查看: 3545|回复: 15
收起左侧

[可疑文件] Detection ratio: 5 / 56 Web Attack: Angler Exploit Kit Flash Exploit 6 挂马

[复制链接]
墨家小子
发表于 2016-3-15 19:04:21 | 显示全部楼层 |阅读模式
本帖最后由 墨家小子 于 2016-3-15 19:06 编辑

Your file is now queued for scanning, please wait until the analysis starts.
SHA256:        419f15a02f24f66c24d144c02c7cce76dca5973fbf0c524a7e160c6896844552
File name:        b643.tmp.exe

SHA256:        419f15a02f24f66c24d144c02c7cce76dca5973fbf0c524a7e160c6896844552
File name:        b643.tmp.exe
Detection ratio:        5 / 56
Analysis date:        2016-03-15 10:51:23 UTC ( 10 minutes ago )
https://www.virustotal.com/en/file/419f15a02f24f66c24d144c02c7cce76dca5973fbf0c524a7e160c6896844552/analysis/


Bkav        HW32.Packed.29C5        20160312
Qihoo-360        QVM20.1.Malware.Gen        20160315
Rising        PE:Malware.XPACK-HIE/Heur!1.9C48 [F]        20160315
Symantec        Suspicious.Cloud.5        20160315
VBA32        suspected of Malware-Cryptor.General.6        20160314


2016/3/15 18:48:41,高,阻止了 localhost 的入侵企图,已阻止,不需要操作,Web Attack: Angler Exploit Kit Flash Exploit 6,不需要操作,不需要操作,"localhost (127.0.0.1, 4XXXX7)",neptunowi.bollandsconsulting.co.uk/?e=&q=HknJVOer9&u=JZGQ&l=JN0GzkX&d=&b=G0xR&v=ajPW&n=FSN31iDQ&c=o4-&s=&w=5QBVj9&h=Zzp,"localhost (127.0.0.1, XXX0)",localhost (127.0.0.1),"TCP, 端口 4XXX7",



关闭IPS,开启自动防护,下载智能分析启发杀



本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
windows7爱好者
发表于 2016-3-15 19:06:08 | 显示全部楼层
前排呼叫@aboringman
IDP究竟是不是无脑拉黑主防,就在此贴,世纪大战,速来参观
墨家,你再不理人家你的男神地位就不保了
aboringman
发表于 2016-3-15 19:24:37 | 显示全部楼层
AVG:

扫描:miss;

双击:实机双击,IDP击杀之。(【又现ALEXA】断网情况下的较量,因为AVG封锁了我对本地连接的配置权限,所以只能用它自己的防火墙来阻断所有的网络连接【连自己也给阻止了,真给力】)

"";"IDP.ALEXA.51, C:\Users\killer\Documents\bgkurm.exe";"Deleted, Moved to Virus Vault";"File or Directory";"2016/3/15, 19:17:52"

"";", C:\USERS\KILLER\DESKTOP\B643.TMP.EXE";"Object was blocked";"Process";"2016/3/15, 19:17:52"

"";", C:\Windows\System32\vssadmin.exe";"Object was blocked";"Process";"2016/3/15, 19:17:52"

"";", C:\Windows\System32\cmd.exe";"Object was blocked";"Process";"2016/3/15, 19:17:52"

"";", C:\USERS\KILLER\DESKTOP\B643.TMP.EXE";"Deleted";"File or Directory";"2016/3/15, 19:17:52"

"";", C:\Users\killer\Documents\bgkurm.exe";"Object was blocked";"Process";"2016/3/15, 19:17:52"

"";", HKEY_USERS\.DEFAULT\SOFTWARE\TRUEIMG";"Deleted, Moved to Virus Vault";"Registry key";"2016/3/15, 19:17:52"

"";", HKEY_USERS\S-1-5-21-3895625976-2995373382-4201264068-1000\SOFTWARE\69AA6C9091697F8";"Deleted, Moved to Virus Vault";"Registry key";"2016/3/15, 19:17:52"

"";", HKEY_USERS\S-1-5-21-3895625976-2995373382-4201264068-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\\_WFCH";"Deleted, Moved to Virus Vault";"Registry value";"2016/3/15, 19:17:52"

继续上证据截图:


本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
saga3721
发表于 2016-3-15 19:41:46 | 显示全部楼层
红伞云查杀 'TR/Crypt.XPACK.Gen (Cloud)' [trojan]

评分

参与人数 1人气 +1 收起 理由
aboringman + 1 想当年,我也在用红伞,然而如今。。。。。.

