查看: 2784|回复: 12
收起左侧

[病毒样本] f42951

[复制链接]
wangjay1980
发表于 2007-8-22 09:33:21 | 显示全部楼层 |阅读模式
1

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
tracydk
发表于 2007-8-22 09:34:01 | 显示全部楼层
miss
FBAV
发表于 2007-8-22 09:36:12 | 显示全部楼层
为PC护航风暴微塔
_____________________________________________
                                          
             风暴微塔反间谋
[强力查杀各种Win32位的病毒,木马,蠕虫,恶意软件]              
                            [内测版]      
                   http://www.v0day.com/  
----------------------------------------------
开始扫描……

[C:\Documents and Settings\Administrator\桌面\virus\qq.rar]
                    …………特征码引擎[1]发现病毒
OK  扫描完毕!
The EQs
发表于 2007-8-22 09:56:34 | 显示全部楼层
Scan performed at: 2007-8-22 9:56:08
Scanning Log
NOD32 version 2474 (20070822) NT
Command line: C:\Documents and Settings\Don johnson\桌面\qq.rar
Operating memory - is OK

Date: 22.8.2007  Time: 09:56:12
Anti-Stealth technology is enabled.
Scanned disks, folders and files: C:\Documents and Settings\Don johnson\桌面\qq.rar
C:\Documents and Settings\Don johnson\桌面\qq.rar ?RAR ?qq.exe - a variant of Win32/AutoRun.Q worm
Number of scanned files: 2
Number of threats found: 1
Number of files cleaned: 1
Time of completion: 09:56:13 Total scanning time: 1 sec (00:00:01)
残缺的唯美
发表于 2007-8-22 10:33:30 | 显示全部楼层
--> qq.exe
      [DETECTION] Contains signature of the dropper DR/Delphi.Gen
      [INFO]      A backup was created as '46f9a0b9.qua'  ( QUARANTINE )
      [INFO]      The file was deleted!
Nblock
发表于 2007-8-22 10:34:45 | 显示全部楼层
程序:
E:\SOFT_KILLER\QQ\QQ.EXE

E:\AUTORUN.INF
自启动运行!
并生成以下文件:
1) E:\AUTORUN.EXE
2) E:\AUTORUN.INF
以及可由此INF文件引导自启的文件:
E:\AUTORUN.EXE

是否删除木马程序及其衍生物?

[ 本帖最后由 Nblock 于 2007-8-22 10:36 编辑 ]

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
碧水寒潭
发表于 2007-8-22 10:37:37 | 显示全部楼层
Starting the file scan:

Begin scan in 'H:\AV-TEST'
H:\AV-TEST\qq.rar
  [0] Archive type: RAR
  --> qq.exe
      [DETECTION] Contains signature of the dropper DR/Delphi.Gen
      [INFO]      The file was deleted!
woai_jolin
发表于 2007-8-22 10:40:21 | 显示全部楼层
qq.exe : INFECTED with W32/Malware (Signature: NO_VIRUS)


[ DetectionInfo ]
    * Sandbox name: W32/Malware
    * Signature name: NO_VIRUS

[ General information ]
    * Decompressing UPX.
    * **Locates window
"vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv [class xxx]" on desktop.
    * Accesses executable file from resource section.
    * **Locates window "zyr8jgjjk9bjko [class NULL]" on desktop.
    * **Locates window "zkxgoxjtrj8jok [class NULL]" on desktop.
    * File length:        33393 bytes.
    * MD5 hash: f4295159b5a49aa049f6caccee09aa0b.

[ Changes to filesystem ]
    * Deletes file E:\AutoRun.exe.
    * Deletes file C:\Program Files\Internet
Explorer\PLUGINS\SysWin64.Jmp.
    * Creates file C:\Program Files\Internet
Explorer\PLUGINS\SysWin64.Jmp.
    * Deletes file C:\Program Files\Internet
Explorer\PLUGINS\WinSys64.Sys.
    * Creates file C:\Program Files\Internet
Explorer\PLUGINS\WinSys64.Sys.

[ Changes to registry ]
    * Creates value "{5D83AD9C-3BFC-43F5-979D-2904DBC54A8E}"="" in key
"HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks".
    * Creates key "HKCR\CLSID\{5D83AD9C-3BFC-43F5-979D-2904DBC54A8E}".
    * Sets value ""="" in key
"HKCR\CLSID\{5D83AD9C-3BFC-43F5-979D-2904DBC54A8E}".
    * Creates key
"HKCR\CLSID\{5D83AD9C-3BFC-43F5-979D-2904DBC54A8E}\InProcServer32".
    * Sets value ""="C:\Program Files\Internet
Explorer\PLUGINS\WinSys64.Sys" in key
"HKCR\CLSID\{5D83AD9C-3BFC-43F5-979D-2904DBC54A8E}\InProcServer32".
    * Sets value "ThreadingModel"="Apartment" in key
"HKCR\CLSID\{5D83AD9C-3BFC-43F5-979D-2904DBC54A8E}\InProcServer32".

[ Network ]
    * Hooks into Shell explorer.



(C) 2004-2006 Norman ASA. All Rights Reserved.

The material presented is distributed by Norman ASA as an information
source only.


************************************
Sent from an unmonitored email address.
Please DO NOT reply.
************************************
沸沸
发表于 2007-8-22 10:41:47 | 显示全部楼层
将upx解开后,卡巴还是没发现……不敢测主动防御
eubyo
发表于 2007-8-22 10:55:10 | 显示全部楼层

qq.exe

AhnLab-V3    2007.8.22.0    2007.08.21    Win-Trojan/QQPass.Gen
AntiVir    7.4.1.63    2007.08.21    DR/Delphi.Gen
BitDefender    7.2    2007.08.22    Generic.PWStealer.5013F998
ClamAV    0.91    2007.08.22    Trojan.Delf-1462
eSafe    7.0.15.0    2007.08.20    suspicious Trojan/Worm
eTrust-Vet    31.1.5079    2007.08.22    Win32/QQPass!generic
F-Secure    6.70.13030.0    2007.08.22    W32/Malware
Ikarus    T3.1.1.12    2007.08.22    Trojan-Proxy.Win32.Delf.AN
McAfee    5102    2007.08.21    PWS-QQGame
Microsoft    1.2803    2007.08.22    PWS:Win32/Agent.AC
NOD32v2    2474    2007.08.22    a variant of Win32/AutoRun.Q
Norman    5.80.02    2007.08.21    W32/Malware
Panda    9.0.0.4    2007.08.21    Suspicious file
Sophos    4.20.0    2007.08.22    Mal/Dropper-H
Symantec    10    2007.08.22    Infostealer.Gampass
VBA32    3.12.2.2    2007.08.21    MalwareScope.Trojan-PSW.Game.7
Webwasher-Gateway    6.0.1    2007.08.22    Trojan.Delphi.Gen
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-15 11:16 , Processed in 0.137298 second(s), 19 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表