查看: 1745|回复: 12
收起左侧

[病毒样本] 每日甜点包

[复制链接]
PINCER
发表于 2020-5-21 13:44:00 | 显示全部楼层 |阅读模式
来源:Anyrun
数量:应该是5个
质量:Just so so~ 有能全过的,也有能全杀的
口味:#Exploit 为主 可能会有 #Stealer

样本链接:https://send.firefox.com/downloa ... mDYodcJ-qwsf0OzA_3w

密码:infected

评分

参与人数 1人气 +1 收起 理由
Nocria + 1 感谢支持,欢迎常来: )

查看全部评分

a233
发表于 2020-5-21 13:46:38 | 显示全部楼层
AVG报11项清空

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
Nocria
发表于 2020-5-21 13:47:05 | 显示全部楼层
本帖最后由 Nocria 于 2020-5-21 14:06 编辑

IKARUS - 3/5
  1. [21.05.2020 14:02:07] On-demand scan started: "user_defined"
  2. [21.05.2020 14:02:08] Found, 0.188s, SigName: "Trojan.Win32.NjRat", SigId: 299887328, Type: "VIRUS", File: "C:\Users\promi\Desktop\1 vps\1 vps\2.bin"
  3. [21.05.2020 14:02:08] Found, 0.15s, SigName: "Exploit.CVE-2017-11882", SigId: 3283595, Type: "VIRUS", File: "C:\Users\promi\Desktop\1 vps\1 vps\RFQ.xlsx"
  4. [21.05.2020 14:02:08] Found, 0.00s, SigName: "Trojan.MSIL.Agent", SigId: 3692053, Type: "VIRUS", File: "C:\Users\promi\Desktop\1 vps\1 vps\TESTE.bin"
  5. [21.05.2020 14:02:08] On-demand scan FINISHED: "user_defined"
  6. [21.05.2020 14:02:08] ----------------------------------------------------
  7. [21.05.2020 14:02:08] Directories scanned: 2
  8. [21.05.2020 14:02:08] Files scanned: 5
  9. [21.05.2020 14:02:08] Virus found: 3
  10. [21.05.2020 14:02:08] ----------------------------------------------------
复制代码

G DATA emptied.



