123
返回列表 发新帖
楼主: VISN
收起左侧

[病毒样本] 修改一段代码过卡巴斯基扫描

[复制链接]
zszzd
发表于 2008-6-5 10:57:28 | 显示全部楼层
程序:
C:\DOCUMENTS AND SETTINGS\LL\LOCAL SETTINGS\TEMP\RAR$EX00.843\2.EXE
是否删除木马程序及其衍生物?
lhc-yuan
发表于 2008-6-5 11:57:19 | 显示全部楼层
红伞,报!!!
电影结束了
发表于 2008-6-5 11:59:02 | 显示全部楼层
  • Summary of the findings:
What's been foundSeverity Level
Downloads/requests other files from Internet.


Technical Details:
File System Modifications
  • The following file was created in the system:
#Filename(s)File SizeFile MD5
1%Temp%\tmp1.tmp 29,696 bytes0x801FAC32E87C360DD816E155AAC9CAE0

  • Note:
    • %Temp% is a variable that refers to the temporary folder in the short path form. By default, this is C:\Documents and Settings\[UserName]\Local Settings\Temp\ (Windows NT/2000/XP).

Memory Modifications
  • There was a new process created in the system:
Process NameProcess FilenameMain Module Size
[filename of the sample #1][file and pathname of the sample #1]37,376 bytes

  • There was a new memory page created in the address space of the system process(es):
Process NameProcess FilenameAllocated Size
svchost.exe%System%\svchost.exe24,576 bytes

  • Notes:
    • %System% is a variable that refers to the System folder. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).

Other details
  • The following Internet Connection was established:
Server NameServer PortConnect as UserConnection Password
216.255.186.23780(null)(null)

电影结束了
发表于 2008-6-5 12:00:25 | 显示全部楼层

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
zwl2828
发表于 2008-6-5 12:26:45 | 显示全部楼层
所请求的目标已被感染了下列病毒: Backdoor.Win32.Small.dzm
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-6-2 08:28 , Processed in 0.082947 second(s), 15 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表