123
返回列表 发新帖
楼主: Jerry.Lin
收起左侧

[病毒样本] 【05.30】#VirusPackage 6x + Modified Samples

[复制链接]
ELOHIM
发表于 2018-5-31 14:25:56 | 显示全部楼层


云报了,本地还没反应。SCEP 没反应。

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
小飞侠.net
发表于 2018-6-4 21:21:18 | 显示全部楼层
本帖最后由 小飞侠.net 于 2018-6-4 22:13 编辑

                        X-Sec Antivirus ---(Windows 10 Creators Update(Redstone 4)....1803):
Basic Info:
---------------------
Database Version: 2018.06.03.01
Program Version: [图片]2.1.1.0
Heuristic Engine: Enabled
Cloud Engine: Enabled
Enhanced Mode: Disabled
Backup Before Resolve: Yes
Resolve Threats: Scan only
Scan Priority: Normal
---------------------
Targets:
---------------------
C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127
---------------------
2018-06-04 22:10:24 Threat Detected: C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Modified Samples\(2).exe -- [Cloud] Cloud:Trojan.Win32.Crypted
2018-06-04 22:10:24 Threat Detected: C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Modified Samples\(1).exe -- [Classic] Trojan.Win32.WanaCry.A
2018-06-04 22:10:25 Threat Detected: C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Modified Samples\(4).exe -- [Cloud] Cloud:Trojan.Win32.Emotet
2018-06-04 22:10:25 Threat Detected: C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Modified Samples\(5).exe -- [Cloud] Cloud:Trojan.Win32.Ransom
2018-06-04 22:10:26 Threat Detected: C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Modified Samples\(6).exe -- [Cloud] Cloud:Trojan.Win32.Generic
2018-06-04 22:10:27 Threat Detected: C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Modified Samples\(3).exe -- [Cloud] Cloud:Trojan.Win32.Infostealer
2018-06-04 22:10:40 Threat Detected: C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Samples\(2).exe -- [Cloud] Cloud:Trojan.Win32.Generic
2018-06-04 22:10:41 Threat Detected: C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Samples\(1).exe -- [Classic] Trojan.Win32.WanaCry.A
2018-06-04 22:10:42 Threat Detected: C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Samples\(4).exe -- [Cloud] Cloud:Trojan.Win32.Crypted
2018-06-04 22:10:42 Threat Detected: C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Samples\(5).exe -- [Cloud] Cloud:Trojan.Win32.Ransom
2018-06-04 22:10:43 Threat Detected: C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Samples\(6).exe -- [Cloud] Cloud:Trojan.Win32.LokiBot
2018-06-04 22:10:44 Threat Detected: C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Samples\(3).exe -- [Cloud] Cloud:Trojan.Win32.Infostealer

   瑞星---(Windows 10 Creators Update(Redstone 4)....1803):云引擎(开)RDM+引擎(开)   

                瑞星反恶软引擎命令行扫描器(社区交流版)                 


编译于:Sep 22 2017   15:07:50

提示:
  - 本工具供社区交流使用,请勿用于其他用途
  - 本工具没有恶意软件删除、清除、隔离功能
  - 本工具包含开发中的新特性,结果仅供参考

* 命令行中的选项开关:-output-json -log=C:\瑞星RDM+引擎\ScanLog_180604215953.log
* 获取恶软签名库最新版本 ...
* 下载恶软签名库配置文件 ...
* 创建恶软签名库升级组件 ...
* 计算并下载增量文件 ...
* 升级恶软签名库 ...
* 恶软签名库升级成功
* 扫描目标 : (1) C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127

* 加载恶软签名库: C:\瑞星RDM+引擎/malware.rmd
* 恶软签名库加载成功,发布序号为 4344
* 读取恶软签名库配置 ...
* 云辅助扫描组件初始化失败.
* 初始化引擎环境 ...
* 初始化引擎环境 ...
* 初始化引擎环境 ...
* 初始化引擎环境 ...
* 初始化引擎环境 ...
* 初始化引擎环境 ...
* 初始化引擎环境 ...
* 初始化引擎环境 ...
扫描开始: Mon Jun 04 22:00:07 2018

