I won’t duplicate information contained on other websites, but I will refer to them here instead.
How your machine gets infected by Gumblar, or a “Gumblaroid” (Gumblar-type exploit) such as Martuz
How to determine if your PC has the infection
These were the symptoms that I noticed on my PC:
1. My Visual Studio .NET 2005 was crashing a lot, and I could not get any work done using it.
2. In Firefox 3, each search result would initially redirect to a bogus ad page (I always open search results in a new tab), but clicking the search result once more would open the genuine page.
3. I could not start cmd from the XP Start/Run menu item.
How I removed this malware from my PC
1. I installed and scanned my PC with Malwarebytes’ Anti-Malware, which found the single file – in my case it was C:\WINDOWS\ukvvq.qnx – that was keeping the infection active. Manually deleting it, or letting Anti-Malware attempt to delete it, would delete it, but the file would reappear almost immediately. Don’t worry if Anti-Malware is unable to update its definitions online – this is another symptom of Gumblar – it still detects it, though as something else.
2. I ran Hijackthis (I didn’t need a scan), chose “misc tools”, and chose “delete file on reboot” for this file (according to http://www.dynamicdrive.com/forums/showthread.php?p=194695).
3. I ran regedit and deleted the registry entry (according to http://www.dynamicdrive.com/forums/showthread.php?p=194695).
Unfortunately, it seems that several people resorted to rebuilding their machines from scratch.
How to remove the infection from a website
If you manage websites using an FTP program, there is a chance that your sites have become infected. The first thing you must do is change the ftp passwords after your machine has been cleaned.
As yet, I am unaware of any automated script which removes the infection from a website, so I wrote my own and applied it to 5 of the websites that I manage that were infected.
I started off using the script by rad-one at http://blog.unmaskparasites.com/2009/05/07/gumblar-cn-exploit-12-facts-about-this-injected-script/comment-page-1/#comment-896.
I modified it heavily to use PHP regular expressions, to remove the gumblar modifications in html, php, and js files (it scans files with all extensions except .bak). Unlike rad-one’s detection script, this one yielded zero false positives for me, and eradicated the infection completely, as far as I can tell.
Here is what my script does:
1. Recurses through the whole website, excluding files and/or directories of your choosing.
2. Applies regular expressions to remove the infection from all the files (except those with the .bak extension) in each directory.
3. All modified files are backed up using the .bak extension.
4. Removes all files with paths ending in /images/image.php or /images/gifimg.php.
5. Runs in report mode by default, so you can see which files would be modified.
6. Has a “verbose” option, so you can see how each file will be modified.
It does not change directory permissions. I haven’t got around to investigating that area yet.
You may download it here. (Use at your own risk.)
Instructions for use
- Place the file scan_files.php at your web document root.
- Invoke it with no parameters to run it in report mode, where no modifications will be made.
- Use scan_files.php?v=1 to run it in verbose mode.
- Use scan_files.php?u=1 to run it in update mode, where the modifications will actually be made.
- Use scan_files.php?u=1&v=1 to run it in both update and verbose modes.