查看: 3500|回复: 18
收起左侧

[病毒样本] RootKit×1 过了好多 但瑞星居然报了

[复制链接]
gomu887
发表于 2009-1-2 11:55:21 | 显示全部楼层 |阅读模式
瑞星居然报了

我宁愿它是误报



文件 Beep.SYS 接收于 2009.01.02 04:52:12 (CET)

反病毒引擎版本最后更新扫描结果
a-squared4.0.0.732008.12.31-
AhnLab-V32008.12.31.02009.01.02-
AntiVir7.9.0.452009.01.01-
Authentium5.1.0.42009.01.01-
Avast4.8.1281.02009.01.01-
AVG8.0.0.1992008.12.31-
BitDefender7.22009.01.02-
CAT-QuickHeal10.002009.01.02-
ClamAV0.94.12009.01.02-
Comodo8512008.12.31-
DrWeb4.44.0.091702009.01.02-
eTrust-Vet31.6.62872009.01.01-
Ewido4.02008.12.31-
F-Prot4.4.4.562008.12.30-
F-Secure8.0.14470.02009.01.02-
Fortinet3.117.0.02009.01.02suspicious
GData192008.12.31-
IkarusT3.1.1.45.02009.01.02-
K7AntiVirus7.10.5722008.12.31-
Kaspersky7.0.0.1252009.01.02-
McAfee54812009.01.02-
McAfee+Artemis54792008.12.30-
Microsoft1.42052009.01.01TrojanDownloader:Win32/Perkesh.gen!A
NOD3237252008.12.31probably a variant of Win32/TrojanDownloader.Agent.OMQ
Norman5.80.022009.01.01-
Panda9.0.0.42009.01.01-
PCTools4.4.2.02008.12.31-
Prevx1V22009.01.02-
Rising21.10.22.002008.12.31RootKit.Win32.Undef.bgl
SecureWeb-Gateway6.7.62008.12.31-
Sophos4.37.02009.01.02-
Sunbelt3.2.1809.22008.12.22-
Symantec102008.12.31-
TheHacker6.3.1.4.2042009.01.02-
TrendMicro8.700.0.10042008.12.31-
VBA323.12.8.102009.01.01-
ViRobot2008.12.30.15402008.12.31-
VirusBuster4.5.11.02009.01.01-

附加信息
File size: 12288 bytes
MD5...: 839178ee6c4038c22ad30a7a133cef8e
SHA1..: 1d6ef3b66734b1ca90c29efd25bb38007d31e382
SHA256: 384b45805d93f3e01b659dffe027f3fbfbe33fb3177116dd7c511bcb5f189c69
SHA512: 192d49126e52ded7eeed6cb24679b2b1cbb12e097026d78ebdff09d4e8d95507<BR>9c3b066fa93a963355814332a4115f628a6de59e499d6d85c43dcfb533216a49<BR>
ssdeep: 96:WCbqMJoVcnqepoNEQuOqTP9elDQhuHqa4JBuAzHLRVyMaE1Q1Ms7UO12s3HiJ<BR>YlS:EyomnKw9eVUT8uWOOL3cmeA3MkKH<BR>
PEiD..: -
TrID..: File type identification<BR>Win32 Executable Generic (68.0%)<BR>Generic Win/DOS Executable (15.9%)<BR>DOS Executable Generic (15.9%)<BR>Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
PEInfo: PE Structure information<BR><BR>( base data )<BR>entrypointaddress.: 0x15005<BR>timedatestamp.....: 0x4958ebac (Mon Dec 29 15:24:28 2008)<BR>machinetype.......: 0x14c (I386)<BR><BR>( 5 sections )<BR>name viradd virsiz rawdsiz ntrpy md5<BR>.text 0x1000 0x1c92 0x1e00 6.06 34eb5259d0c1d95175500cd9c67e74f0<BR>.rdata 0x3000 0x34d 0x400 3.32 9d74299d846ac100e5c2516ba4709101<BR>.data 0x4000 0x274 0x200 0.14 5e50a0906bf8a8f8184a59d10913e9bd<BR>INIT 0x5000 0x478 0x600 4.43 9766d7006e7038947649427314912fa4<BR>.reloc 0x6000 0x1ee 0x200 5.38 a77ed0dd676ebd47741e040060b7a4c3<BR><BR>( 2 imports ) <BR>> ntoskrnl.exe: IoFreeMdl, MmUnlockPages, IoDeleteDevice, IoDeleteSymbolicLink, RtlInitUnicodeString, _stricmp, strrchr, ExFreePoolWithTag, ExAllocatePoolWithTag, ZwQuerySystemInformation, ObfDereferenceObject, IoDriverObjectType, MmGetSystemRoutineAddress, ZwOpenProcess, ZwClose, ZwTerminateJobObject, ZwAssignProcessToJobObject, ZwCreateJobObject, IoCreateFile, KeSetEvent, ZwQueryInformationFile, KeWaitForSingleObject, KeGetCurrentThread, MmProbeAndLockPages, IoAllocateMdl, IoAllocateIrp, KeInitializeEvent, IofCompleteRequest, ObReferenceObjectByHandle, IoFileObjectType, _allmul, KeServiceDescriptorTable, ZwOpenFile, RtlAppendUnicodeToString, IoCreateSymbolicLink, IoCreateDevice, KeTickCount, KeBugCheckEx, ZwReadFile, IoFreeIrp<BR>> HAL.dll: KeStallExecutionProcessor<BR><BR>( 0 exports ) <BR>
CWSandbox info: <a href='http://research.sunbelt-software.com/partnerresource/MD5.aspx?md5=839178ee6c4038c22ad30a7a133cef8e' target='_blank'>http://research.sunbelt-software ... ad30a7a133cef8e&;lt;/a>