{"filename":"C:\\Users\\Admin\\Desktop\\AVtest100\\Virus 6x 0530Wannacry2127\\Virus 6x 0530\\Modified Samples\\(5).exe","infect":{"engine":"rdmk","signature":"cmRtazpWxMcWtpV2KRcMr3S9yzbO","threat":"Trojan.Fuerboos!8.EFC8"},"type":"scan"}
{"filename":"C:\\Users\\Admin\\Desktop\\AVtest100\\Virus 6x 0530Wannacry2127\\Virus 6x 0530\\Modified Samples\\(4).exe","infect":{"engine":"sha1","signature":"c2hhMTrE+QtL5vEDAhM4GtnqEidikCPXMA","threat":"Dropper.Generic!8.35E"},"type":"scan"}
{"filename":"C:\\Users\\Admin\\Desktop\\AVtest100\\Virus 6x 0530Wannacry2127\\Virus 6x 0530\\Modified Samples\\(3).exe","infect":{"engine":"sha1","signature":"c2hhMTqX7B6Tc6yDqMfML1BSFHnNU1wIrA","threat":"Trojan.Crypto!8.364"},"type":"scan"}
{"filename":"C:\\Users\\Admin\\Desktop\\AVtest100\\Virus 6x 0530Wannacry2127\\Virus 6x 0530\\Modified Samples\\(6).exe","infect":{"engine":"sha1","signature":"c2hhMTrykrZOXfGSwIC55HMLZL6KyG320w","threat":"Dropper.Generic!8.35E"},"type":"scan"}
{"filename":"C:\\Users\\Admin\\Desktop\\AVtest100\\Virus 6x 0530Wannacry2127\\Virus 6x 0530\\Samples\\(2).exe","infect":{"engine":"sha1","signature":"c2hhMTo9fBdZXmh//X3ZUG3F61mGDUSxFQ","threat":"Trojan.Skillis!8.353"},"type":"scan"}
{"filename":"C:\\Users\\Admin\\Desktop\\AVtest100\\Virus 6x 0530Wannacry2127\\Virus 6x 0530\\Modified Samples\\(1).exe","infect":{"engine":"rdmk","signature":"cmRtazoYj/LUSO3IrOOZk022Q2tz","threat":"Exploit.EternalBlue!1.AAED"},"type":"scan"}
{"filename":"C:\\Users\\Admin\\Desktop\\AVtest100\\Virus 6x 0530Wannacry2127\\Virus 6x 0530\\Samples\\(1).exe","infect":{"engine":"c64","signature":"YzY0OtNB7z75v4vr","threat":"Ransom.FileCryptor!8.1A7"},"type":"scan"}
{"filename":"C:\\Users\\Admin\\Desktop\\AVtest100\\Virus 6x 0530Wannacry2127\\Virus 6x 0530\\Samples\\(3).exe","infect":{"engine":"sha1","signature":"c2hhMTofBBcQ973kER7lzEGvEtaSOVPW+Q","threat":"Trojan.Injector!8.C4"},"type":"scan"}
{"filename":"C:\\Users\\Admin\\Desktop\\AVtest100\\Virus 6x 0530Wannacry2127\\Virus 6x 0530\\Samples\\(4).exe","infect":{"engine":"tfe","signature":"dGZlOgwUkSpPviI+wg","threat":"Dropper.Generic!8.35E"},"type":"scan"}
{"filename":"C:\\Users\\Admin\\Desktop\\AVtest100\\Virus 6x 0530Wannacry2127\\Virus 6x 0530\\Samples\\(5).exe","infect":{"engine":"sha1","signature":"c2hhMTog0Fh55/ipRvLRJseazHpWA0Cxaw","threat":"Trojan.Fuerboos!8.EFC8"},"type":"scan"}
{"filename":"C:\\Users\\Admin\\Desktop\\AVtest100\\Virus 6x 0530Wannacry2127\\Virus 6x 0530\\Samples\\(6).exe","infect":{"engine":"tfe","signature":"dGZlOgwQwIv2yOzNtA","threat":"Dropper.Generic!8.35E"},"type":"scan"}
{"filename":"C:\\Users\\Admin\\Desktop\\AVtest100\\Virus 6x 0530Wannacry2127\\Virus 6x 0530\\Modified Samples\\(2).exe","type":"scan"}

