查看: 2835|回复: 15
收起左侧

[病毒样本] fake codec x1

[复制链接]
solcroft
发表于 2008-4-14 23:10:45 | 显示全部楼层 |阅读模式
太多了,捉都捉不完
网址似乎每半小时变一次

[ 本帖最后由 solcroft 于 2008-4-15 01:31 编辑 ]

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
91343
头像被屏蔽
发表于 2008-4-14 23:18:38 | 显示全部楼层
卡巴pass,哎都对卡巴做免杀



本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
aerbeisi
发表于 2008-4-14 23:27:34 | 显示全部楼层
zhelatin应该是俄罗斯人自己搞的,卡巴入库挺快的。

NOD32 2.x扫描不到。
wangjay1980
发表于 2008-4-14 23:35:27 | 显示全部楼层
TO KL
wangjay1980
发表于 2008-4-14 23:38:01 | 显示全部楼层
Service load:  0%        100%  

File:  MediaTubeCodec_ver1.1095.0.zip  
Status:  INFECTED/MALWARE  
MD5:  13325096da367a3ff87f068ec9af776d  
Packers detected:  -
Bit9 reports:  File not found  

Scanner results  
Scan taken on 14 Apr 2008 15:36:43 (GMT)  
A-Squared  Found nothing
AntiVir  Found nothing
ArcaVir  Found nothing
Avast  Found nothing
AVG Antivirus  Found nothing
BitDefender  Found nothing
ClamAV  Found nothing
CPsecure  Found nothing
Dr.Web  Found nothing
F-Prot Antivirus  Found nothing
F-Secure Anti-Virus  Found nothing
Fortinet  Found nothing
Ikarus  Found nothing
Kaspersky Anti-Virus  Found nothing
NOD32  Found nothing
Norman Virus Control  Found nothing
Panda Antivirus  Found nothing
Sophos Antivirus  Found Mal/EncPk-DA  
VirusBuster  Found nothing
VBA32  Found MalwareScope.Worm.Nuwar-Glowa.1
冷冷
发表于 2008-4-14 23:41:16 | 显示全部楼层
IK
I:\virus\样本区\MediaTubeCodec_ver1[1].1095.0.zip:\MediaTubeCodec_ver1.1095.0.exe - Suspect code-parts found (Level: 35)
I:\virus\样本区\MediaTubeCodec_ver1[1].1095.0.zip

        2 Files scanned
          (1 Archiv with 1 file)
        0 Signatures found
        1 Suspect code-part found
        Used time: 0:23.875
aerbeisi
发表于 2008-4-14 23:48:28 | 显示全部楼层

FROM NOD32

Nuwar Shifts to Fake CodecsApril 8th, 2008

It has only been a day since the last strategy shift from the Nuwar gang and they have already gone away from the love letter theme.
By monitoring computers infected with Nuwar, we can keep track of their social engineering schemes.
They are now using a common theme used by the Zlob threat for a couple of months.
They use fake codecs to entice users into downloading and executing their malware.

The screenshot below shows that web pages are used to display advertisement of a codec (piece of software used to read certain video formats).
If a user clicks on the image or the text link, he is redirected to an executable named StormCodec.exe (detected as Nuwar.GG by ESET NOD32 Antivirus).
It is funny to note that the Storm Worm gang uses a name given by the security industry in their malware.
We also noticed that the latest scheme is not completely polished: the title of the fake codec page still reads “I love you”.



The quick pace of changes in Nuwar’s social engineering is a proof that its controllers are paying close attention to the performance of their social engineering campaigns.
When they see that a theme is not efficient, they quickly change their strategy.
We are facing a rapidly evolving adversary!

Pierre-Marc Bureau
Researcher
solcroft
 楼主| 发表于 2008-4-14 23:53:12 | 显示全部楼层

回复 8楼 aerbeisi 的帖子

想想回来,ESET不把一些启发算法加入到动手扫描器里可能是故意的
看看VT上的结果就知道了
可是这样反而导致某些高手大吹说ESET杀vundo,zlob,zhelatin,swizzor太差了,因为他们只懂得看VT
aerbeisi
发表于 2008-4-14 23:59:33 | 显示全部楼层
昨天我运行了绅博周幸的vundo,nod无法扫描到,监控截取到了生成物bat,但三个vundo的dll无法截取,进程已被强奸。

http://kafan.cn/bbs/viewthread.php?tid=234355&extra=page%3D2
solcroft
 楼主| 发表于 2008-4-15 00:01:19 | 显示全部楼层

回复 9楼 aerbeisi 的帖子

我的拦截生成物后dll可以动手删除掉,没被插入任何进程
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-7-15 02:22 , Processed in 0.134321 second(s), 19 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表