本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
54ss
发表于 2020-5-21 13:49:56 | 显示全部楼层
Bitdefender 清空
C:\Users\ljsjo\Downloads\1 vps.zip=>1 vps=>2.bin=>(RAR Sfx o)=>calc.exe Trojan.GenericKD.33753002 Moved to Quarantine
C:\Users\ljsjo\Downloads\1 vps.zip=>1 vps=>2.bin=>(RAR Sfx o)=>[Comment] Trojan.Uztuby.15 Moved to Quarantine
C:\Users\ljsjo\Downloads\1 vps.zip=>1 vps=>2.bin=>(RAR Sfx o)=>calculator.exe Gen:Variant.Zusy.93645 Moved to Quarantine
C:\Users\ljsjo\Downloads\1 vps.zip=>1 vps=>2.bin=>(RAR Sfx o)=>99.exe Trojan.GenericKD.33739367 Moved to Quarantine
C:\Users\ljsjo\Downloads\1 vps.zip=>1 vps=>RFQ.xlsx=>xl/embeddings/oleObject1.bin Exploit.CVE-2017-11882.Gen Deleted
C:\Users\ljsjo\Downloads\1 vps.zip=>1 vps=>2.bin=>(RAR Sfx o)=>calc.vbs=>(unicode) VBS.Worm.Dunihi.2.Gen Moved to Quarantine
C:\Users\ljsjo\Downloads\1 vps.zip=>1 vps=>ASD0493564QE.xlsx=>(Encrypted Package)=>xl/embeddings/oleObject1.bin Exploit.CVE-2017-11882.Gen Moved to Quarantine
C:\Users\ljsjo\Downloads\1 vps.zip=>1 vps/ASD0493564QE.xlsx  Moved to Quarantine
C:\Users\ljsjo\Downloads\1 vps.zip=>1 vps/Costco New Order Ref52120.xlsx  Moved to Quarantine
C:\Users\ljsjo\Downloads\1 vps.zip=>1 vps=>Costco New Order Ref52120.xlsx=>(Encrypted Package)=>xl/embeddings/oleObject1.bin Exploit.CVE-2017-11882.Gen Moved to Quarantine
C:\Users\ljsjo\Downloads\1 vps.zip=>1 vps/TESTE.bin Gen:Variant.Ransom.Samas.9 Deleted
我如浮云般飘过
发表于 2020-5-21 14:07:59 | 显示全部楼层
卡巴 清空
  1. 21.05.2020 14.05.35        检测到的对象 ( 文件 ) 已删除        E:\sample\1 vps\ASD0493564QE.xlsx//encrypted//xl/embeddings/oleObject1.bin//exploit        文件: E:\sample\1 vps\ASD0493564QE.xlsx//encrypted//xl/embeddings/oleObject1.bin//exploit        对象名称: HEUR:Exploit.MSOffice.Generic        对象类型: 木马程序        时间: 2020/5/21 14:05
  2. 21.05.2020 14.05.35        检测到的对象 ( 文件 ) 已删除        E:\sample\1 vps\ASD0493564QE.xlsx        文件: E:\sample\1 vps\ASD0493564QE.xlsx        时间: 2020/5/21 14:05
  3. 21.05.2020 14.05.34        检测到的对象 ( 文件 ) 已删除        E:\sample\1 vps\Costco New Order Ref52120.xlsx        文件: E:\sample\1 vps\Costco New Order Ref52120.xlsx        时间: 2020/5/21 14:05
  4. 21.05.2020 14.05.34        检测到的对象 ( 文件 ) 已删除        E:\sample\1 vps\Costco New Order Ref52120.xlsx//encrypted//xl/embeddings/oleObject1.bin//exploit        文件: E:\sample\1 vps\Costco New Order Ref52120.xlsx//encrypted//xl/embeddings/oleObject1.bin//exploit        对象名称: HEUR:Exploit.MSOffice.Generic        对象类型: 木马程序        时间: 2020/5/21 14:05
  5. 21.05.2020 14.05.34        检测到的对象 ( 文件 ) 已删除        E:\sample\1 vps\RFQ.xlsx        文件: E:\sample\1 vps\RFQ.xlsx        对象名称: UDS:DangerousObject.Multi.Generic        时间: 2020/5/21 14:05
  6. 21.05.2020 14.05.34        检测到的对象 ( 文件 ) 已删除        E:\sample\1 vps\RFQ.xlsx//xl/embeddings/oleObject1.bin//exploit        文件: E:\sample\1 vps\RFQ.xlsx//xl/embeddings/oleObject1.bin//exploit        对象名称: HEUR:Exploit.MSOffice.Generic        对象类型: 木马程序        时间: 2020/5/21 14:05
  7. 21.05.2020 14.05.33        检测到的对象 ( 文件 ) 已删除        E:\sample\1 vps\2.bin        文件: E:\sample\1 vps\2.bin        对象名称: UDS:DangerousObject.Multi.Generic        时间: 2020/5/21 14:05
  8. 21.05.2020 14.05.33        检测到的对象 ( 文件 ) 已删除        E:\sample\1 vps\TESTE.bin        文件: E:\sample\1 vps\TESTE.bin        对象名称: HEUR:Backdoor.MSIL.Crysan.gen        对象类型: 木马程序        时间: 2020/5/21 14:05
复制代码

傻猪猪米走鸡
发表于 2020-5-21 14:19:38 | 显示全部楼层
ESET
Time;Scanner;Object type;Object;Detection;Action;User;Information;Hash;First seen here
2020/5/21 14:14:00;Real-time file system protection;file;C:\Users\Galaxy\Downloads\1 vps\1 vps\RFQ.xlsx;probably a variant of Win32/Exploit.CVE-2017-11882.C trojan;cleaned by deleting;DESKTOP-NV3EN59\Galaxy;Event occurred on a new file created by the application: C:\Program Files\Bandizip\Bandizip.exe (45DB9445A28E458404D6BEC38399ABE9631CB54C).;795A4BD846A4D0941C7DC5F582E6E01897D1BC6F;
2020/5/21 14:14:03;Real-time file system protection;file;C:\Users\Galaxy\Downloads\1 vps\1 vps\TESTE.bin;a variant of MSIL/Agent.CFQ trojan;cleaned by deleting;DESKTOP-NV3EN59\Galaxy;Event occurred on a new file created by the application: C:\Program Files\Bandizip\Bandizip.exe (45DB9445A28E458404D6BEC38399ABE9631CB54C).;8617D054868A777CE6579936DAB7B919816E969C;2020/5/20 2:08:49
2020/5/21 14:14:10;Real-time file system protection;file;C:\Users\Galaxy\Downloads\1 vps\1 vps\2.bin;multiple threats;cleaned by deleting;DESKTOP-NV3EN59\Galaxy;Event occurred on a new file created by the application: C:\Program Files\Bandizip\Bandizip.exe (45DB9445A28E458404D6BEC38399ABE9631CB54C).;C28BB395E035D8CC738BB7A88A24408B29178528;

