查看: 3241|回复: 10
收起左侧

[病毒样本] zlob

[复制链接]
qianwenxiang
发表于 2008-10-13 19:46:08 | 显示全部楼层 |阅读模式

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
Kitman
发表于 2008-10-13 19:46:26 | 显示全部楼层
Requested URL:        http://bbs.kafan.cn/attachment.p ... 50&t=1223898378
Information:        Is the TR/Dldr.FraudLoad.vcnv Trojan
Generated by AntiVir WebGuard 8.0.15.0, AVE 8.1.1.35, VDF 7.0.7.31
Palkia
发表于 2008-10-13 19:52:58 | 显示全部楼层
金山 0
BING126
头像被屏蔽
发表于 2008-10-13 19:55:27 | 显示全部楼层
McAfee  miss
电影结束了
发表于 2008-10-13 20:22:57 | 显示全部楼层
"Infections"
"File";"Infection";"Result"
"F:\zcodec.1115.rar";"Trojan horse Downloader.Zlob.AEFA";"Infected"
"F:\zcodec.1115.rar:\zcodec.1115.exe";"Trojan horse Downloader.Zlob.AEFA";"Infected"
c5132902
发表于 2008-10-13 20:26:39 | 显示全部楼层

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
尤金卡巴斯基
发表于 2008-10-13 20:41:36 | 显示全部楼层
2008/10/13 20:40:18        已清除        木马程序 Trojan-Downloader.Win32.FraudLoad.vcnv        G:\Temp\Virus\zcodec.1115.rar/zcodec.1115.exe
will
发表于 2008-10-13 21:11:21 | 显示全部楼层

Multi Command-Line Scanner Report
-------------------------------------------------------------------------   
D:\Desk\Samples\Collect\MCLS\zcodec.1115.exe   
MD5 Hash: 63D204B016098DF1C49C4CC0EB41DC3F   
Type: Win32 Executable Generic / Extension: .EXE   

A-squared ----- Trojan-Downloader.Win32.Renos.AY!IK   
Avast ----- Win32:Zlob-CPB [Trj]   
Antivir ----- TR/Dldr.FraudLoad.vcnv   
BitDefender ----- Trojan.Renos.NEJ   
ClamWin ----- Nothing   
Dr.Web ----- Nothing   
NOD32 ----- Nothing   
Ikarus ----- Trojan-Downloader.Win32.Renos.AY   
Jiangmin ----- Nothing   
Kaspersky ----- Trojan-Downloader.Win32.FraudLoad.vcnv   
Kingsoft ----- Nothing   
Vba32 ----- Nothing   

*** 6/12 antivirus engines found virus in this file ***   
-------------------------------------------------------------------------   

Task done @ 2008/10/13 һ 21:10:59.79   
laibao
发表于 2008-10-13 21:11:31 | 显示全部楼层
File System Modifications
  • The following file was created in the system:
#Filename(s)File SizeFile MD5Alias
1[file and pathname of the sample #1] 55,296 bytes0x63D204B016098DF1C49C4CC0EB41DC3FTrojan-Downloader.Win32.FraudLoad.vcnv [Kaspersky Lab]
Trojan.Zlob [Symantec]
Possible_DLDER [Trend Micro]
TrojanDownloader:Win32/Renos.EI [Microsoft]


Memory Modifications
  • There was a new process created in the system:
Process NameProcess FilenameMain Module Size
[filename of the sample #1][file and pathname of the sample #1]65,536 bytes


Other details
  • The data identified by the following URLs was then requested from the remote web server:
    • http://domain5122.com/script1112.php?id=1350591802&adv=0&uid=cd1a4040eb4b8de2ac67e8681264f2c4b9cec0
    • http://domain5122.com/file1112.php?id=1350591802&adv=0&uid=cd1a4040eb4b8de2ac67e8681264f2c4b9cec0

Downloaded File Summary:
  • Download details:
    • Download retrieved: 13 October 2008 23:38:19
    • Processing time: 7 min 55 sec
    • Downloaded sample #1:
      • File MD5: 0x39983CA8BA63BFC43A5C085896530D4E
      • Filesize: 78,340 bytes
    • Downloaded sample #2:
      • File MD5: 0x173C8FD8385A5ED0BAAFDDF05AA0DCC4
      • Filesize: 57,344 bytes
      • Alias: Packed.Generic.182 [Symantec]
    • Downloaded sample #3:
      • File MD5: 0x5F796D97149716B604C8EC7B37E4764E
      • Filesize: 181,779 bytes
  • Summary of the findings:
What's been foundSeverity Level
Downloads/requests other files from Internet.
Creates a startup registry entry.
Registers a 32-bit in-process server DLL.
Registers a Browser Helper Object (Microsoft's Internet Explorer plugin module).
Contains characteristics of an identified security risk.


