查看: 2361|回复: 9
收起左侧

[病毒样本] trickbot (18.04.19)

[复制链接]
petr0vic
发表于 2018-4-19 23:20:43 | 显示全部楼层 |阅读模式
  1. efficientmarketing.com.au/1.bin
  2. paranaimpact.com/1.bin
复制代码




infected

https://www.virustotal.com/en/fi ... /analysis/#analysis

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
761773275
发表于 2018-4-19 23:44:11 | 显示全部楼层
本帖最后由 761773275 于 2018-4-20 00:02 编辑

AVG主防杀!!!!



大蜘蛛主防杀!!!!



费尔V8主防杀!!!!

https://s.threatbook.cn/report/win7_sp1_enx86_office2013/fecddb7f3fa478be4687ca542c0ecf232ec35a0c2418c8bfe4875686ec373c1e/


行为签名
恶意签名(6)
全部收起

  • 缓冲区中发现一个PE文件
    buffer"Buffer with sha1: c93b8863d20a179a16521c2a274087df721497d7"


  • 通过注册表键来检测是否安装了常见反病毒软件
    registry"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Microsoft Antimalware\\Exclusions\\Paths"


  • 检测是否有调试器运行
    Time & API
    Arguments
    Status
    Return

    2018-04-20 23:58:45
    IsDebuggerPresent
    00
    2018-04-20 23:59:06
    IsDebuggerPresent
    00


  • 关闭Windows安全特性
    registry:HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\vbccsb\AppData\Roaming\DiskMonitor\


  • 修改其他进程的内存数据
    Time & API
    Arguments
    Status
    Return

    2018-04-20 23:59:00
    WriteProcessMemory
    buffer :
    base_address :0x00400000
    process_identifier :2520
    process_handle :0x00000074
    11
    2018-04-20 23:59:00
    WriteProcessMemory
    buffer :@
    base_address :0x7ffd7008
    process_identifier :2520
    process_handle :0x00000074
    11
    2018-04-20 23:59:20
    WriteProcessMemory
    buffer :
    base_address :0x00400000
    process_identifier :2672
    process_handle :0x00000074
    11
    2018-04-20 23:59:20
    WriteProcessMemory
    buffer :@
    base_address :0x7ffdf008
    process_identifier :2672
    process_handle :0x00000074
    11


