查看: 3319|回复: 15
收起左侧

[病毒样本] 过了几个主流的~

[复制链接]
lingbo110120
发表于 2008-9-10 22:25:11 | 显示全部楼层 |阅读模式
过了几个主流的
托别人   发的贴  嘿嘿
大家研究研究  上报上报
eyesineyes
发表于 2008-9-10 22:29:32 | 显示全部楼层
报告给红伞
Palkia
发表于 2008-9-10 22:31:53 | 显示全部楼层
金山 0
xhlhsu
发表于 2008-9-10 22:33:21 | 显示全部楼层
红伞不报
黑色虾米
发表于 2008-9-10 22:44:03 | 显示全部楼层
过费尔
寒江
发表于 2008-9-10 22:47:01 | 显示全部楼层
看来对新毒还是EQ安全系数高些!!

2008-09-10 22:45:09 应用程序保护(运行应用程序)     操作:阻止
进程路径:D:\病毒样本\msts\msts.exe
文件路径:C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\2EXEOU~1.EXE

2008-09-10 22:45:09 注册表保护(创建注册表值)     操作:阻止
进程路径:D:\病毒样本\msts\msts.exe
注册表路径:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
注册表名称:wextract_cleanup0
wangjay1980
发表于 2008-9-10 22:48:44 | 显示全部楼层
直接搞定



文件 msts.exe 接收于 2008.09.10 16:44:15 (CET)
当前状态: 正在读取 ... 队列中 等待中 扫描中 完成 未发现 停止

结果: 11/36 (30.56%)

正在读取服务器信息中...
您的文件所排队列位置: ___.
预计开始时间为 ___ 和 ___
之间.
扫描完成前请勿关闭窗口.
目前针对您的文件所进行的扫描进程已停止, 我们将会在稍后恢复.
如果您的等候时间超过 5 分钟, 请重新发送文件.
您的文件目前正在被 VirusTotal 扫描中,
结果将会稍后完成时生成.

格式化文本
打印结果


您的文件已过期或不存在.
目前服务已停止, 您的文件将会稍后的未知时间内进行扫描 (位置:
). 您可以继续等待回应 (自动读取) 或者在下面的表单内输入您的电子邮件地址, 并按下 "获取", 当扫描完成时, 系统会自动给您发送电子邮件通知.  
Email:



反病毒引擎版本最后更新扫描结果
AhnLab-V32008.9.6.02008.09.10-
AntiVir7.8.1.282008.09.10-
Authentium5.1.0.42008.09.10-
Avast4.8.1195.02008.09.10-
AVG8.0.0.1612008.09.10Win32/Naked
BitDefender7.22008.09.10Trojan.Spy.Agent.NTT
CAT-QuickHeal9.502008.09.10-
ClamAV0.93.12008.09.10Trojan.Packed-75
DrWeb4.44.0.091702008.09.10-
eSafe7.0.17.02008.09.10-
eTrust-Vet31.6.60822008.09.10-
Ewido4.02008.09.10-
F-Prot4.4.4.562008.09.09W32/Heuristic-210!Eldorado
F-Secure8.0.14332.02008.09.10W32/Suspicious_N.gen
Fortinet3.112.0.02008.09.10-
GData192008.09.10Win32:Hupigon-FB
IkarusT3.1.1.34.02008.09.10-
K7AntiVirus7.10.4502008.09.10-
Kaspersky7.0.0.1252008.09.10-
McAfee53802008.09.09-
Microsoft1.39032008.09.10-
NOD32v234292008.09.09-
Norman5.80.022008.09.10W32/Suspicious_N.gen
Panda9.0.0.42008.09.09-
PCTools4.4.2.02008.09.10Packed/NakedPack
Prevx1V22008.09.10-
Rising20.61.22.002008.09.10-
Sophos4.33.02008.09.10Mal/EncPk-BO
Sunbelt3.1.1616.12008.09.09-
Symantec102008.09.10-
TheHacker6.3.0.9.0772008.09.10-
TrendMicro8.700.0.10042008.09.10-
VBA323.12.8.52008.09.10-
ViRobot2008.9.10.13712008.09.10-
VirusBuster4.5.11.02008.09.10Packed/NakedPack
Webwasher-Gateway6.6.22008.09.10Trojan.Crypt.CFI.Gen
附加信息
File size: 521216 bytes
MD5...: a95dd571ea3c3aff30245cf9cae46d50
SHA1..: 7c0bbbe82e221fe383afd30100cffdd68e960574
SHA256: 896653eb163858b82c6fb96a5f24673aa3dfed3d0d6f7b7c336cba8ada591752
SHA512: 90e378a18f0d80f9ad8d7d96c5a7ecded6583602c08faf669904b032b30d7827
8416388ca8158048234bd4f5f145886013e847ed6726fcc2e8969ec71a0b4818
PEiD..: -
TrID..: File type identification
Win64 Executable Generic (63.0%)
Win32 Executable MS Visual C++ (generic) (27.7%)
Win32 Executable Generic (6.2%)
Generic Win/DOS Executable (1.4%)
DOS Executable Generic (1.4%)
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x100645c
timedatestamp.....: 0x41107bc1 (Wed Aug 04 06:01:37 2004)
machinetype.......: 0x14c (I386)

