查看: 1180|回复: 10
收起左侧

[病毒样本] 银狐&XAgent木马2X

[复制链接]
guess就是我
发表于 2025-3-25 01:25:05 | 显示全部楼层
avast都清掉了

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
LSPLDD
发表于 2025-3-25 02:14:47 | 显示全部楼层
本帖最后由 LSPLDD 于 2025-3-25 02:41 编辑

eset双击2X
卡巴还在等。。。

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
Nocria
发表于 2025-3-25 06:38:06 | 显示全部楼层
本帖最后由 Nocria 于 2025-3-25 06:42 编辑

XAgent木马.msi



银狐.msi

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
心醉咖啡
发表于 2025-3-25 07:34:27 | 显示全部楼层
火绒

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
truetime
发表于 2025-3-25 10:18:46 | 显示全部楼层
TES MISS
火绒 KILL
X-SEC KILL

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
1094947421
发表于 2025-3-25 12:40:44 | 显示全部楼层

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
chx818
发表于 2025-3-25 19:28:21 | 显示全部楼层
本帖最后由 chx818 于 2025-3-25 19:37 编辑

elastic在msi执行完安装后之后会拦截一些东西,但不知道有没有防住,两个文件都是如此


基于Grok2的Attack Discovery:
Summary
Two high-risk Memory Threat Prevention Alert: Shellcode Injection incidents detected on

desktop-c2asff2
involving
uc.exe
and user

chx818
.

Details
On

desktop-c2asff2
, a Windows machine running version 21H2, two high-risk alerts were triggered at
2025-03-25T11:26:35.835Z
and
2025-03-25T11:25:35.076Z
respectively. Both alerts were related to a Memory Threat Prevention Alert: Shellcode Injection detected by Elastic Defend. The process involved was
uc.exe
from
C:\Program Files (x86)\Mancyag\Google AI Browser v1.4.1\uc.exe
, which is signed by Shanghai Yiyi Digital Technology Co., Ltd and considered trusted. The parent process was
msiexec.exe
from
C:\Windows\SysWOW64\msiexec.exe
, indicating that the malicious activity might have been initiated through a software installation or update mechanism. The user involved in both incidents was

chx818
on the domain
DESKTOP-C2ASFF2
.

Initial Compromise: The attack likely began with the exploitation of a vulnerability in a software installation process, possibly through a malicious update or installation package. The use of msiexec.exe suggests an attempt to install or execute something under the guise of a legitimate Windows process.
Shellcode Injection: The uc.exe process, part of the Google AI Browser, was used to inject shellcode into memory. This technique is often used to evade detection and execute malicious code directly in memory, bypassing traditional file-based security measures.
Persistence and Escalation: The medium integrity level of the process suggests that the attacker might be attempting to escalate privileges or ensure persistence on the system.
Attribution: While no direct attribution to a known threat group can be made from the available data, the use of shellcode injection and trusted software manipulation is a common tactic among advanced persistent threat (APT) groups.

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
吃瓜群众第123位
发表于 2025-3-25 19:48:54 | 显示全部楼层
FSP KILL ALL

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
biue
发表于 2025-3-25 23:13:18 | 显示全部楼层
本帖最后由 biue 于 2025-3-25 23:15 编辑

腾讯电脑管家 2X

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-9 09:35 , Processed in 0.143471 second(s), 18 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表