• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

System reset and viruses

Joined
Dec 13, 2011
Messages
433 (0.09/day)
Processor Core i5 3470 (3.20 GHZ)
Cooling Intel OC27vv
Memory 16 GB DDR3 667mhz
Video Card(s) XFX Radeon HD 5670
Storage Seagate - 500GB | 7200RPM | 32MB Cache | Sata-3G
Display(s) BenQ RL2455
Case Dell Tower
Audio Device(s) On-board
Power Supply Corsair 600w
Can a computer virus possibly survive a factory reset? A friend brought over a heavily infected Windows 10 machine. I couldn't get anything to work as far as removing the infections. After performing a factory reset, it was infected about a day later. The virus that keep popping up, is koobface.
 
Koobface is network hacking worm that attacks Microsoft Windows, Mac OS X, and Linux platforms.[1][2][3] This worm originally targeted users of the networking websites like Facebook, Skype, Yahoo Messenger, and email websites such as GMail, Yahoo Mail, and AOL Mail. It also targets other networking websites, such as MySpace, Twitter,[4] and it can infect other devices on the same local network.[5] This infection allows an attacker to access users' personal information such as banking information, passwords, or personal identity (IP address). It is considered a security risk and should be removed from the network.[6 (from wilki )

you may have removed it with a factory reset but i very much doubt it
Factory reset only restores the O/s if the nasty is on this pc you need to wipe the hard disk and re install from safe secured non infected media
then before the pc goes on line you NEED A/V installed
Once you have A/V and anti malware installed you can go online to update what needs updating
 
Last edited:
more info From Wilki
Infection
Koobface ultimately attempts, upon successful infection, to gather login information for FTP sites, Facebook, Skype, and other social media platforms, and any sensitive financial data as well.[7] It then uses compromised computers to build a peer-to-peer botnet. A compromised computer contacts other compromised computers to receive commands in a peer-to-peer fashion. The botnet is used to install additional pay-per-install malware on the compromised computer and hijack search queries to display advertisements. Its peer-to-peer topology is also used to show fake messages to other users for the purpose of expanding the botnet.[8] It was first detected in December 2008 and a more potent version appeared in March 2009.[9] A study by the Information Warfare Monitor, a joint collaboration from SecDev Group and the Citizen Lab in the Munk School of Global Affairs at the University of Toronto, has revealed that the operators of this scheme have generated over $2 million in revenue from June 2009 to June 2010.[7]

Koobface originally spread by delivering Facebook messages to people who are "friends" of a Facebook user whose computer had already been infected. Upon receipt, the message directs the recipients to a third-party website (or another Koobface infected PC), where they are prompted to download what is purported to be an update of the Adobe Flash player. If they download and execute the file, Koobface can infect their system. It can then commandeer the computer's search engine use and direct it to contaminated websites. There can also be links to the third-party website on the Facebook wall of the friend the message came from sometimes having comments like LOL or YOUTUBE. If the link is opened the trojan virus will infect the computer and the PC will become a Zombie or Host Computer.

Among the components downloaded by Koobface are a DNS filter program that blocks access to well known security websites and a proxy tool that enables the attackers to abuse the infected PC. At one time the Koobface gang also used Limbo, a password stealing program.

Several variants of the worm have been identified:

 
Last edited:
If there is a factory restore partition, that is most likely corrupted. Have seen "ransom ware" hide there.

So a complete wipe of the hard drive may be in order. If you just restore the "C" drive then try Malwarebytes in a custom scan of both "C" & "D" drives.

https://www.malwarebytes.org/antimalware/
 
Also, if your friend has more partitions and/or other drives... scan them... it is a worm that transports itself through other downloaded/transferred files.
Do not run any downloaded video, music, programs, or other files... until you do a very updated thorough scan of everything.

Even their "Favorites" could be link to fake sites that could be a possible re-infection point...

Easier, if you friend does not need anything saved, wipe it and start over.

Some good info on W32.Koobface from Symantec.


_________________________________________________________________________________________________________________________________________________________

As a side note, if you (anyone, not directed at any particular members) post info that is from another site and it is a quote... please note it as a quote; also, if you would link to or state the source.
Give credit where credit is due.
 
Last edited:
It appears that my friend fell for a scam. After removing some infections with Malwarebytes, I noticed a text document on the desktop. The text document was named "Rick Support". Inside of the document, it contains the following:


Microsoft Technician
*********************************************
Remove koobface
Remove all the infection
Remove junks and cookies
Update all of the stoped service
Install Network Security
Install Avg

********************************************

network security for one year + Avg security for one year + 6 month tech support
 
Sadly I see this all the time. Some people invite them in
 
It appears that my friend fell for a scam. After removing some infections with Malwarebytes, I noticed a text document on the desktop. The text document was named "Rick Support". Inside of the document, it contains the following:

With regards to "some", is the machine clean at this point or are there additional issues still in play?
 
It appears that my friend fell for a scam. After removing some infections with Malwarebytes, I noticed a text document on the desktop. The text document was named "Rick Support". Inside of the document, it contains the following:


Microsoft Technician
*********************************************
Remove koobface
Remove all the infection
Remove junks and cookies
Update all of the stoped service
Install Network Security
Install Avg

********************************************

network security for one year + Avg security for one year + 6 month tech support



If your friend used a CC, Debit card, checking account or some other form of security/payment, then, they better get moving to cancel the, probably, outrageous price they will be charged; and the, more than likely, recurring charges for continued subscription to the scam.

Personally, I would wipe and start over; especially if they let the person remote in to clean/troubleshoot and install anything.
 
If your friend used a CC, Debit card, checking account or some other form of security/payment, then, they better get moving to cancel the, probably, outrageous price they will be charged; and the, more than likely, recurring charges for continued subscription to the scam.

Personally, I would wipe and start over; especially if they let the person remote in to clean/troubleshoot and install anything.

A BIG +1 to the above^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
 
I would do a clean Windows install and be done with it. I've gotten a virus before that malewarebytes couldn't detect and remove and the googled fix for it didn't work either. There's some truly nasty viruses out there. One thing you might want to pass along to your friend if he runs across a screen while surfing that won't let you close the page unless you click on it then use task manager to close it.
 
Back
Top