Technical Details:
Possible Security Risk
  • Attention! Characteristics of the following security risk was identified in the system:
Security RiskDescription
Trojan.FakeAlertTrojan.FakeAlert will hijack the desktop background with an image alerting the user that their computer system has been infected with spyware. It also changes some settings of windows which include:- disabling permissions for the user to change the background image and setting the active desktop to 'show web content'. It is usually installed in conjunction with a rogue anti-spyware application.


File System Modifications
  • The following files were created in the system:
#Filename(s)File SizeFile MD5Alias
1%Temp%\nsf2.tmp\NSISdl.dll 14,848 bytes0x2A2AF69379ED269C61893E8146E18F52(not available)
2%Temp%\nsf2.tmp\System.dll 10,240 bytes0x82F7926FD7D12E3EB8ED7B5232BCF956(not available)
3%System%\azhuaikvguinvuk.dll 156,672 bytes0xE993D6CB7705A609AD8B5B3B61437C2FAdware:Win32/AdRotator [Microsoft]
4%System%\rryjzzwhinv.exe 79,086 bytes0xFCF0FE71152CD058C94C7AA974C85604(not available)
5[file and pathname of the sample #1] 78,340 bytes0x39983CA8BA63BFC43A5C085896530D4E(not available)
6[file and pathname of the sample #2] 57,344 bytes0x173C8FD8385A5ED0BAAFDDF05AA0DCC4Packed.Generic.182 [Symantec]
7[file and pathname of the sample #3] 181,779 bytes0x5F796D97149716B604C8EC7B37E4764E(not available)

  • Notes:
    • %Temp% is a variable that refers to the temporary folder in the short path form. By default, this is C:\Documents and Settings\[UserName]\Local Settings\Temp\ (Windows NT/2000/XP).
    • %System% is a variable that refers to the System folder. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).
  • The following directory was created:
    • %Temp%\nsf2.tmp

Memory Modifications
  • There were new processes created in the system:
Process NameProcess FilenameMain Module Size
[filename of the sample #1][file and pathname of the sample #1]200,704 bytes
rryjzzwhinv.exe%System%\rryjzzwhinv.exe249,856 bytes
[filename of the sample #3][file and pathname of the sample #3]249,856 bytes
Au_.exe%Temp%\~nsu.tmp\Au_.exe249,856 bytes
[filename of the sample #2][file and pathname of the sample #2]57,344 bytes

  • The following modules were loaded into the address space of other process(es):
Module NameModule FilenameAddress Space Details
azhuaikvguinvuk.dll%System%\azhuaikvguinvuk.dllProcess name: [generic host process]
Process filename: [generic host process filename]
Address space: 0xAA0000 - 0xACC000
azhuaikvguinvuk.dll%System%\azhuaikvguinvuk.dllProcess name: IEXPLORE.EXE
Process filename: %ProgramFiles%\internet explorer\iexplore.exe
Address space: 0xF80000 - 0xFAC000

  • Notes:
    • [generic host process filename] is a full path filename of [generic host process].
    • %ProgramFiles% is a variable that refers to the Program Files folder. A typical path is C:\Program Files.

Registry Modifications
  • The following Registry Keys were created:
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8ffe07db-aa85-370c-b84a-20958d3de81e}
    • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8ffe07db-aa85-370c-b84a-20958d3de81e}\InProcServer32
    • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects
    • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8ffe07db-aa85-370c-b84a-20958d3de81e}
    • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\rryjzzwhinv
    • HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla
    • HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\MSFox
    • HKEY_CURRENT_USER\Software\{8446438A-39C2-4406-3859-B1FA3B4F7CC4}
  • The newly created Registry Values are:
    • [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8ffe07db-aa85-370c-b84a-20958d3de81e}\InProcServer32]
      • (Default) = "%System%\azhuaikvguinvuk.dll"
      • ThreadingModel = "Apartment"
    • [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8ffe07db-aa85-370c-b84a-20958d3de81e}]
      • (Default) = "offersfortoday browser enhancer"
    • [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8ffe07db-aa85-370c-b84a-20958d3de81e}]
      • NoExplorer = """"
    • [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
      • kwwcmxtssmt = "%System%\regsvr32.exe /s "%System%\azhuaikvguinvuk.dll""

