本帖最后由 墨家小子 于 2016-3-20 00:24 编辑
SHA256: ada9cf6810208bd881d0a1d5c8f3b1feb6d9ea194e6c61640e22c9e642af3937
File name: TMP609F.exe
Detection ratio: 4 / 56
Analysis date: 2016-03-19 16:15:41 UTC ( 1 minute ago )
https://www.virustotal.com/en/file/ada9cf6810208bd881d0a1d5c8f3b1feb6d9ea194e6c61640e22c9e642af3937/analysis/1458404141/
AhnLab-V3 Trojan/Win32.Teslacrypt 20160319
Baidu Win32.Trojan.WisdomEyes.151026.9950.9999 20160318
ESET-NOD32 a variant of Win32/Injector.CUSF 20160319
Qihoo-360 HEUR/QVM07.1.0000.Malware.Gen 20160319
IPS先来撑撑场面:
2016/3/19 23:49:45,High,An intrusion attempt by localhost was blocked.,Blocked,No Action Required,,No Action Required,No Action Required,Web Attack: Angler Exploit Kit Website 6,"localhost (127.0.0.1, 1XXX7)",for.hyderabadphotographyfest.co.in/topic/49560-daftest-fittingly-refill-warrants-acyclic-fleshless-deadliest/,"localhost (127.0.0.1, XXX5)",localhost (127.0.0.1),"TCP, Port 1XXX7"
线路一,虚线,先注入系统程序,IE启动conhost,然后conhost启动taskhost、explorer,因为SSF拦截不到注入,所以没有注入截图
线路二,实线,下载木马进入本地,木马启动,被SSF拦截
实线受阻,虚线开始攻击,biu biu biu~~~注意看那些凌乱的系统程序(截图中白色底的)
|