查看: 5096|回复: 21
收起左侧

[病毒样本] XDocCrypt/Dorifel

[复制链接]
360Tencent
发表于 2012-8-9 19:30:24 | 显示全部楼层 |阅读模式
本帖最后由 360Tencent 于 2012-8-15 07:52 编辑

http://www.surfright.nl/nl/support/dorifel-decrypter

http://blogs.mcafee.com/mcafee-l ... table-and-doc-files

http://www.securelist.com/en/blo ... _active_and_growing

http://blog.eset.com/2012/08/11/ ... mmers-secret-weapon

http://blog.trendmicro.com/caring-about-quervar/

http://www.symantec.com/connect/ ... holland-aka-dorifel
Introduction



The last 48 hours government, public sector and networks of private companies are hit hard by a new wave of crypto malware named Trojan-Ransom.Win32.Dorifel. Our research revealed that this Trojan entered the networks thanks to a variant of the Zeus/Zbot banking Trojan called Citadel. This means that this Trojan was already present on one of the computers inside the network.

This Dorifel Trojan scans network shares and local (USB) connected drives for Microsoft Office documents. To be precise .doc and .docx (Word) and .xls and .xlsx (Excel) documents. Encountered documents are seized and replaced with an executable program that contains an RC4 encrypted version of the document. The Trojan adds a familiar icon to the file and changes the filename of the document, abusing the RTLO 'vulnerability' (right-to-left-override) to make computer users belief the 'document' has the correct file extension.

So currently, most affected users will not notice anything since the 'documents' open as usual. In its current state the malware is likely all about propagating itself to as many machines as possible. But since the Trojan checks for an online update every half an hour or so, the attacker could later deploy more ruthless malware.





http://tmp.emsisoft.com/fw/decrypt_dorifel.zip

http://dl.surfright.nl/decrypt_dorifel.exe

Citadel




XDocCrypt/Dorifel

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
284678343
发表于 2012-8-9 19:49:13 | 显示全部楼层
本帖最后由 284678343 于 2012-8-9 19:51 编辑
  1. Trojan-Dropper.Win32.Dorifel.heq        已删除        a.exe        2012/08/09 星期四 19:51:09        C:\Users\Chobits\Desktop\TEMP\       
复制代码
huicuan
发表于 2012-8-9 19:55:21 | 显示全部楼层
密码什么啊
284678343
发表于 2012-8-9 19:56:04 | 显示全部楼层
huicuan 发表于 2012-8-9 19:55
密码什么啊

infected
huicuan
发表于 2012-8-9 20:04:09 | 显示全部楼层
毒霸报第二个文件病毒
小淘气
头像被屏蔽
发表于 2012-8-9 20:05:36 | 显示全部楼层
小红伞杀了
870097067
发表于 2012-8-9 20:07:34 | 显示全部楼层
拜託麻煩下次都給個密碼好嗎。。。。。好幾個都這樣了
留侯
发表于 2012-8-9 20:09:31 | 显示全部楼层
第二个,大蜘蛛:
Sample\a.exe - infected with Trojan.MulDrop3.62566
留侯
发表于 2012-8-9 20:13:13 | 显示全部楼层
第一个过了大蜘蛛,已上报
悠柚
发表于 2012-8-9 20:14:19 | 显示全部楼层
本帖最后由 悠柚 于 2012-8-9 20:17 编辑

FS kill (BD engine)




Trojan.Generic.KDV.684243 (病毒)
D:\Download\bfaa03ee-f631-4e55-bb8a-f27c0a650dea
D:\Download\d33b97dc-f473-48d2-88e7-6f21dfd1ea80
D:\Download\55a4485d-655a-4d2f-b2c3-539fff7b0611
D:\Download\544ca1c3-c723-41bc-a5a3-055d41acbe51
D:\Download\56689b0a-291f-4e60-bbd2-4943e48462aa

Avira TR/PSW.Zbot.AGA Trojan

The file a.exe appears to be infected with "W32/Delf.NBG"

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-1-18 03:51 , Processed in 0.110611 second(s), 17 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表