  • 启动一个进程并注入代码,该程序可能正在脱壳
    Time & API
    Arguments
    Status
    Return

    2018-04-20 23:59:00
    CreateProcessInternalW
    thread_identifier :2524
    thread_handle :0x00000070
    process_identifier :2520
    current_directory :
    filepath :
    track :1
    command_line :"C:\Users\vbccsb\AppData\Local\Temp\1.exe"
    filepath_r :
    stack_pivoted :0
    creation_flags :4
    inherit_handles :0
    process_handle :0x00000074
    11
    2018-04-20 23:59:00
    NtGetContextThread
    thread_handle :0x00000070
    10
    2018-04-20 23:59:00
    NtUnmapViewOfSection
    base_address :0x00400000
    region_size :4096
    process_identifier :2520
    process_handle :0x00000074
    10
    2018-04-20 23:59:00
    NtAllocateVirtualMemory
    process_identifier :2520
    region_size :155648
    stack_dep_bypass :0
    stack_pivoted :0
    heap_dep_bypass :0
    protection :64
    base_address :0x00400000
    allocation_type :12288
    process_handle :0x00000074
    10
    2018-04-20 23:59:00
    WriteProcessMemory
    buffer :
    base_address :0x00400000
    process_identifier :2520
    process_handle :0x00000074
    11
    2018-04-20 23:59:00
    WriteProcessMemory
    buffer :@
    base_address :0x7ffd7008
    process_identifier :2520
    process_handle :0x00000074
    11
    2018-04-20 23:59:00
    NtSetContextThread
    registers :{"eip":0,"esp":0,"edi":0,"eax":4198400,"ebp":0,"edx":0,"ebx":2147315712,"esi":0,"ecx":0}
    thread_handle :0x00000070
    process_identifier :2520
    10
    2018-04-20 23:59:02
    NtResumeThread
    thread_handle :0x00000070
    suspend_count :1
    process_identifier :2520
    10
    2018-04-20 23:59:04
    CreateProcessInternalW
    thread_identifier :2624
    thread_handle :0x00000094
    process_identifier :2620
    current_directory :C:\Users\vbccsb\AppData\Roaming\DiskMonitor
    filepath :
    track :1
    command_line :C:\Users\vbccsb\AppData\Roaming\DiskMonitor\1.exe
    filepath_r :
    stack_pivoted :0
    creation_flags :0
    inherit_handles :0
    process_handle :0x00000098
    11
    2018-04-20 23:59:20
    CreateProcessInternalW
    thread_identifier :2676
    thread_handle :0x00000070
    process_identifier :2672
    current_directory :
    filepath :
    track :1
    command_line :C:\Users\vbccsb\AppData\Roaming\DiskMonitor\1.exe
    filepath_r :
    stack_pivoted :0
    creation_flags :4
    inherit_handles :0
    process_handle :0x00000074
    11
    2018-04-20 23:59:20
    NtGetContextThread
    thread_handle :0x00000070
    10
    2018-04-20 23:59:20
    NtUnmapViewOfSection
    base_address :0x00400000
    region_size :4096
    process_identifier :2672
    process_handle :0x00000074
    10
    2018-04-20 23:59:20
    NtAllocateVirtualMemory
    process_identifier :2672
    region_size :155648
    stack_dep_bypass :0
    stack_pivoted :0
    heap_dep_bypass :0
    protection :64
    base_address :0x00400000
    allocation_type :12288
    process_handle :0x00000074
    10
    2018-04-20 23:59:20
    WriteProcessMemory
    buffer :
    base_address :0x00400000
    process_identifier :2672
    process_handle :0x00000074
    11
    2018-04-20 23:59:20
    WriteProcessMemory
    buffer :@
    base_address :0x7ffdf008
    process_identifier :2672
    process_handle :0x00000074
    11
    2018-04-20 23:59:20
    NtSetContextThread
    registers :{"eip":0,"esp":0,"edi":0,"eax":4198400,"ebp":0,"edx":0,"ebx":2147348480,"esi":0,"ecx":0}
    thread_handle :0x00000070
    process_identifier :2672
    10
    2018-04-20 23:59:21
    NtResumeThread
    thread_handle :0x00000070
    suspend_count :1
    process_identifier :2672
    10












本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
桑德尔
头像被屏蔽
发表于 2018-4-20 00:05:39 | 显示全部楼层
文件名: 1.exe
威胁名称: WS.Reputation.1完整路径: c:\users\桑德尔\desktop\1\1.exe

____________________________

____________________________


在电脑上 
2018/4/20 ( 0:03:28 )

上次使用时间 
2018/4/20 ( 0:05:28 )

启动项 


已启动 


威胁类型: 智能网络威胁。 很多迹象表明此文件不可信任,不安全

____________________________


1.exe 威胁名称: WS.Reputation.1
定位


极少用户信任的文件
Norton 社区中有不到 5 名用户 使用了此文件。

极新的文件
该文件已在 不到 1 周 前发行。


此文件具有中等程度风险。


____________________________


https://att.kafan.cn/forum.php?mo ... jM0ODd8MjEyMDgzOQ==
已下载文件 从 att.kafan.cn
来源: 外部介质

1.exe

____________________________

文件操作

文件: c:\users\桑德尔\desktop\1\ 1.exe 已删除
____________________________


文件指纹 - SHA:
fecddb7f3fa478be4687ca542c0ecf232ec35a0c2418c8bfe4875686ec373c1e
文件指纹 - MD5:
73582cd6bd542a34fa36a6a8c768307c
ELOHIM
发表于 2018-4-20 00:31:50 | 显示全部楼层
SCEP : Trojan:Win32/Cloxer.D!cl
x291502676
发表于 2018-4-20 01:13:30 | 显示全部楼层
SEP双击声纳 杀
欧阳宣
头像被屏蔽
发表于 2018-4-20 01:42:51 | 显示全部楼层
Malwarebytes

File: 1
Spyware.TrickBot, E:\VIRUS\1\1.EXE, No Action By User, [6225], [512666],1.0.4796
saleniy35
发表于 2018-4-20 08:45:01 | 显示全部楼层
KIS Trojan.Win32.Yakes.wfwl

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
Jerry.Lin
发表于 2018-4-20 09:32:46 | 显示全部楼层
WD OFFLINE MISS
Dolby123
发表于 2018-4-20 21:07:49 | 显示全部楼层
WD

Trojan:Win32/Cloxer.D!cl
温馨小屋
头像被屏蔽
发表于 2018-4-20 21:37:49 | 显示全部楼层

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-4-26 18:06 , Processed in 0.138817 second(s), 17 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表