Jump to content

Search the Community

Showing results for tags 'malware'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • BooT
    • Computahs
    • Games
    • Accessories+ Hardware
    • Break / Fix
  • Adventure
    • Hamdingers
    • Flicks n Pics n Paper
  • News & IRLs
    • Site News

Calendars

  • Community Calendar

Group


AIM


MSN


ICQ


Yahoo


Jabber


Skype


Location


Interests


GG


360-GT


PSN ID


NNID


Server


MMO


Nic

Found 1 result

  1. Botnet Removal Overview This thread is an overview on how to detect, identify and remove a botnet infection. This is merely one example of such an infection. Honestly the main reason I was able to detect it (before it was added to malware definition databases), is because of it's aggressive processor use. Bitcoin miners are extremely intense processes, to 98% CPU usage stood out like a sore thumb. This will be a 5-step & thread process on how I went about checking around and figuring out how this bitcoin miner was operating. There are various ways to go about the same methods, but I am sharing mine, in hopes it helps someone remove similar trash in the future. I will make a post in this thread for each process, to help describe the methods used, and hopefully do so in a clear manner. Steps used: Suspect and Detect Network Traffic PID to Process Explorer mapping Service, Payload and Command and Control targeting Potential Removal As for any infection, you have to be formidably sure you completely removed the infection, otherwise you are waiting for more damage down the road. Do you wish to reinstall the OS, or do you feel confident the exploit has been removed? This question is especially relevant in the business environment. Luckily I saw this on my personal machine, so I could afford more time to debug what was happening and log it. The attached picture should make more sense as you read each progressive step.
×