12
返回列表 发新帖
楼主: liunanyuan
收起左侧

[病毒样本] 30

[复制链接]
挪威的冬天
发表于 2007-12-13 12:19:57 | 显示全部楼层
贼多网页。。。貌似金山现在都不怎么管网页了
HC303
发表于 2007-12-13 17:05:18 | 显示全部楼层
Please find a detailed report concerning each individual sample below:

Filename Result
Ajax[1].htm  MALWARE

The file 'Ajax[1].htm' has been determined to be 'MALWARE'. Our analysts named the threat TR/Click.HTML.IFrame.GC.1. The term "TR/" denotes a trojan horse that is able to spy out data, to violate your privacy or carry out unwanted modifications to the system.Detection is added to our virus definition file (VDF) starting with version 7.00.01.82. Please note that Avira's proactive heuristic detection module AHeAD detected this threat up front without the latest VDF update as: HEUR/Exploit.HTML.

Filename Result
down1[1].txt  MALWARE

The file 'down1[1].txt' has been determined to be 'MALWARE'. Our analysts named the threat TR/Click.HTML.IFrame.GC. The term "TR/" denotes a trojan horse that is able to spy out data, to violate your privacy or carry out unwanted modifications to the system.Detection is added to our virus definition file (VDF) starting with version 7.00.01.82. Please note that Avira's proactive heuristic detection module AHeAD detected this threat up front without the latest VDF update as: HEUR/Exploit.HTML.
HC303
发表于 2007-12-13 17:05:50 | 显示全部楼层
Filename Result
kaka[1].htm  MALWARE

The file 'kaka[1].htm' has been determined to be 'MALWARE'. Our analysts named the threat TR/Click.HTML.IFrame.GC.2. The term "TR/" denotes a trojan horse that is able to spy out data, to violate your privacy or carry out unwanted modifications to the system.Detection is added to our virus definition file (VDF) starting with version 7.00.01.82. Please note that Avira's proactive heuristic detection module AHeAD detected this threat up front without the latest VDF update as: HEUR/Exploit.HTML.

Filename Result
kong[1].htm  MALWARE

The file 'kong[1].htm' has been determined to be 'MALWARE'. Our analysts named the threat HTML/Dldr.Agent.bcd. The term "HTML/" denotes a script-virus that is able to infect the system using a HTML script.Detection will be added to our virus definition file (VDF) with one of the next updates. Please note that Avira's proactive heuristic detection module AHeAD detected this threat up front without the latest VDF update as: HEUR/Exploit.HTML.
HC303
发表于 2007-12-13 17:07:10 | 显示全部楼层
Filename Result
lz[1].htm  MALWARE

The file 'lz[1].htm' has been determined to be 'MALWARE'. Our analysts named the threat HTML/Shellcode.Gen. The term "HTML/" denotes a script-virus that is able to infect the system using a HTML script.This malware is detected by a special detection routine from the engine module.

Filename Result
Ms06014[1].htm  MALWARE

The file 'Ms06014[1].htm' has been determined to be 'MALWARE'. Our analysts named the threat TR/Click.HTML.IFrame.GC.3. The term "TR/" denotes a trojan horse that is able to spy out data, to violate your privacy or carry out unwanted modifications to the system.Detection is added to our virus definition file (VDF) starting with version 7.00.01.82. Please note that Avira's proactive heuristic detection module AHeAD detected this threat up front without the latest VDF update as: HEUR/Exploit.HTML.
HC303
发表于 2007-12-13 17:07:37 | 显示全部楼层
Filename Result
XunLei[1].htm  MALWARE

The file 'XunLei[1].htm' has been determined to be 'MALWARE'. Our analysts named the threat TR/Click.HTML.IFrame.GC.4. The term "TR/" denotes a trojan horse that is able to spy out data, to violate your privacy or carry out unwanted modifications to the system.Detection is added to our virus definition file (VDF) starting with version 7.00.01.82. Please note that Avira's proactive heuristic detection module AHeAD detected this threat up front without the latest VDF update as: HEUR/Exploit.HTML.
Graybird
发表于 2007-12-13 17:09:55 | 显示全部楼层
Starting the file scan:

