查看: 4646|回复: 17
收起左侧

[已解决] 有没有能穿越虚拟机的病毒?

 关闭 [复制链接]
ussa98077
发表于 2009-1-19 13:43:47 | 显示全部楼层 |阅读模式
本帖最后由 107 于 2010-12-23 17:59 编辑

如题。
醉一生爱妍
发表于 2009-1-19 13:45:16 | 显示全部楼层

回复 1楼 ussa98077 的帖子

听闻过外国某一大牛研制出了穿vmware的病毒

不过 目前尚未有 也没碰过

虽然是硬绑定。。。
ssyknuwyg
发表于 2009-1-19 13:54:07 | 显示全部楼层
有,你碰部上,别担心那没用的
xtea
发表于 2009-1-19 15:22:57 | 显示全部楼层
肯定有,一物降一物嘛
1e3e
头像被屏蔽
发表于 2009-1-19 19:39:27 | 显示全部楼层
我也想知道
deyu260
头像被屏蔽
发表于 2009-1-19 20:31:56 | 显示全部楼层
比中linux的病毒几率还低
ijackie
头像被屏蔽
发表于 2009-1-19 20:32:52 | 显示全部楼层
没这么快吧
urge
发表于 2009-1-19 20:52:10 | 显示全部楼层
这可能是你要的

help.zip

20.44 KB, 下载次数: 48

sygougou
发表于 2009-1-20 08:40:43 | 显示全部楼层
还没用过COMODO的CIMA,用这个来试试

• File Info
NameValue
Size22980
MD587d821d0b0b0fcfede0519c75ef8292f
SHA19a536224897d10c99250308e1136a85345af1a6f
SHA256423ca5b173295b0a8a7db3a3500979cc22f80e0d74ec8b07af861171143b2346
ProcessExited

• Keys Created
NameLast Write Time
LM\Software\Classes\ClsId\{014A26F5-FBAD-4549-9CA1-C38210704BD1}2009.01.12 14:48:00.562
LM\Software\Classes\ClsId\{014A26F5-FBAD-4549-9CA1-C38210704BD1}\InProcServer322009.01.12 14:48:00.562

• Keys Changed• Keys Deleted• Values Created
NameTypeSizeValue
LM\Software\Classes\ClsId\{014A26F5-FBAD-4549-9CA1-C38210704BD1}\REG_SZ2""
LM\Software\Classes\ClsId\{014A26F5-FBAD-4549-9CA1-C38210704BD1}\InProcServer32\REG_SZ134"C:\Program Files\Common Files\Microsoft Shared\MSINFO\System16.ins"
LM\Software\Classes\ClsId\{014A26F5-FBAD-4549-9CA1-C38210704BD1}\InProcServer32\ThreadingModelREG_SZ20"Apartment"
LM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{014A26F5-FBAD-4549-9CA1-C38210704BD1}REG_SZ2""

• Values Changed
NameTypeSizeValue
CU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettingsREG_BINARY/REG_BINARY52/56?/?

• Values Deleted• Directories Created• Directories Changed• Directories Deleted• Files Created
NameSizeLast Write TimeCreation TimeLast Access TimeAttr
C:\Program Files\Common Files\Microsoft Shared\MSInfo\System16.ins275882009.01.12 14:47:59.1092009.01.12 14:47:59.1092009.01.12 14:47:59.1090x26
C:\Program Files\Common Files\Microsoft Shared\MSInfo\System16.jup229802009.01.12 14:47:58.3592009.01.12 14:47:58.9212009.01.12 14:47:58.9210x6

• Files Changed
NameSizeLast Write TimeCreation TimeLast Access TimeAttr
C:\Documents and Settings\User\NTUSER.DAT524288/7864322009.01.12 13:45:13.906/2009.01.12 14:48:02.2502008.08.01 05:31:04.546/2008.08.01 05:31:04.5462009.01.12 13:45:13.906/2009.01.12 13:45:13.9060x22/0x22