扫描结束: Mon Jun 04 22:00:09 2018

总扫描耗时: 0:2:412(m:s:ms)
总扫描对象: 12
总扫描文件: 12
总恶意文件: 11
有效检出率: 91.67%



Emsisoft Emergency Kit - 版本 2018.4
上次更新: 2018-06-04 20:57:03
用户帐号: TECLAST\Admin
电脑名称: TECLAST
操作系统版本: Windows 10 x64

Emsisoft Emergency Kit 绿色免费版
(已开启)加入 Emsisoft 云、更新源:测试版
    Bitdefender(B)+Emsisoft(A) 双引擎

扫描设置:

扫描方式: 自定义扫描
对象: Rootkits, 内存, C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\

检测流氓软件(PUPs): On
扫描压缩包: On
扫描邮件存档: Off
ADS数据流: On
文件扩展名过滤: Off
直接磁盘访问: Off

扫描开始于:        2018-06-04 21:49:15
C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Modified Samples\(1).exe         发现风险: Trojan-Ransom.WanaCrypt0r (A) [287654]
C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Modified Samples\(4).exe         发现风险: Trojan.GenericKD.30900490 (B) [krnl.xmd]
C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Modified Samples\(3).exe         发现风险: Gen:Variant.Ursu.221602 (B) [krnl.xmd]
C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Modified Samples\(5).exe         发现风险: Gen:Variant.Midie.46325 (B) [krnl.xmd]
C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Samples\(1).exe         发现风险: Trojan-Ransom.WanaCrypt0r (A) [287654]
C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Modified Samples\(2).exe         发现风险: Trojan.GenericKD.30900847 (B) [krnl.xmd]
C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Modified Samples\(6).exe         发现风险: Gen:Variant.Sirefef.2287 (B) [krnl.xmd]
C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Samples\(3).exe         发现风险: Trojan.GenericKD.30897951 (B) [krnl.xmd]
C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Samples\(6).exe         发现风险: Gen:Variant.Sirefef.2287 (B) [krnl.xmd]
C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Samples\(5).exe         发现风险: Trojan.Ransom.GandCrab.Gen.2 (B) [krnl.xmd]
C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Samples\(4).exe         发现风险: Gen:Variant.Zusy.287573 (B) [krnl.xmd]

已扫描        1879
发现        11

扫描完成后:        2018-06-04 21:49:38
扫描时间:        0:00:23



ESET Smart Security Premium 64位(高级启发式(Y)+压缩文件(Y)+自解压加壳(Y)+DNA智能签名(Y)++(Windows 10 Creators Update(Redstone 4)....1803):

