12
返回列表 发新帖
楼主: liumtz
收起左侧

[病毒样本] 突然发现单位到处都是病毒,随便发两个看看有没有人遇到过!

[复制链接]
liumtz
 楼主| 发表于 2017-6-20 16:07:50 | 显示全部楼层
aboringman 发表于 2017-6-20 14:14
Trend Micro杀掉xp-D41D8CD9.EXE,报WORM_FLYSTUDI.B【蠕虫,可能是U盘传播,个人猜测】

xp.EXE运 ...

那个XP.EXE刚才仔细看了下,是他们科里一个正常的工作软件,我只想说做得好LOW啊。。。
aboringman
发表于 2017-6-20 16:21:50 | 显示全部楼层
liumtz 发表于 2017-6-20 16:07
那个XP.EXE刚才仔细看了下,是他们科里一个正常的工作软件,我只想说做得好LOW啊。。。

原来如此
tg123321
发表于 2017-6-20 18:49:22 | 显示全部楼层
liumtz 发表于 2017-6-20 12:49
第一个疑似病毒,但第二个绝对是病毒,解压出来明明是应用程序,但图标却伪装成了文件夹图标,并设置只读 ...

大哥,我回的时候哪有第二个
ELOHIM
发表于 2017-6-20 21:49:37 | 显示全部楼层
微软 MISS 第一个 | 第二个提示: Worm: Win32/Nuj.A
Threat behavior
Worm:Win32/Nuj.A is a worm that copies itself to fixed, removable or network drives. Some variants of this worm may also terminate antivirus related-processes.
Installation
When run, Win32/Nuj.A may drop a copy of itself as '<system folder>\jun.exe', and then modify the registry to execute its copy at each Windows start.

Adds value: "jun"
With data: "<system folder>\jun.exe"
To subkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Next, the worm opens another window showing the directory where the malware was executed. This action is a trick to make a user believe the drive was actually opened, instead of the malware being executed. It may also drop the following non-malicious data files:
<system folder>\oeminfo.ini - configuration file
<system folder>\oemlogo.bmp - picture file

Lastly, the worm modifies the file attributes of the dropped data files to 'read-only', 'system', 'hidden' and 'archive'.
Spreads Via…
Fixed, Removable & Network Drives
Win32/Nuj attempts to copy itself to drives, either fixed, removable or networked, on the affected machine. The worm copies itself as 'jun.exe'.

Upon copying itself to a drive, the worm creates a file named 'autorun.inf' in the root of the drive.
The autorun.inf file contains execution instructions for the operating system, which are invoked when the drive is viewed using Windows Explorer.

It should be noted that autorun.inf files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation CDs.
Payload
Disables Viewing Hidden Folders
Win32/Nuj may disable viewing hidden file folders by modifying registry data.

Modifies value: CheckedValue
With data: "0"
In subkey: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\
Explorer\Advanced\Folder\Hidden\ShowAll

Terminates Processes
Some variants of this worm may terminate the following processes related to antivirus software:
ravmon.exe
kav.exe
avp.exe

Downloads and Executes Arbitrary Files
Other variants connect to remote sites to download arbitrary files, including updates or additional components.

Analysis by Elda Dimakiling
Prevention

Take these steps to help prevent infection on your computer.

Top
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-4-24 05:07 , Processed in 0.108502 second(s), 14 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表