• Files Deleted• Directories Hidden• Files Hidden• Drivers Loaded• Drivers Unloaded• Processes Created• Processes Terminated• Threads Created
PIdProcess NameTIdStartStart MemWin32 StartWin32 Start Mem
0x344svchost.exe0x1700x7c810856MEM_IMAGE0x7c910760MEM_IMAGE
0x43csvchost.exe0x7b80x7c810856MEM_IMAGE0x77df9981MEM_IMAGE
0x73cexplorer.exe0x7d80x7c810856MEM_IMAGE0xd35620MEM_IMAGE

• Modules Loaded
PIdProcess NameBaseSizeFlagsImage Name
0x73cexplorer.exe0xd300000xc0000x80284004C:\Program Files\Common Files\Microsoft Shared\MSINFO\System16.ins
0x73cexplorer.exe0x662b00000x580000x800c4004C:\WINDOWS\system32\hnetcfg.dll
0x73cexplorer.exe0x71a500000x3f0000x80084004C:\WINDOWS\System32\mswsock.dll
0x73cexplorer.exe0x71a900000x80000x800c4004C:\WINDOWS\System32\wshtcpip.dll
0x73cexplorer.exe0x722b00000x50000x800c4004C:\WINDOWS\system32\sensapi.dll
0x73cexplorer.exe0x76e900000x120000x800c4006C:\WINDOWS\system32\rasman.dll
0x73cexplorer.exe0x76eb00000x2f0000x80084006C:\WINDOWS\system32\TAPI32.dll
0x73cexplorer.exe0x76ee00000x3c0000x800c4004C:\WINDOWS\system32\RASAPI32.DLL
0x73cexplorer.exe0x76f200000x270000x800c4004C:\WINDOWS\system32\DNSAPI.dll
0x73cexplorer.exe0x76fc00000x60000x800c4004C:\WINDOWS\system32\rasadhlp.dll

• Windows Api Calls
PIdImage NameAddressFunction ( Parameters ) | Return Value
0x370C:\TEST\sample.exe0x404b98CopyFileA(lpExistingFileName: "C:\TEST\sample.exe", lpNewFileName: "C:\Program Files\Common Files\Microsoft Shared\MSINFO\System16.jup", bFailIfExists: 0x0)|0x1

• DNS Queries
DNS Query Text
yy90.net IN A +
www.126.com IN A +

• HTTP Queries
HTTP Query Text
yy90.net GET /down/gg.exe HTTP/1.1
yy90.net GET /down/ms.exe HTTP/1.1
yy90.net GET /down/wl.exe HTTP/1.1
yy90.net GET /down/zz.exe HTTP/1.1
yy90.net GET /down/mh.exe HTTP/1.1
yy90.net GET /down/gm.exe HTTP/1.1
yy90.net GET /down/ii.exe HTTP/1.1
yy90.net GET /down/qq.exe HTTP/1.1
yy90.net GET /down/rx.exe HTTP/1.1
yy90.net GET /down/sj.exe HTTP/1.1
yy90.net GET /down/wd.exe HTTP/1.1
yy90.net GET /down/tl.exe HTTP/1.1
yy90.net GET /down/fy.exe HTTP/1.1
yy90.net GET /down/zx.exe HTTP/1.1
yy90.net GET /down/hx.exe HTTP/1.1
www.126.com GET / HTTP/1.1

• Verdict
Auto Analysis Verdict
Rated as Suspicious

• Description
Suspicious Actions Detected
Copies self to other locations
Creates files in program files directory
Injects code into other processes
Registers dynamic link libraries

• Events Created or Opened
PIdImage NameAddressEvent Name
0x370C:\TEST\sample.exe0x77a89422Global\crypt32LogoffEvent
eubyo
发表于 2009-1-20 09:19:31 | 显示全部楼层
没有,虚拟机是模拟的
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-1-24 08:49 , Processed in 0.135007 second(s), 19 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表