Log
Scan Log
Version of detection engine: 21362P (20200521)
Date: 2020/5/21  Time: 14:14:24
Scanned disks, folders and files: C:\Users\Galaxy\Downloads\1 vps\1 vps\Costco New Order Ref52120.xlsx;C:\Users\Galaxy\Downloads\1 vps\1 vps\ASD0493564QE.xlsx
C:\Users\Galaxy\Downloads\1 vps\1 vps\ASD0493564QE.xlsx » OFFICECRYPTOGRAPHY » ASD0493564QE.xlsx » ZIP » xl/embeddings/oleObject1.bin - probably a variant of Win32/Exploit.CVE-2017-11882.C trojan - deleted
C:\Users\Galaxy\Downloads\1 vps\1 vps\Costco New Order Ref52120.xlsx » OFFICECRYPTOGRAPHY » Costco New Order Ref52120.xlsx » ZIP » xl/embeddings/oleObject1.bin - probably a variant of Win32/Exploit.CVE-2017-11882.C trojan - deleted
Number of scanned objects: 48
Number of detections: 2
Number of cleaned objects: 2
Time of completion: 14:14:25  Total scanning time: 1 sec (00:00:01)
心醉咖啡
发表于 2020-5-21 15:27:11 | 显示全部楼层
应该被人扫过了,毒霸
  1. 扫描时间:[2020-05-21 15:25:55]
  2. 扫描用时:[00:00:10]
  3. 扫描类型:自定义查杀
  4. 扫描文件总数:19
  5. 扫描速度:1文件/秒
  6. 发现威胁:4个
  7. 清除威胁:4个
  8. =============================================
  9. [2020-05-21 15:26:12]
  10. 威胁:e:\浏览器下载\1 vps\2.bin
  11. 类型:win32.troj.undef.(kcloud)
  12. 处理方式:删除

  13. [2020-05-21 15:26:12]
  14. 威胁:e:\浏览器下载\1 vps\asd0493564qe.xlsx
  15. 类型:win32.scriptc.undef.a.(kcloud)
  16. 处理方式:修复

  17. [2020-05-21 15:26:12]
  18. 威胁:e:\浏览器下载\1 vps\costco new order ref52120.xlsx
  19. 类型:win32.scriptc.undef.a.(kcloud)
  20. 处理方式:修复

  21. [2020-05-21 15:26:12]
  22. 威胁:e:\浏览器下载\1 vps\teste.bin
  23. 类型:win32.hack.undef.(kcloud)
  24. 处理方式:删除

复制代码
虫の空灵
发表于 2020-5-21 16:16:30 | 显示全部楼层
SEP 3/5 留ASD0493564QE 和 Costco New Order Ref52120
  1. 文件名        风险        操作        风险类型
  2. oleObject1.bin        Exp.CVE-2017-11882!g3        已隔离        压缩的文件; 启发式病毒
  3. RFQ.xlsx        Exp.CVE-2017-11882!g3        已隔离        压缩的文件; 启发式病毒
  4. 2.bin        Trojan.Gen.MBT        已通过删除清除        病毒
  5. RFQ.xlsx        Exp.CVE-2017-11882!g2        已清除        启发式病毒
  6. TESTE.bin        Heur.AdvML.C        已通过删除清除        启发式病毒
  7. TESTE.bin        Trojan.Gen.MBT        已清除        病毒
复制代码


PINCER
 楼主| 发表于 2020-5-21 16:19:21 | 显示全部楼层
本帖最后由 PINCER 于 2020-5-21 19:45 编辑

居然没有人测火绒 我挺想看看火绒的入库效率的

火绒
20200520 16:26  毒库
scan miss all

Update:经上报,已可以查杀(火绒团队的服务态度是真的赞回复也很快)
ELOHIM
发表于 2020-5-21 16:46:45 | 显示全部楼层
微软扫描剩下这个:Costco New Order Ref52120.xlsx。
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-4-25 23:53 , Processed in 0.133139 second(s), 18 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表