      so that azhuaikvguinvuk.dll runs every time Windows starts
    • [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\rryjzzwhinv]
      • DisplayName = "RON Tool Offersfortoday"
      • UninstallString = "%System%\rryjzzwhinv.exe"
      • NoModify = 0x00000000
      • NoRepair = 0x00000000
      • DisplayVersion = "2.2.0.0"
    • [HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\MSFox]
      • Str4 = ""
      • Str5 = "x6tVEq8nGbTmPkNQIrNNQAuuDXWX"
      • Str9 = "zbZdFr5/CbjyPkNQIrNNQAuuDXWXEvOyhwYIMvYIWoHwgiUTaU8JbxpO"
      • Str6 = "gKFdEw=="
      • Str7 = "ga9ZFK1vCPLtfEhWbqZFVA=="
      • Str8 = "mQ=="
    • [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
      • MSFox = "[file and pathname of the sample #1]"

      so that [file and pathname of the sample #1] runs every time Windows starts
    • [HKEY_CURRENT_USER\Software\{8446438A-39C2-4406-3859-B1FA3B4F7CC4}]
      • aff_id = "offersfortoday"

Other details
  • To mark the presence in the system, the following Mutex objects were created:
    • Pf8tEzRXY0MhbrHxmUXF
    • jv2GUjP707bgyKtTPna2
  • The following ports were open in the system:
PortProtocolProcess
1082TCP[file and pathname of the sample #1]
1083TCP[file and pathname of the sample #1]

  • The following Host Names were requested from a host database:
    • s2.offersfortoday.com
    • pictures-library.com
    • images-library.com
    • picturesbase.com
    • pictures-base.com
  • The following Internet Connections were established:
Server NameServer PortConnect as UserConnection Password
s2.offersfortoday.com80(null)(null)
image-big-library.com80(null)(null)
99.250.166.19680(null)(null)
210.156.220.580(null)(null)

  • The following HTTP URL was started reading:
    • http://s2.offersfortoday.com/bc/nsi_install.php?aff_id=offersfortoday&inst_result=success&id=6d6e4b63202c4d80e79d8d0cb242523daf9b1101
  • The data identified by the following URLs was then requested from the remote web server:
    • http://bigimagecatalogue.com/en/us/shared/templates/components/cspMscomMasterNavigation/search_box.gif
    • http://255.219.92.31/en/us/shared/templates/components/cspMscomMasterNavigation/search_box.gif
    • http://38.45.54.159/en/us/shared/templates/components/cspMscomMasterNavigation/icon_search.gif
    • http://bigimagecatalogue.com/icons/xsawbguubgz.gif
    • http://38.45.54.159/en/us/shared/templates/components/cspMscomMasterNavigation/search_box.gif
    • http://bigimagecatalogue.com/en/us/shared/templates/components/cspMscomMasterNavigation/icon_search.gif
    • http://255.219.92.31/en/us/shared/templates/components/cspMscomMasterNavigation/icon_search.gif

Downloaded Files Summary (Generation #2):
  • Download details:
    • Download retrieved: 13 October 2008 23:57:36
    • Processing time: 3 min 49 sec
    • Downloaded sample:
      • File MD5: 0xBF3706540DCF09C88551BEE54B7CC1D4
      • Filesize: 88,064 bytes

Technical Details:
File System Modifications
  • The following file was created in the system:
#Filename(s)File SizeFile MD5
1%Temp%\1.tmp 0 bytes0xD41D8CD98F00B204E9800998ECF8427E

  • Note:
    • %Temp% is a variable that refers to the temporary folder in the short path form. By default, this is C:\Documents and Settings\[UserName]\Local Settings\Temp\ (Windows NT/2000/XP).
kingmuro
头像被屏蔽
发表于 2008-10-14 11:26:18 | 显示全部楼层
诺顿杀

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-5-4 02:37 , Processed in 0.150281 second(s), 22 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表