查看: 1580|回复: 7
收起左侧

[病毒样本] 归来一贴

[复制链接]
wangjay1980
发表于 2008-6-24 12:11:48 | 显示全部楼层 |阅读模式
老毒了,同学U盘上检

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
无尽藏海
发表于 2008-6-24 12:14:46 | 显示全部楼层
许久不见王版……

Begin scan in 'E:\VIRUS\2(3).zip'
E:\VIRUS\2(3).zip
  [0] Archive type: ZIP
  --> 2.com
      [DETECTION] Contains detection pattern of the worm WORM/Autorun.eal
  --> 1.com
      [DETECTION] Contains detection pattern of the worm WORM/Autorun.eam.1
      [WARNING]   The file was ignored!
woai_jolin
发表于 2008-6-24 12:38:18 | 显示全部楼层
Hello,

Thanks for taking the time to submit your samples to the Norman
Sandbox Information Center.  Customer delight is our top priority at
Norman.  With that in mind we have developed Sandbox Solutions for
organizations that are committed to speedy analysis and debugging.

Norman Sandbox Solutions give your organization the opportunity to
analyze files immediately in your own environment.

To find out how to bring the power of Norman Sandbox into your test
environments follow the links below.

Norman Sandbox Solutions
http://www.norman.com/Product/Sandbox-products/

Norman Sandbox Analyzer
http://www.norman.com/Product/Sandbox-products/Analyzer/

Norman Sandbox Analyzer Pro
http://www.norman.com/Product/Sandbox-products/Analyzer-pro/

Norman SandBox Reporter
http://www.norman.com/Product/Sandbox-products/Reporter/

2.com : Not detected by Sandbox (Signature: NO_VIRUS)


[ DetectionInfo ]
    * Sandbox name: NO_MALWARE
    * Signature name: NO_VIRUS
    * Compressed: NO
    * TLS hooks: YES
    * Executable type: Application
    * Executable file structure: OK

[ General information ]
    * **Locates window "Information [class TMessageForm]" on desktop.
    * **Locates window "Error [class TMessageForm]" on desktop.
    * File length:       613888 bytes.
    * MD5 hash: c96353344444cb3477c74ca76482244b.

[ Changes to registry ]
    * Accesses Registry key "HKCU\Software\Borland\Locales".
    * Accesses Registry key "HKLM\Software\Borland\Locales".
    * Accesses Registry key "HKCU\Software\Borland\Delphi\Locales".

[ Process/window information ]
    * Creates an event called .



(C) 2004-2006 Norman ASA. All Rights Reserved.

The material presented is distributed by Norman ASA as an information source only.

This file is not flagged as malicious by the Norman Sandbox Information Center. However, we can not guarantee that the file is harmless. If you still suspect the file to be malicious and if you urgently need to know for sure, please submit it to your local Norman support department for manual analysis.


************************************
Sent from an unmonitored email address.
Please DO NOT reply.
************************************
woai_jolin
发表于 2008-6-24 12:40:02 | 显示全部楼层
AhnLab-V32008.6.24.02008.06.23-
AntiVir7.8.0.592008.06.23Worm/Autorun.eal
Authentium5.1.0.42008.06.24W32/Infostealer.A!Maximus
Avast4.8.1195.02008.06.23-
AVG7.5.0.5162008.06.24-
BitDefender7.22008.06.24-
CAT-QuickHeal9.502008.06.23-
ClamAV0.93.12008.06.24-
DrWeb4.44.0.091702008.06.23-
eSafe7.0.15.02008.06.23-
eTrust-Vet31.6.58972008.06.23-
Ewido4.02008.06.23-
F-Prot4.4.4.562008.06.23W32/Infostealer.A!Maximus
F-Secure7.60.13501.02008.06.20Worm.Win32.AutoRun.eal
Fortinet3.14.0.02008.06.23W32/AutoRun.EAL!worm
GData2.0.7306.10232008.06.24Worm.Win32.AutoRun.eal
IkarusT3.1.1.26.02008.06.24Virus.Worm.Win32.AutoRun.eal
Kaspersky7.0.0.1252008.06.24Worm.Win32.AutoRun.eal
McAfee53232008.06.23-
Microsoft1.36042008.06.24-
NOD32v232112008.06.24Win32/Delf.NFD
Norman5.80.022008.06.23-
Panda9.0.0.42008.06.23Suspicious file
Prevx1V22008.06.24-
Rising20.50.02.002008.06.23-
Sophos4.30.02008.06.24Mal/Behav-053
Sunbelt3.0.1153.12008.06.15-
Symantec102008.06.24-
TheHacker6.2.92.3592008.06.24W32/AutoRun.eal
TrendMicro8.700.0.10042008.06.23-
VBA323.12.6.82008.06.23Worm.Win32.AutoRun.eal
VirusBuster4.5.11.02008.06.23-
Webwasher-Gateway6.6.22008.06.24Worm.Autorun.eal
woai_jolin
发表于 2008-6-24 12:41:52 | 显示全部楼层
Hello,

Thanks for taking the time to submit your samples to the Norman
Sandbox Information Center.  Customer delight is our top priority at
Norman.  With that in mind we have developed Sandbox Solutions for
organizations that are committed to speedy analysis and debugging.