日志
正在扫描日志
检测引擎的版本: 17496P (20180604)
日期: 2018-06-04  时间: 21:44:02
已扫描的磁盘、文件夹和文件: C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127
C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Modified Samples\(1).exe - Win32/Exploit.CVE-2017-0147.A 特洛伊木马 - 通过删除清除 [1]
C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Modified Samples\(3).exe - Win32/Injector.DYHM 特洛伊木马 的变种 - 通过删除清除 [1]
C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Modified Samples\(4).exe - Win32/PSW.Fareit.L 特洛伊木马 - 通过删除清除 [1]
C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Modified Samples\(5).exe - Win32/Kryptik.GHEW 特洛伊木马 的变种 - 通过删除清除 [1]
C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Modified Samples\(6).exe - MSIL/Injector.REK 特洛伊木马 的变种 - 通过删除清除 [1]
C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Samples\(1).exe - Win32/Exploit.CVE-2017-0147.A 特洛伊木马 - 通过删除清除 [1]
C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Samples\(3).exe - Win32/Injector.DYHM 特洛伊木马 的变种 - 通过删除清除 [1]
C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Samples\(4).exe - Win32/PSW.Fareit.L 特洛伊木马 - 通过删除清除 [1]
C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Samples\(5).exe - Win32/Kryptik.GHEW 特洛伊木马 的变种 - 通过删除清除 [1]
C:\Users\Admin\Desktop\AVtest100\Virus 6x 0530Wannacry2127\Virus 6x 0530\Samples\(6).exe - MSIL/Injector.REK 特洛伊木马 的变种 - 通过删除清除 [1]
已扫描的对象数: 12
发现的威胁数: 10
已清除对象数: 10
完成时间: 21:44:28  总扫描时间: 26 秒 (00:00:26)

备注:
[1] 由于对象中仅包含病毒主体,因此已被删除。



火绒安全---( Windows 7 Ultimate with SP1 简体中文旗舰版....):部分未知文件已发送到seclab@huorong.cn,等处理中。。。

病毒库:2018-06-04 16:10
开始时间:2018-06-04 21:19
总计用时:00:00:08
扫描对象:149个
扫描文件:12个
发现风险:4个
已处理风险:0个
发现系统修复项:0个
处理系统修复项:0个

病毒详情

风险路径:C:\Users\xfxnet2000\Desktop\MX Player Pro\175418360\145802370\479704092\AVTest100\Virus 6x 0530\Modified Samples\(1).exe, 病毒名:Ransom/Wannacry.h, 病毒ID:[b417afda36ac6168], 处理结果:已忽略
风险路径:C:\Users\xfxnet2000\Desktop\MX Player Pro\175418360\145802370\479704092\AVTest100\Virus 6x 0530\Samples\(1).exe, 病毒名:Ransom/Wannacry.h, 病毒ID:[b417afda36ac6168], 处理结果:已忽略
风险路径:C:\Users\xfxnet2000\Desktop\MX Player Pro\175418360\145802370\479704092\AVTest100\Virus 6x 0530\Modified Samples\(5).exe, 病毒名:HVM:VirTool/Obfuscator.gen!A, 病毒ID:[b27d4294cde6a1ec], 处理结果:已忽略
风险路径:C:\Users\xfxnet2000\Desktop\MX Player Pro\175418360\145802370\479704092\AVTest100\Virus 6x 0530\Samples\(5).exe, 病毒名:HVM:VirTool/Obfuscator.gen!A, 病毒ID:[b27d4294cde6a1ec], 处理结果:已忽略

文件名称: C:\Users\xfxnet2000\Desktop\MX Player Pro\175418360\145802370\479704092\AVTest100\Virus 6x 0530.rar
文件大小: 11.5 MB (12,067,742 字节)
修改时间: 2018年06月04日,21:17:57
MD5: A32B1192F043F0D62C7BE8A199B92CE0
SHA1: 026AB971C2BEE85ADD782F8C3EFB3BA9075AC3E3
SHA256: 09DAD0DF8E8200FEC055707360791BA02AB5FE0B2E1AFB25D520F7472B9E4D4B
SHA512: 7044E71CE363D7D6BF3529DCE694E6EE6C85130A6FB43B2120499BFABDE560F5CD6034FAFEF8EF47A7590D6B41D242A816A96067368876403BBA4766337E1499
CRC32: FB2D7994
计算时间: 0.56s

您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-1 07:49 , Processed in 0.101038 second(s), 14 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表