[ 本帖最后由 gomu887 于 2009-1-2 11:58 编辑 ]

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
hackersean
头像被屏蔽
发表于 2009-1-2 11:56:05 | 显示全部楼层
瑞星发狂了。
dreams521
发表于 2009-1-2 11:56:17 | 显示全部楼层
TO KL
hackersean
头像被屏蔽
发表于 2009-1-2 11:57:09 | 显示全部楼层
nod32不愧是靠启发式杀毒的。
Palkia
发表于 2009-1-2 11:57:29 | 显示全部楼层
金山 0
gomu887
 楼主| 发表于 2009-1-2 15:59:58 | 显示全部楼层
Thank you for your email to Avira's virus lab.
Tracking number: INC00242415.




We received the following archive files:


File ID  Filename Size (Byte) Result
25222210  Beep123.rar 5.32 KB OK

A listing of files contained inside archives alongside their results can be found below:

File ID  Filename Size (Byte) Result
25222211  Beep.SYS  12 KB  MALWARE


Please find a detailed report concerning each individual sample below:

Filename Result  Beep.SYS  MALWARE

The file 'Beep.SYS' has been determined to be 'MALWARE'. Our analysts named the threat TR/Dldr.Perkesh.12288A. The term "TR/" denotes a trojan horse that is able to spy out data, to violate your privacy or carry out unwanted modifications to the system.Detection is added to our virus definition file (VDF) starting with version 7.01.01.59.
法外制裁者
发表于 2009-1-2 16:07:33 | 显示全部楼层

费尔报

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
小邪邪
发表于 2009-1-2 16:11:43 | 显示全部楼层
咖啡8.5i+扩展库灭之

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
saga3721
发表于 2009-1-2 16:54:51 | 显示全部楼层
把这玩意儿存电脑里有什么后果吗?
hao8219
发表于 2009-1-2 16:58:31 | 显示全部楼层
Access to the data has been denied!

Warning: A virus or unwanted program has been found in the HTTP Data.

Requested URL:        http://bbs.kafan.cn/attachment.p ... 92&t=1230886693
Information:        Is the TR/Dldr.Perkesh.12288A Trojan
Generated by AntiVir WebGuard 8.0.15.0, AVE 8.2.0.45, VDF 7.1.1.61
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-12-21 13:40 , Processed in 0.081066 second(s), 2 queries , Redis On.

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表