查看: 5411|回复: 17
收起左侧

[病毒样本] 低质量一个

[复制链接]
cnufo
发表于 2015-8-17 21:37:24 | 显示全部楼层 |阅读模式
大部分杀软都报了
https://www.virustotal.com/en/fi ... nalysis/1439817904/


本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
hxdasdf
发表于 2015-8-17 21:43:44 | 显示全部楼层
完全没有下载的必要

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
pal家族
发表于 2015-8-17 21:45:52 | 显示全部楼层
本帖最后由 pal家族 于 2015-8-17 21:47 编辑

威胁名称:        PE_VIRUX.O
类型:        病毒
受感染文件:        D:\360安全浏览器下载\lpk\lpk.dll
处理措施:        已移除
检测方式:        实时扫描

然而!某些杀软到现在还不能根除这个病毒呢。论坛里经常见到啊
XywCloud
发表于 2015-8-17 21:47:49 | 显示全部楼层
多少年前的毒了...
,就一个.
发表于 2015-8-17 21:56:19 | 显示全部楼层
文件名: lpk.dll
威胁名称: Backdoor.Trojan完整路径: d:\迅雷下载\lpk\lpk.dll

____________________________

____________________________


在电脑上的创建时间 
2015/8/17 ( 21:53:40 )

上次使用时间 
2015/8/17 ( 21:55:40 )

启动项目 


已启动 


威胁类型: 病毒。 将自身插入或附加到其他程序、文件或电脑区域以感染这些媒介的程序。

____________________________


lpk.dll 威胁名称: Backdoor.Trojan
定位


极少用户信任的文件
诺顿社区中有 不到 5 名用户使用了此文件。

新建的文件
该文件已在 18 天 前发行。


此文件具有高风险。


____________________________


https://att.kafan.cn/forum.php?mo ... DU4NTYxOHwxODQ3NDYw
已下载文件 lpk.dll 威胁名称: Backdoor.Trojan
从 att.kafan.cn
来源: 外部介质

lpk.dll

____________________________

文件操作

文件: d:\迅雷下载\lpk\ lpk.dll 已删除
____________________________


文件指纹 - SHA:
c7857262e1c854174240a7dca38ee9247f4d4582f2d3b5b8133ff9143feb080e
文件指纹 - MD5:
不可用
雷帝彬
头像被屏蔽
发表于 2015-8-17 22:24:54 | 显示全部楼层
eset 解压杀

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
ELOHIM
发表于 2015-8-17 22:29:19 | 显示全部楼层
本帖最后由 ELOHIM 于 2015-8-17 22:41 编辑



DDoS:Win32/Nitol         
类别: 特洛伊木马拒绝服务
描述: 这个程序可以用于执行拒绝服务攻击。
推荐的操作: 立即删除这个软件。
项目:
file:C:\ProgramData\Microsoft\Windows Defender\LocalCopy\{E3A598A0-1320-4833-92E8-B0872FFFDEE1}-lpk.rar
联机获取此项的详细信息。
-----------------------------
Threat behavior   Installation
Variants of DDoS:Win32/Nitol can create copies of themselves as an EXE or DLL file, with a randomly generated file name of six characters, for example, "faxjwe.exe". The trojan creates the copy in one of the following folders:
For example:
  • %ProgramFiles%\viffic.exe
  • <system folder>\hyjzuk.exe
  • <system folder>\riffic.exe
  • %windir%\4_Ss.dll
Some variants can install a service as a legacy driver with the following registry modification:
In subkey: "HKLM\System\CurrentControlSet\Enum\Root\LEGACY_<SERVICE>\0000"
Sets value: "Class"
With data: "LegacyDriver"
Sets value: "Legacy"
With data: "0x00000001"
where <SERVICE> is the service name installed by the malware.
The service's name is usually created from a hardcoded string (such as "111111111", "MSUpdqte" or "Nationald") with random characters inserted in or added to the string, as in the following examples:
  • fuwu111111111      
  • MSUpdqtezni      
  • Nationaljrqd      
The service's display name is also created from hardcoded strings with random characters insterted in or added to the string, as in the following examples:
  • "<random characters>222222222", for example "fuwu222222222"
  • "Microsoft Windows Uqdate<random characters> Service", for example "Microsoft Windows Uqdatexla Service"
  • "National<random characters> Instruments dDomain Service", for example "Nationalyta Instruments dDomain Service"
Other variants use a completely random name for the service, for example:
  • na5eon2saul      
  • oejuvpvabo      
  • phqghumeay      
Some variants of DDoS:Win32/Nitol will instead pass the trojan as a DLL through the ServiceDll parameter, by modifying the following registry entry:
In subkey: HKLM\System\CurrentControlSet\Services\<service name>\Parameters
Sets value: "ServiceDll"
With data: "<malware file>.dll"
for example:
In subkey: HKLM\System\CurrentControlSet\Services\6to4\Parameters
Sets value: "ServiceDll"
With data: "%windir%\4_Ss.dll"
Some variants may delete themselves from their initial location. Earlier variants use the command line "cmd.exe /c del <malware file> > nul", while later variants may rename themselves as "%TEMP%\SOFTWARE.LOG" and set themselves to be deleted when you restart your PC.
Payload
Allows backdoor access and control   
All variants of DDoS:Win32/Nitol allow unauthorized access and control of your PC by connecting to a remote server every 300 milliseconds to wait for commands. Using this backdoor, a malicious hacker can perform the following actions:
  • Download and run files
  • Restart your PC
  • Shut down your PC
  • Start Internet Explorer
  • Uninstall the trojan (by releasing the mutex, deleting the service, and setting the installed file attributes to normal)
  • Update the trojan
  • Perform DDoS attacks
Some variants can download the update file to the %TEMP% folder in the format of "<five random characters>.exe, for example "axyjg.exe".
Other variants use the following formats:
  • "stf<five random characters>.exe", for example "stfaxyjig.exe"
  • "bpk<five random characters>cn.exe", for example "bpkjxvacn.exe"
Connects to remote server   
All variants of DDoS:Win32/Nitol connect to a remote server to upload information about your PC, including:
  • The version of the trojan installed on your PC
  • Your PC's geographic location
  • Your PC's name
  • Your PC's processing (CPU) speed
  • The amount of installed memory (RAM) on your PC
  • Your operating system type and version
The trojan connects to the remote server using a TCP or UDP connection. We have seen variants connecting to the following remote servers using a TCP connection:
  • 120272.3322.org:7000      
  • cbr.gnway.net:1484      
  • closewait.wowip.kr:12      
  • dnf43.3322.org:9001      
  • fei9988.3322.org:8080      
  • fghziyi.chibizx.com:8889      
  • hkl144.3322.org:7044      
  • huyiai.3322.org:7000      
  • mild443164.3322.org:7777      
  • rq00605.cn:8080      
  • w424010817.3322.org:8000      
  • woainimqq.3322.org:7000      
  • ylm466.3322.org:7000      
  • ysok.3322.org:7000      
Injects code   
Some variants of DDoS:Win32/Nitol inject code into svchost.exe so as to communicate with the remote server. These variants also use code injection to hinder detection and removal.
Drops component files   
Some of the later variants (such as DDoS:Win32/Nitol.B) are distributed as an executable package (EXE) that contains a DLL component file. When run, these variants drop the DLL component as "lpk.dll" (with the "HIDDEN", "SYSTEM" and "READONLY" file attributes set) into all folders on all local and removable drives on your computer that contain files with an .exe, .rar or .zip extension.
These DLL files are appended with a copy of the EXE, and are are modified to load the EXE copy when they are run.
In Windows, "lpk.dll" is always loaded when support for East Asian languages is installed. Once loaded, the LpkInitialize export will be called, which in this case will run the code to load the malware.
Another copy of "lpk.dll" may also be created in the <system folder> as "gei<random number>.dll", for example "gei33.dll".
Additional information
Each variant of the trojan creates a mutex as an infection marker to prevent multiple instances running on your computer. The mutex name is identical to the service name created by the malware, such as in the following examples:
  • fuwu111111111      
  • MSUpdqtezni      
  • na5eon2saul      
  • Nationaljrqd      
Related encyclopedia entries
DDoS:Win32/Nitol.B        
Analysis by Patrik Vicol   


SymptomsSystem changes   
The following system changes may indicate the presence of this malware:
  • The presence of the following files:

    <system folder>\<six characters>.exe
    <system folder>\<six characters>.dll
    <system folder>\gei<random number>.dll
    %ProgramFiles%\<six characters>.exe

    %ProgramFiles%\<six characters>.dll
    %TEMP%\SOFTWARE.LOG
    %TEMP%\stf<five characters>.exe
    %windir%\<six characters>.exe

    %windir%\<six characters>.dll
      
  • The presence of the file "lpk.dll" in all folders on your PC that contain files with an .exe, .rar or .zip extension
  • The presence of services with random characters in their name, for example:

    Nationalyta Instruments dDomain Service"
    Microsoft Windows Uqdatexla Service
    phqghumeay
    na5eon2saul
    oejuvpvabo




Prevention

Alert level: Severe
First detected by definition: 1.151.33.0
Latest detected by definition: 1.203.984.0 and higher
First detected on:  May 15, 2013                 

This entry was first published on:  Sep 26, 2012                 
This entry was updated on: Nov 17, 2014                 
This threat is also detected as:
  • Win32/ServStart.AD trojan (ESET)
  • Trojan.Win32.Scar (Kaspersky)
  • Mal/Nitol-C (Sophos)







本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
OAKESS
发表于 2015-8-17 22:29:29 | 显示全部楼层

卡巴斯基安全软件


拒绝访问

无法访问该网页

对象 URL:

https://att.kafan.cn/forum.php?mo ... DUzMDQxMXwxODQ3NDYw

原因:

对象感染源 Trojan.Win32.MicroFake.ba



消息生成日期: 2015/8/17 22:29:21
开开心心卖手机
发表于 2015-8-17 22:30:42 | 显示全部楼层

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
MXCERILYF!
发表于 2015-8-17 22:41:14 | 显示全部楼层
360TS

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-22 01:31 , Processed in 0.147502 second(s), 17 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表