( 3 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x992c 0x9a00 6.57 84463f4198790f16b92c2aefc0d7a62a
.data 0xb000 0x1be4 0x400 4.25 99858e86526942a66950c7139f78a725
.rsrc 0xd000 0x76000 0x75200 7.96 27ea7cfb6a92e2f011ad58167aa2ad86

( 6 imports )
> ADVAPI32.dll: FreeSid, AllocateAndInitializeSid, EqualSid, GetTokenInformation, OpenProcessToken, AdjustTokenPrivileges, LookupPrivilegeValueA, RegCloseKey, RegDeleteValueA, RegOpenKeyExA, RegSetValueExA, RegQueryValueExA, RegCreateKeyExA, RegQueryInfoKeyA
> KERNEL32.dll: LocalFree, LocalAlloc, GetLastError, GetCurrentProcess, lstrlenA, GetModuleFileNameA, GetSystemDirectoryA, _lclose, _llseek, _lopen, WritePrivateProfileStringA, GetWindowsDirectoryA, CreateDirectoryA, GetFileAttributesA, ExpandEnvironmentStringsA, lstrcpyA, GlobalFree, GlobalUnlock, GlobalLock, GlobalAlloc, IsDBCSLeadByte, GetShortPathNameA, GetPrivateProfileStringA, GetPrivateProfileIntA, lstrcmpiA, RemoveDirectoryA, FindClose, FindNextFileA, DeleteFileA, SetFileAttributesA, lstrcmpA, FindFirstFileA, FreeResource, GetProcAddress, LoadResource, SizeofResource, FindResourceA, lstrcatA, CloseHandle, WriteFile, SetFilePointer, SetFileTime, LocalFileTimeToFileTime, DosDateTimeToFileTime, SetCurrentDirectoryA, GetTempFileNameA, ExitProcess, CreateFileA, LoadLibraryExA, lstrcpynA, GetVolumeInformationA, FormatMessageA, GetCurrentDirectoryA, GetVersionExA, GetExitCodeProcess, WaitForSingleObject, CreateProcessA, GetTempPathA, GetSystemInfo, CreateMutexA, SetEvent, CreateEventA, CreateThread, ResetEvent, TerminateThread, GetDriveTypeA, GetModuleHandleA, GetStartupInfoA, GetCommandLineA, QueryPerformanceCounter, GetTickCount, GetCurrentThreadId, GetCurrentProcessId, GetSystemTimeAsFileTime, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, ReadFile, LoadLibraryA, GetDiskFreeSpaceA, MulDiv, EnumResourceLanguagesA, FreeLibrary, LockResource
> GDI32.dll: GetDeviceCaps
> USER32.dll: ExitWindowsEx, wsprintfA, CharNextA, CharUpperA, CharPrevA, SetWindowLongA, GetWindowLongA, CallWindowProcA, DispatchMessageA, MsgWaitForMultipleObjects, PeekMessageA, SendMessageA, SetWindowPos, ReleaseDC, GetDC, GetWindowRect, SendDlgItemMessageA, GetDlgItem, SetForegroundWindow, SetWindowTextA, MessageBoxA, DialogBoxIndirectParamA, ShowWindow, EnableWindow, GetDlgItemTextA, EndDialog, GetDesktopWindow, MessageBeep, SetDlgItemTextA, LoadStringA, GetSystemMetrics
> COMCTL32.dll: -
> VERSION.dll: GetFileVersionInfoA, VerQueryValueA, GetFileVersionInfoSizeA

( 0 exports )
Norman Sandbox: [ General information ]
* **IMPORTANT: PLEASE SEND THE SCANNED FILE TO: ANALYSIS@NORMAN.NO - REMEMBER TO ENCRYPT IT (E.G. ZIP WITH PASSWORD)**.
* File length: 521216 bytes.

[ Changes to filesystem ]
* Deletes directory C:\WINDOWS\TEMP\IXP0.TMP.
* Creates directory C:\WINDOWS\TEMP\IXP0.TMP.
* Creates file C:\WINDOWS\TEMP\IXP0.TMP\TMP4351$.TMP.
* Deletes file C:\WINDOWS\TEMP\IXP0.TMP\TMP4351$.TMP.
* Creates file C:\WINDOWS\TEMP\IXP0.TMP\2EXEOU~1.EXE.

[ Changes to registry ]
* Accesses Registry key \"HKLM\System\CurrentControlSet\Control\Session Manager\".
* Creates key \"HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce\".
* Sets value \"wextract_cleanup0\"=\"rundll32.exe C:\WINDOWS\SYSTEM32\advpack.dll,DelNodeRunDLL32 \"C:\WINDOWS\TEMP\IXP0.TMP\\"\" in key \"HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce\".

[ Process/window information ]
* Creates process \"2EXEOU~1.EXE\".

packers (F-Prot): CAB, Nakedpack, SVKProtector
packers (Kaspersky): NakedPack, SVKP


[ 本帖最后由 wangjay1980 于 2008-9-10 22:50 编辑 ]
vocation1985
发表于 2008-9-10 22:53:45 | 显示全部楼层
红伞没反应,但AVG报了:

[ 本帖最后由 vocation1985 于 2008-9-10 22:55 编辑 ]
king_hh
发表于 2008-9-10 22:55:05 | 显示全部楼层
微点可以成功清除~~~
htyhzd 该用户已被删除
发表于 2008-9-11 10:28:32 | 显示全部楼层
F-secure是什么引擎报的呢?
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-11-10 16:44 , Processed in 0.240184 second(s), 17 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表