查看全部评分

ericdj
发表于 2016-3-15 19:47:33 | 显示全部楼层
GD主防拦截

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
saga3721
发表于 2016-3-15 19:53:22 | 显示全部楼层
aboringman 发表于 2016-3-15 19:24
AVG:

扫描:miss;

如今后悔没一直用红伞是吧
aboringman
发表于 2016-3-15 20:03:26 | 显示全部楼层
今天就来好好聊聊ARES的问题,一直以来,这个报法都被作为拉黑报法而饱受吐槽,而且仅仅只有楼主一直这样做。

IDP确实有与云联动,但我还没发现过其有拉黑的迹象。

现在开始举出几个典例:

[mw_shl_code=css,true]"";"IDP.ARES.Generic, C:\Users\Killer\Desktop\and515.exe";"Deleted, Moved to Virus Vault";"File or Directory";"2015/12/1, 20:10:31"

"";", C:\Users\Killer\Desktop\and515.exe";"Object was blocked";"Process";"2015/12/1, 20:10:31"

"";", C:\Windows\System32\msiexec.exe";"Object was blocked";"Process";"2015/12/1, 20:10:31"

"";", C:\Windows\System32\WerFault.exe";"Object was blocked";"Process";"2015/12/1, 20:10:31"

"";", C:\Users\Killer\Desktop\and515.exe";"Object was blocked";"Process";"2015/12/1, 20:10:31"[/mw_shl_code]

[mw_shl_code=css,true]"";"IDP.ARES.Generic, C:\Users\killer.Killer-PC\Desktop\d669379ad2f0af5f5df9940a7f2247883e9beb2e96a791a0c0ac9869ca9c49d9.exe";"Deleted, Moved to Virus Vault";"File or Directory";"2015/12/7, 22:09:01"

"";", C:\Windows\System32\sdbinst.exe";"Object was blocked";"Process";"2015/12/7, 22:09:01"

"";", C:\Windows\System32\sdbinst.exe";"Object was blocked";"Process";"2015/12/7, 22:09:01"

"";", C:\Windows\System32\iscsicli.exe";"Object was blocked";"Process";"2015/12/7, 22:09:01"

"";", C:\Windows\System32\iscsicli.exe";"Object was blocked";"Process";"2015/12/7, 22:09:01"

"";", C:\Users\killer.Killer-PC\AppData\Local\tPl4yheX\zh3VOgUZ.exe";"Deleted, Moved to Virus Vault";"File or Directory";"2015/12/7, 22:09:01"

"";", C:\Users\killer.Killer-PC\AppData\LocalLow\Po6MnKzz.bat";"Deleted, Moved to Virus Vault";"File or Directory";"2015/12/7, 22:09:01"

"";", C:\Users\killer.Killer-PC\Desktop\d669379ad2f0af5f5df9940a7f2247883e9beb2e96a791a0c0ac9869ca9c49d9.exe";"Object was blocked";"Process";"2015/12/7, 22:09:01"[/mw_shl_code]

[mw_shl_code=css,true]"";"IDP.ARES.Generic, C:\Users\Killer\Desktop\bc054e7d840f8e93c599c0bff2686fd9486509eca968700da1bcd1622a6caf2f.exe";"Deleted, Moved to Virus Vault";"File or Directory";"2015/11/30, 22:10:51"

"";", C:\Users\Killer\Desktop\bc054e7d840f8e93c599c0bff2686fd9486509eca968700da1bcd1622a6caf2f.exe";"Object was blocked";"Process";"2015/11/30, 22:10:51"

"";", C:\Users\Killer\Desktop\bc054e7d840f8e93c599c0bff2686fd9486509eca968700da1bcd1622a6caf2f.exe";"Object was blocked";"Process";"2015/11/30, 22:10:51"

"";", C:\Windows\System32\sdbinst.exe";"Object was blocked";"Process";"2015/11/30, 22:10:51"

"";", C:\Windows\System32\sdbinst.exe";"Object was blocked";"Process";"2015/11/30, 22:10:51"

"";", C:\Windows\System32\iscsicli.exe";"Object was blocked";"Process";"2015/11/30, 22:10:51"

"";", C:\Windows\System32\iscsicli.exe";"Object was blocked";"Process";"2015/11/30, 22:10:51"

