

    If Spybot-S&D does not detect an item please send the zipped file to: detections(AT)spybot.info (Replace AT with @)
    Microsoft MVP Reconnect 2018-
    Windows Insider MVP 2016-2018
    Microsoft Consumer Security MVP 2006-2016

  3. #3
    Junior Member
    Join Date
    Dec 2006
    Posts
    5

    Default Can you clarify?

    Thank you for responding so quickly.
    . Can you please clarify "an item please send the zipped file"
    . According to Spyware Doctor & Symantec descriptions of it, there appear to be dozens of 'things' that Trojan.Dumaru makes and does: registry entries, file modifications, emails, etc. Can you be more specific about 'the item'?
    . Also, I receive 'zip'ped files all the time from Microsoft Update, and I know how to get winXPh to 'compress' a folder & it's contents (?same as Zipped?), but I'm still not sure what you want me to provide, and I'm not sure if I can actually attach a compressed folder of files to an email.
    D.R.
    PS: Despite being logged in (it shows "Logged in as Dumaru revulsion" up to the right of this entry panel), when I click [Preview Post] below, it says "You are not logged in or you do not have permission to access this page.", and I'm afraid the site will discard my reply.
    PPS: re-logged in -> re-edit for this line ok

  4. #4
    Spybot Advisor Team [Retired] md usa spybot fan's Avatar
    Join Date
    Oct 2005
    Posts
    5,859

    Default

    Quote Originally Posted by Dumaru revulsion View Post

    . Can you please clarify "an item please send the zipped file"
    . According to Spyware Doctor & Symantec descriptions of it, there appear to be dozens of 'things' that Trojan.Dumaru makes and does: registry entries, file modifications, emails, etc. Can you be more specific about 'the item'?
    It would probably be helpful if you listed the actual objects that were identified by the various scans (registry entries, file modifications, emails, etc.) so that someone can make an informed decision as to what may be required to add this detection to Spybot-S&D.

    Getting an answer is one thing, learning is another.


    Microsoft Windows XP Home Edition running on a 2.40GHz Intel® Pentium® 4 Processor with 512 MB of RAM and a 533 MHz System Bus.

