楼主: avast!
收起左侧

[已鉴定] 跑了好久的ESS终于挂掉

 关闭 [复制链接]
sxbxyh
发表于 2008-10-13 16:13:22 | 显示全部楼层
扫描未见异常
tanlimo
发表于 2008-10-13 16:17:31 | 显示全部楼层
利用QuickTime的漏洞?
avast!
 楼主| 发表于 2008-10-13 16:42:17 | 显示全部楼层
原帖由 tanlimo 于 2008-10-13 16:17 发表
利用QuickTime的漏洞?


中招现象开始是提示有quicktime可关联的文件,询问是否使用quicktime关联。。

是不是就是用quicktime漏洞,我是菜鸟不敢说,我把quicktime删掉了,

为了iPod装了iTunes就会夹带装上quicktime,可恶的apple~

[ 本帖最后由 avast! 于 2008-10-13 16:43 编辑 ]
tanlimo
发表于 2008-10-13 16:44:03 | 显示全部楼层
上去转了下,没有出现异常,可能是我的系统没这漏洞吧.......

1.PNG

2.PNG

3.PNG
tanlimo
发表于 2008-10-13 16:49:30 | 显示全部楼层

  1. <HTML><HEAD>

  2. <META http-equiv=Content-Type content="text/html; charset=shift_jis">

  3. <META http-equiv=Content-Language content=ja>

  4. <meta http-equiv="adimage" content="201">

  5. <meta http-equiv="adcolor" content="0">

  6. <meta http-equiv="adalign" content="right">

  7. <script language="javascript">

  8. with(document)

  9. {

  10. open("text");



  11. var now = new Date();

  12. var hour = now.getHours();



  13. if (hour == 0)

  14. {

  15. writeln("<meta http-equiv="Page-Exit" content="revealTrans(Duration=3.0,Transition=12)">");

  16. writeln("<TITLE>地獄通信</TITLE></HEAD>");

  17. writeln("<BODY bgColor=#000000 oncontextmenu="return false" ondragstart="return false" onselectstart="return false">");

  18. writeln("<EMBED SRC="http://blog9.fc2.com/w/waine/file/jigoku.mp3", WIDTH="0", HEIGHT="0" CONTROLS="FALSE" PLAY_LOOP="FALSE" HIDDEN="true">");

  19. writeln("<P align=center> </P>");

  20. writeln("<P align=center> </P>");

  21. writeln("<FORM method=GET name=frm action="http://waine.blog9.fc2.com/file/jigokushoujol.htm" onSubmit="return (document.frm.kill.value!='')">");

  22. writeln("<P align=center><FONT color=#ffffff>あ な た の 怨 み 、 晴 ら し ま す 。</FONT></P>");

  23. writeln("<P align=center><INPUT size=30 name=kill></P>");

  24. writeln("<P align=center><INPUT type=submit value=' 送信 ' name=submit></P>");

  25. writeln("<P align=center> </P>");

  26. writeln("</FORM></BODY></HTML>");

  27. }

  28. else

  29. {

  30. writeln("<TITLE>404 Not Found</TITLE>");

  31. writeln("</HEAD>");

  32. writeln("<BODY>");

  33. writeln("<H1>Not Found</H1>");

  34. writeln("The requested URL /kk was not found on this server.");

  35. writeln("<P>");

  36. writeln("<HR>");

  37. writeln("<ADDRESS>");

  38. writeln("hellish world/1.3.33 Server at jigokutsushin.net Port 80");

  39. writeln("</ADDRESS>");

  40. writeln("</BODY>");

  41. writeln("</HTML>");

  42. }



  43. close();

  44. }



复制代码



  1. <HTML><HEAD><META http-equiv=Content-Type content="text/html; charset=shift-
  2. jis"><META HTTP-EQUIV=Refresh CONTENT="15; URL=http://www.jigokushoujo.com/">:
  3. <META http-equiv=Content-Language content=ja><meta http-equiv="adimage"
  4. content="201"> <meta http-equiv="adcolor" content="0"><meta http-equiv="adalign"
  5. content="right"><TITLE>地獄通信</TITLE></HEAD><BODY style="background:url
  6. (http://blog9.fc2.com/w/waine/file/jigoku_back.jpg) #010B03 no-repeat right
  7. bottom;" bgColor="#010B03"oncontextmenu="return false" ondragstart="return false"
  8. onselectstart="return false" leftmargin="200"><DIV align="right"
  9. style="position:absolute;left:-1000px;visibility:hidden;"><EMBED
  10. SRC="http://blog9.fc2.com/w/waine/file/ai_voice.mp3", WIDTH="0", HEIGHT="0"
  11. CONTROLS="FALSE" PLAY_LOOP="FALSE" HIDDEN="true"><script language="JavaScript"
  12. src="http://analyzer2.fc2.com/analyzer.js?
  13. uid=476828"></script></DIV><br><br><br><br><br><font color="#662222"
  14. size="5"><strong><b>受け取リました。<br><br>地獄少女
  15. <b></strong></font></BODY></HTML>
复制代码

[ 本帖最后由 tanlimo 于 2008-10-13 16:56 编辑 ]
xiaotuzi
头像被屏蔽
发表于 2008-10-13 18:06:33 | 显示全部楼层
小红伞完美查杀!
leonfg
发表于 2008-10-13 18:16:31 | 显示全部楼层
Dear Sir or Madam,

Thank you for your email to Avira's virus lab.
Tracking number: INC00213943.


We received the following archive files:

File ID FilenameSize (Byte)Result
25158634 ESET Smart Security.rar671.38 KBOK

A listing of files contained inside archives alongside their results can be found below:
File ID FilenameSize (Byte)Result
25158426 egui..exe 1.38 MB CLEAN


Please find a detailed report concerning each individual sample below:
FilenameResult egui..exe CLEAN

The file 'egui..exe' has been determined to be 'CLEAN'. Our analysts did not discovered any malicious content.

另一个Pending中

[ 本帖最后由 leonfg 于 2008-10-13 18:20 编辑 ]
Palkia
发表于 2008-10-13 18:38:23 | 显示全部楼层
金山 0
BING126
头像被屏蔽
发表于 2008-10-13 20:25:10 | 显示全部楼层
McAfee  miss
The EQs
发表于 2008-10-13 23:31:02 | 显示全部楼层
Dear Don Johnson,

Thank you for your submission.
The detection for this threat will be included in our next signature update.

Regards,

Virus Researcher
ESET spol. s r.o.

[ 本帖最后由 EQ2 于 2008-10-13 23:41 编辑 ]
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-11-15 13:36 , Processed in 0.090958 second(s), 16 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表