"";", C:\Users\Killer\AppData\Local\6aC2RnQZ\lXMinAbJ.exe";"Deleted, Moved to Virus Vault";"File or Directory";"2015/11/30, 22:10:51"

"";", C:\Users\Killer\AppData\LocalLow\Fa4mmKX7.bat";"Deleted, Moved to Virus Vault";"File or Directory";"2015/11/30, 22:10:51"

"";", C:\Users\Killer\Desktop\bc054e7d840f8e93c599c0bff2686fd9486509eca968700da1bcd1622a6caf2f.exe";"Object was blocked";"Process";"2015/11/30, 22:10:51"[/mw_shl_code]

[mw_shl_code=css,true]"";"IDP.ARES.Generic, C:\Users\Killer\Desktop\TMPC93F.exe";"Deleted, Moved to Virus Vault";"File or Directory";"2015/12/4, 19:11:37"

"";", C:\Users\Killer\Desktop\TMPC93F.exe";"Object was blocked";"Process";"2015/12/4, 19:11:37"

"";", C:\Users\Killer\Desktop\TMPC93F.exe";"Object was blocked";"Process";"2015/12/4, 19:11:37"

"";", C:\Users\Killer\Desktop\TMPC93F.exe";"Object was blocked";"Process";"2015/12/4, 19:11:37"

"";", C:\Windows\explorer.exe";"Object was blocked";"Process";"2015/12/4, 19:11:37"

"";", C:\Windows\ubofymhs.exe";"Deleted, Moved to Virus Vault";"File or Directory";"2015/12/4, 19:11:37"

"";", HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\\HGWZUFOQ";"Deleted, Moved to Virus Vault";"Registry value";"2015/12/4, 19:11:37"

"";", C:\Users\Killer\Desktop\TMPC93F.exe";"Object was blocked";"Process";"2015/12/4, 19:11:37[/mw_shl_code]

以上均是ARES报法的几个典型例子。如果硬要说是因为网络延迟而导致的反应迟钝,那对不起,我这边的网络环境非常良好,是不太也不可能出现因为网络延迟而导致的反应迟钝;如果说这是一种纯粹的拉黑报法,在网络环境良好的情况下,又怎么会轻易地让威胁得手,只要在运行前弹个窗拦截一下,意思意思就行了。

另根据AVG官方提供的文档显示,无论是与云联动,或者是本地的特征样式发力,它无疑是一种通杀报法。

[mw_shl_code=css,true]IDP ARES Generic is a potential threat. Threats, when malicious, can be used to interfere with the normal operation of a computer, gather personal information or allow a hacker to access the device remotely without the user's consent.

This kind of software usually arrives in the form of an unwanted download from a malicious website or as code illegally injected into a legitimate website without the webmaster's knowledge. It can also be received as an email attachment or an instant message from an untrusted source.

What does IDP ARES Generic do?
If determined to be malware, actions can include:

- Stealing hard disk space and memory, slowing down or completing stopping the PC
- Corrupting or deleting data
- Compromising the entire system by providing remote access to hackers
- Stealing passwords and other sensitive information
- Gathering information about your web-browsing habits without your consent for advertising purposes
- Installing other unwanted software

Generally, most malicious threats can be detected and removed by AVG.[/mw_shl_code]

帖子来源:

http://bbs.kafan.cn/thread-1867798-1-1.html

http://bbs.kafan.cn/thread-1866977-1-1.html

http://bbs.kafan.cn/thread-1868415-1-1.html

http://bbs.kafan.cn/thread-1867194-1-1.html

http://bbs.kafan.cn/thread-2030207-1-1.html

aboringman
发表于 2016-3-15 20:05:09 | 显示全部楼层
saga3721 发表于 2016-3-15 19:53
如今后悔没一直用红伞是吧

我从来没有这样想过,虽然红伞确实厉害
ymb668888
发表于 2016-3-15 20:31:29 | 显示全部楼层
卡巴解压杀

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
也就是这样
发表于 2016-3-15 20:36:14 | 显示全部楼层

RE: Detection ratio: 5 / 56 Web Attack: Angler Exploit Kit Flash Exploit 6 挂马

aboringman 发表于 2016-3-15 20:03
今天就来好好聊聊ARES的问题,一直以来,这个报法都被作为拉黑报法而饱受吐槽,而且仅仅只有楼主一直这样做 ...

也就是说大a得主防还是牛掰得喽,
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-15 22:58 , Processed in 0.128246 second(s), 19 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表