Begin scan in 'E:\29.rar'
E:\29.rar
  [0] Archive type: RAR
  --> VMwareService.exe
      [DETECTION] Contains detection pattern of the worm WORM/Cekar.A
  --> tmp7A.tmp
      [DETECTION] Is the Trojan horse TR/Rootkit.Gen
  --> pcibus.sys
      [DETECTION] Is the Trojan horse TR/Dldr.Agent.45056
  --> 8838283[1].htm
      [DETECTION] Is the Trojan horse TR/IFrame.AW
  --> XunLei[1].htm
      [DETECTION] Is the Trojan horse TR/Click.HTML.IFrame.GC.4
  --> noani[2].htm
      [DETECTION] Contains detection pattern of the HTML script virus HTML/Dldr.Agent.ZY
  --> Ms06014[1].htm
      [DETECTION] Is the Trojan horse TR/Click.HTML.IFrame.GC.3
  --> haha[1].htm
      [DETECTION] Contains detection pattern of the Java script virus JS/Dldr.Psyme.ED
  --> jh[1].htm
      [DETECTION] Contains detection pattern of the Java script virus JS/Dldr.Agent.afm
  --> kong[1].htm
      [DETECTION] Contains suspicious code HEUR/Exploit.HTML
  --> htm[1].htm
      [DETECTION] Contains detection pattern of the Java script virus JS/Dldr.Agent.AS
  --> gm[1].htm
      [DETECTION] Is the Trojan horse TR/Dldr.Agent.ala.10
  --> 6671697[1].htm
      [DETECTION] Is the Trojan horse TR/IFrame.AW
  --> Ajax[1].htm
      [DETECTION] Is the Trojan horse TR/Click.HTML.IFrame.GC.1
  --> ani[1].htm
      [DETECTION] Contains detection pattern of the HTML script virus HTML/Dldr.Agent.ZY
  --> 11[1].js
      [DETECTION] Contains detection pattern of the Java script virus JS/Dldr.Psyme.CN
  --> rl[2].js
      [DETECTION] Contains detection pattern of the exploits EXP/RealPlay.E
  --> realplayer[1].htm
      [DETECTION] Contains detection pattern of the exploits EXP/RealPlay.H
  --> kaka[1].htm
      [DETECTION] Is the Trojan horse TR/Click.HTML.IFrame.GC.2
  --> down1[1].txt
      [DETECTION] Is the Trojan horse TR/Click.HTML.IFrame.GC
  --> 2[1].htm
      [DETECTION] Contains detection pattern of the exploits EXP/RealPlay.I
  --> 1[1].js
      [DETECTION] Contains detection pattern of the Java script virus JS/Dldr.Psyme.GG
  --> realplay_071122_exp[1].htm
      [DETECTION] Contains detection pattern of the exploits EXP/RealPlay.H
  --> realplayer[2].htm
      [DETECTION] Contains detection pattern of the HTML script virus HTML/Dldr.Agent.ZY
  --> lz[1].htm
      [DETECTION] Contains detection pattern of the HTML script virus HTML/Shellcode.Gen
  --> gege[1].htm
      [DETECTION] Contains detection pattern of the exploits EXP/RealPlay.I
  --> ani[1].c
      [DETECTION] Contains detection pattern of the exploits EXP/Ani.Gen
  --> tmp7C.tmp
      [DETECTION] Is the Trojan horse TR/Rootkit.Gen
  --> tmp77.tmp
      [DETECTION] Is the Trojan horse TR/Rootkit.Gen
  --> tmp83.tmp
      [DETECTION] Is the Trojan horse TR/Rootkit.Gen
      [WARNING]   The file was ignored!


End of the scan: 2007年12月13日  17:10
Used time: 00:20 min

The scan has been done completely.

      0 Scanning directories
     31 Files were scanned
     28 viruses and/or unwanted programs were found
      2 Files were classified as suspicious:
      0 files were deleted
      0 files were repaired
      0 files were moved to quarantine
      0 files were renamed
      0 Files cannot be scanned
      3 Files not concerned
      1 Archives were scanned
      1 Warnings
      0 Notes
qigang
发表于 2007-12-13 19:39:30 | 显示全部楼层

31/11

瑞星病毒查杀结果报告

清除病毒种类列表:

病毒: Win32.Logogo.a           
病毒: Trojan.PSW.Win32.SO2Online.x
病毒: Trojan.Win32.Mnless.zkb 
病毒: Trojan.DL.Win32.Iframe.a
病毒: Trojan.Script.JS.Agent.ab
病毒: Hack.Exploit.Script.JS.RealPlayer.b
病毒: Trojan.DL.Script.JS.Agent.lve
病毒: Trojan.DL.Script.HTML.Agent.x
病毒: Hack.SuspiciousAni       

MAC 地址:00:11:5B:F3:6D:69

用户来源:互联网

软件版本:20.22.31
663219623
发表于 2007-12-13 19:43:30 | 显示全部楼层
kill杀勒   蛤蛤
shaoruoyan
发表于 2007-12-13 22:12:13 | 显示全部楼层
KIS7  还没下载就拦了~~~
jimmyleo
发表于 2007-12-13 22:37:37 | 显示全部楼层
D:\Download\Scan\11[1].js - Signature 'Win32.SuspectCrc' found
D:\Download\Scan\1[1].js
D:\Download\Scan\2[1].htm
D:\Download\Scan\6671697[1].htm
D:\Download\Scan\8838283[1].htm
D:\Download\Scan\Ajax[1].htm
D:\Download\Scan\ani[1].c - Signature 'Exploit.Win32.IMG-ANI.i' found
D:\Download\Scan\ani[1].htm
D:\Download\Scan\down1[1].txt
D:\Download\Scan\gege[1].htm
D:\Download\Scan\gm[1].htm
D:\Download\Scan\haha[1].htm - Signature 'Trojan-Downloader.JS.Agent.alj' found
D:\Download\Scan\htm[1].htm
D:\Download\Scan\jh[1].htm
D:\Download\Scan\kaka[1].htm
D:\Download\Scan\kong[1].htm
D:\Download\Scan\lz[1].htm
D:\Download\Scan\Ms06014[1].htm
D:\Download\Scan\noani[2].htm
D:\Download\Scan\pcibus.sys - Signature 'Worm.Win32.Downloader.cb' found
D:\Download\Scan\realplayer[1].htm
D:\Download\Scan\realplayer[2].htm
D:\Download\Scan\realplay_071122_exp[1].htm
D:\Download\Scan\rl[2].js
D:\Download\Scan\tmp77.tmp
D:\Download\Scan\tmp7A.tmp
D:\Download\Scan\tmp7C.tmp
D:\Download\Scan\tmp83.tmp
D:\Download\Scan\VMwareService.exe - Signature 'Trojan-PWS.Win32.Agent.jp' found
D:\Download\Scan\XunLei[1].htm

        30 Files scanned
          (0 Archives with 0 files)
        5 Signatures found
        0 Suspect code-parts found
        Used time: 0:00.390

意料之中
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-22 20:58 , Processed in 0.085864 second(s), 16 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表