Norman Sandbox Solutions give your organization the opportunity to
analyze files immediately in your own environment.

To find out how to bring the power of Norman Sandbox into your test
environments follow the links below.

Norman Sandbox Solutions
http://www.norman.com/Product/Sandbox-products/

Norman Sandbox Analyzer
http://www.norman.com/Product/Sandbox-products/Analyzer/

Norman Sandbox Analyzer Pro
http://www.norman.com/Product/Sandbox-products/Analyzer-pro/

Norman SandBox Reporter
http://www.norman.com/Product/Sandbox-products/Reporter/

1.com : Not detected by Sandbox (Signature: W32/AutoRun.DZW)


[ DetectionInfo ]
    * Sandbox name: NO_MALWARE
    * Signature name: W32/AutoRun.DZW
    * Compressed: NO
    * TLS hooks: YES
    * Executable type: Application
    * Executable file structure: OK

[ General information ]
    * **Locates window " [class CabinetWClass]" on desktop.
    * File length:       407040 bytes.
    * MD5 hash: 1d1fd7bc74724e5f77659d4d0be56269.

[ Changes to filesystem ]
    * Creates file C:\DOCUME~1\SANDBOX\blabla.dat.

[ Changes to registry ]
    * Accesses Registry key "HKCU\Software\Borland\Locales".
    * Accesses Registry key "HKLM\Software\Borland\Locales".
    * Accesses Registry key "HKCU\Software\Borland\Delphi\Locales".
    * Creates key "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System".
    * Sets value "DisableRegistryTools"="" in key "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System".
    * Creates key "HKCU\Software\Policies\Microsoft\Windows\System".
    * Sets value "DisableCMD"="" in key "HKCU\Software\Policies\Microsoft\Windows\System".

[ Network services ]
    * Opens URL: http://www.wo709394.cn/game.php.
    * Connects to "www.wo709394.cn" on port 80 (TCP).
    * Opens URL: www.wo709394.cn/game.php.

[ Process/window information ]
    * Creates an event called .
    * Creates a mutex Recy.
    * Attemps to open LOG.BAT CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2 /registry /deny everyone /full.
    * Creates process "CMD.EXE".
    * Attemps to open Explorer.exe c:\.
    * Creates process "Explorer.exe".
    * Attemps to open iexplore.exe http://www.wo709394.cn/game.php.
    * Creates process "iexplore.exe".
    * Creates process "net.EXE".
    * Attempts to access service "Driver_Service".



(C) 2004-2006 Norman ASA. All Rights Reserved.

The material presented is distributed by Norman ASA as an information source only.


************************************
Sent from an unmonitored email address.
Please DO NOT reply.
************************************
woai_jolin
发表于 2008-6-24 12:42:40 | 显示全部楼层
AhnLab-V32008.6.24.02008.06.23Win-Trojan/Xema.variant
AntiVir7.8.0.592008.06.23Worm/Autorun.eam.1
Authentium5.1.0.42008.06.24-
Avast4.8.1195.02008.06.23Win32:Trojan-gen {Other}
AVG7.5.0.5162008.06.24Worm/Generic.ICA
BitDefender7.22008.06.24-
CAT-QuickHeal9.502008.06.23-
ClamAV0.93.12008.06.24-
DrWeb4.44.0.091702008.06.23-
eSafe7.0.15.02008.06.23-
eTrust-Vet31.6.58972008.06.23-
Ewido4.02008.06.23-
F-Prot4.4.4.562008.06.23-
F-Secure7.60.13501.02008.06.20Worm.Win32.AutoRun.eam
Fortinet3.14.0.02008.06.23W32/AutoRun.EAM!worm
GData2.0.7306.10232008.06.24Worm.Win32.AutoRun.eam
IkarusT3.1.1.26.02008.06.24Worm.Autorun.eam.1
Kaspersky7.0.0.1252008.06.24Worm.Win32.AutoRun.eam
McAfee53232008.06.23-
Microsoft1.36042008.06.24-
NOD32v232112008.06.24Win32/Delf.NFE
Norman5.80.022008.06.23W32/AutoRun.DZW
Panda9.0.0.42008.06.23Suspicious file
Prevx1V22008.06.24-
Rising20.50.02.002008.06.23Trojan.Win32.Delf.fbw
Sophos4.30.02008.06.24Mal/Generic-A
Sunbelt3.0.1153.12008.06.15-
Symantec102008.06.24-
TheHacker6.2.92.3592008.06.24W32/AutoRun.eam
TrendMicro8.700.0.10042008.06.23-
VBA323.12.6.82008.06.23Worm.Win32.AutoRun.eam
VirusBuster4.5.11.02008.06.23-
Webwasher-Gateway6.6.22008.06.24Worm.Autorun.eam.1
ssy275
发表于 2008-6-24 15:41:16 | 显示全部楼层

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
qigang
发表于 2008-6-24 21:21:07 | 显示全部楼层

3/1

瑞星病毒查杀结果报告

清除病毒种类列表:

病毒: Trojan.Win32.Delf.fbw   

MAC 地址:00:11:5B:F3:6D:69

用户来源:互联网

软件版本:20.50.10
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-5-2 06:19 , Processed in 0.135597 second(s), 18 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表