We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Trojan:Win32/Alureon.CG
Aliases: Win32/Alureon.AEJ (CA) Win32/Almark.JU (ESET) Trojan.Win32.Agent.crez (Kaspersky) DNSChanger.t (McAfee) DNSChanger.FFCM (Norman) Trj/Alureon.AW (Panda) Mal/TDSS-F (Sophos) Backdoor.Tidserv (Symantec) Trojan.DNSChanger.Gen!Pac.16 (VirusBuster)
Summary
Restoring Corrupted Files
Restoring DNS Settings
-
If the computer has a network interface that does not receive a configuration using DHCP, reset the DNS configuration if necessary. For information on configuring TCP/IP to use DNS in Windows XP, see http://support.microsoft.com/kb/305553
-
If a dial-up connection is sometimes used from the computer, reconfigure the dial-up settings in the rasphone.pbk file as necessary, as Win32/Alureon may set the fields "IpDnsAddress" and "IpDns2Address" in the rasphone.pbk file to the attacker's address. The Microsoft scanner code that automatically removes Win32/Alureon backs up the infected dial-up configuration file to:
%ALLUSERSPROFILE%\Application Data\Microsoft\Network\Connections\Pbk\rasphone.pbk.bak
Other recovery steps
- Stopping and starting Windows services: http://technet.microsoft.com/en-us/library/cc736564.aspx
- Enable the following Windows service: wscsvc
- Enabling Windows Security Center alerts:
- For Windows Vista: http://windowshelp.microsoft.com/Windows/en-US/Help/c5e78ee2-b00a-444d-8c57-e29bda8768a81033.mspx
- For Windows XP: http://support.microsoft.com/kb/889737
- For other support and help related articles, go to:
- Windows Vista: http://support.microsoft.com/ph/11732#tab0
- Windows XP: http://support.microsoft.com/ph/1173#tab0
- Microsoft Security TechNet Center: http://technet.microsoft.com/security/default.aspx