  5. #5
    Junior Member
    Join Date
    Dec 2006
    Posts
    5

    Default Some indicated objects

    . I'm not certain what you mean by 'objects', but the following are why I think my system is infected, and there are a lot of sites describing system files & values either used or manipulated by Trojan.Dumaru.
    . I hope this isn't just junk for you to dig thru.
    Content:
    . antivirus.about.com: Dumaru
    . Norton: Dumaru => W32.Dumaru@mm
    . Spyware Doctor: Dumaru, CaiShow
    . Spy Sweeper : Venusseek
    I noticed that one Dx scan identified it more specifically (accurately??) as "W32/Dumaru-E", another I can't reproduce as "Dumaru-B". (see http://www.sophos.com/virusinfo/anal...32dumarue.html)
    I don't remember seeing, but was also warned of the following by
    . _____________________________ . antivirus.about.com
    Antivirus Software: Dumaru Worm Pretends to Patch
    Aug 25 2003
    Mass-mailer with backdoor component
    The Dumaru worm arrives in an email pretending to be a security patch from Microsoft. In reality, it is a mass-mailing email worm that installs a backdoor component onto infected systems.
    The Dumaru worm's email arrives as follows:
    From: Microsoft
    Subject: Use this patch immediately !
    Body of the email:
    Dear friend , use this Internet Explorer patch now!
    There are dangerous virus in the Internet now!
    More than 500.000 already infected!
    Attachment: patch.exe
    The Dumaru takes advantage of hair-trigger alert notifications in many antivirus and filtering products. Rather than recognizing the infected email as a mass-mailing worm and simply discarding it, many popular security solutions send notifications to the sender, recipient, and/or system administrator. Dumaru falsifies the header information contained in the email, directing the Return-Path as follows:
    Return-Path: <admin@duma.gov.ru>
    . _____________________________ . Spyware Doctor
    Infection Risk Location
    Trojan.Dumaru High C:\PROGRAM FILES\Common Files\Real\WeatherBug\MiniBugTransporter.dll
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}##
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Control
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Control##
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Implemented Categories
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Implemented Categories##
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}##
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}##
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\InprocServer32
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\InprocServer32##
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\InprocServer32##ThreadingModel
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\MiscStatus
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\MiscStatus##
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\MiscStatus\1
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\MiscStatus\1##
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\ProgID
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\ProgID##
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Programmable
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Programmable##
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\ToolboxBitmap32
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\ToolboxBitmap32##
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\TypeLib
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\TypeLib##
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Version
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Version##
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\VersionIndependentProgID
    Trojan.Dumaru High HKCR\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\VersionIndependentProgID##
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}##
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Control
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Control##
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Implemented Categories
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Implemented Categories##
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}##
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}##
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\InprocServer32
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\InprocServer32##
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\InprocServer32##ThreadingModel
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\MiscStatus
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\MiscStatus##
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\MiscStatus\1
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\MiscStatus\1##
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\ProgID
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\ProgID##
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Programmable
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Programmable##
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\ToolboxBitmap32
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\ToolboxBitmap32##
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\TypeLib
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\TypeLib##
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Version
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\Version##
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\VersionIndependentProgID
    Trojan.Dumaru High HKLM\Software\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C}\VersionIndependentProgID##
    Instrs:
    Name W32/Dumaru-E
    Type · Worm
    Protection available since 29 September 2003 02:29:46 (GMT)
    Detected by All versions of Sophos Anti-Virus
    Included in our products from November 2003 (3.75)
    . ____________________________________ . ; These were also not found by Spybot:
    "Sweep with Spy Sweeper" to Windows Explorer
    Name Venusseek (eros) Unique Code NYT32 Type Adware Severity Very High
    Description : Venusseek (eros) is an adware program that may display advertisements on your system.
    Characteristics: Venusseek (eros) may display advertisements on your computer.
    Method of Infection: Venusseek (eros) generally propagates itself using dialog boxes, various social engineering methods, or through scripting errors. Usually adware and BHOs are bundled with various free software programs.
    Consequences: This program can display advertisements. It may also cause slowing of your Web browser and system performance issues.
    . ____________________________________ .
    Caishow Elev HKCR\CLSID\{3C78B8E2-6C4D-11D1-ADE2-0000F8754B99}
    Caishow Elev HKCR\CLSID\{3C78B8E2-6C4D-11D1-ADE2-0000F8754B99}##
    Caishow Elev HKCR\CLSID\{3C78B8E2-6C4D-11D1-ADE2-0000F8754B99}\InprocServer32
    Caishow Elev HKCR\CLSID\{3C78B8E2-6C4D-11D1-ADE2-0000F8754B99}\InprocServer32##
    Caishow Elev HKCR\CLSID\{3C78B8E2-6C4D-11D1-ADE2-0000F8754B99}\InprocServer32##ThreadingModel
    Caishow Elev HKLM\Software\Classes\CLSID\{3C78B8E2-6C4D-11D1-ADE2-0000F8754B99}
    Caishow Elev HKLM\Software\Classes\CLSID\{3C78B8E2-6C4D-11D1-ADE2-0000F8754B99}##
    Caishow Elev HKLM\Software\Classes\CLSID\{3C78B8E2-6C4D-11D1-ADE2-0000F8754B99}\InprocServer32
    Caishow Elev HKLM\Software\Classes\CLSID\{3C78B8E2-6C4D-11D1-ADE2-0000F8754B99}\InprocServer32##
    Caishow Elev HKLM\Software\Classes\CLSID\{3C78B8E2-6C4D-11D1-ADE2-0000F8754B99}\InprocServer32##ThreadingModel
    . ____________________________________ .
    Last edited by Dumaru revulsion; 2006-12-21 at 17:15. Reason: addendum

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •