查看: 2658|回复: 18
收起左侧

[病毒样本] 刚刚找图标找到的..

[复制链接]
jimmyleo
发表于 2008-1-27 15:59:42 | 显示全部楼层 |阅读模式
44a8a722802ab5b8676c84c48693bec0 *5[1].gif
14c5dd52151ac65f82650c10795a25f1 *pps.exe

gif伪 按数据流读取..
5.gif
-->Malzilla-->FreShow-->
pps.exe

这回mcafee的obscured不叫了...

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
鱼是一只我
发表于 2008-1-27 16:05:46 | 显示全部楼层
kv2008
~~

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
woai_jolin
发表于 2008-1-27 16:06:20 | 显示全部楼层

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
zwl2828
发表于 2008-1-27 16:33:27 | 显示全部楼层

Avira AntiVir

C:\Users\Wesley\Downloads\pack.rar
  [0] Archive type: RAR
  --> 5[1].gif
      [DETECTION] Contains suspicious code HEUR/Exploit.HTML
  --> pps.exe
      [DETECTION] Contains suspicious code HEUR/Malware
winxp0286
发表于 2008-1-27 16:55:05 | 显示全部楼层
红伞终于杀了。。晕。。。。
gho
发表于 2008-1-27 16:57:08 | 显示全部楼层
mcafee miss
hj5abc
发表于 2008-1-27 16:59:43 | 显示全部楼层
pps.exe : Not detected by Sandbox (Signature: W32/Suspicious_U.gen)


[ DetectionInfo ]
    * Sandbox name: NO_MALWARE
    * Signature name: W32/Suspicious_U.gen
    * Compressed: YES
    * TLS hooks: NO
    * Executable type: Application
    * Executable file structure: OK

[ General information ]
    * Accesses executable file from resource section.
    * Creating several executable files on hard-drive.
    * **Locates window "Windows Îļþ±£»¤ [class #32770]" on desktop.
    * File length:         7368 bytes.
    * MD5 hash: 14c5dd52151ac65f82650c10795a25f1.

[ Changes to filesystem ]
    * Creates file C:\WINDOWS\TEMP\tmp8099.tmp.
    * Deletes file C:\WINDOWS\TEMP\tmp8099.tmp.
    * Creates file C:\WINDOWS\TEMP\TMPFILE.TMP.
    * Deletes file C:\WINDOWS\TEMP\~esace.
    * Creates file C:\WINDOWS\TEMP\~esace.
    * Deletes file C:\WINDOWS\TEMP\TMPFILE.TMP.

[ Changes to registry ]
    * Creates key "HKLM\System\CurrentControlSet\Services\pop".
    * Sets value "ImagePath"="C:\WINDOWS\SYSTEM32\DRIVERS\pop.sys" in key "HKLM\System\CurrentControlSet\Services\pop".
    * Sets value "DisplayName"="pop" in key "HKLM\System\CurrentControlSet\Services\pop".

[ Network services ]
    * Downloads file from http://down.malasc.cn/downlist.txt as cache file.
    * Connects to "down.malasc.cn" on port 80.
    * Opens URL: down.malasc.cn/downlist.txt.

[ Process/window information ]
    * Creates process "C:\WINDOWS\TEMP\tmp8099.tmp".
    * Creates a mutex ~wupcai.
    * Attempts to access service "pop".
    * Creates service "pop (pop)" as "C:\WINDOWS\SYSTEM32\DRIVERS\pop.sys".
    * Enumerates running processes.
    * Enumerates running processes several parses....
kiki
发表于 2008-1-27 17:00:33 | 显示全部楼层
Starting the file scan:

Begin scan in 'C:\Documents and Settings\Administrator\桌面\pack.rar'
C:\Documents and Settings\Administrator\桌面\pack.rar
  [0] Archive type: RAR
  --> 5[1].gif
      [DETECTION] Contains suspicious code HEUR/Exploit.HTML
  --> pps.exe
      [DETECTION] Contains suspicious code HEUR/Malware
      [INFO]      The file was deleted!
leonfg
发表于 2008-1-27 17:15:42 | 显示全部楼层
ESET
C:\Documents and Settings\GUNDAM\桌面\pack.rar » RAR » pps.exe - probably a variant of Win32/TrojanDownloader.Small.NZK trojan
卡江东N
发表于 2008-1-27 18:37:39 | 显示全部楼层
Trend: find
symantec:pass
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-25 17:48 , Processed in 0.140115 second(s), 18 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表