查看: 3232|回复: 7
收起左侧

[病毒样本] 1x

[复制链接]
Palkia
发表于 2009-11-17 21:00:57 | 显示全部楼层 |阅读模式

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
Palkia
 楼主| 发表于 2009-11-17 21:01:37 | 显示全部楼层
The file ''wueuclt.exe has been determined to be 'MALWARE'. Our analysts named the threat TR/Agent.471040. The term "TR/" denotes a trojan horse that is able to spy out data, to violate your privacy or carry out unwanted modifications to the system.Detection will be added to our virus definition file (VDF) with one of the next updates.
BING126
头像被屏蔽
发表于 2009-11-17 21:05:59 | 显示全部楼层
McAfee miss
adad2008
头像被屏蔽
发表于 2009-11-17 21:29:19 | 显示全部楼层
kv主防报危险
尤金卡巴斯基
发表于 2009-11-17 22:04:38 | 显示全部楼层
To KL
fengtaks
发表于 2009-11-17 23:11:40 | 显示全部楼层
to Sophos & ESET
Sophos
*NOTE: Please quote [#1444323] in the subject line of any further correspondence related to this query.
fengtaks
发表于 2009-11-18 10:00:32 | 显示全部楼层
IK Trojan-Dropper.Agent (Sig-Id:34067273)

·注册表项
  Key Name
  
  Watch subtree
  
  Notify Filter
  
  Count
  
  HKLM\
SOFTWARE\
CLASSES\
CLSID

  
  1
  
  Key Change,Value Change
  
  1
  
  HKLM\
Software\
Classes

  
  1
  
  Key Change,Value Change
  
  3
  
  HKLM\
Software\
Classes\
CLSID

  
  1
  
  Key Change,Value Change
  
  2
  
  HKLM\
Software\
Microsoft\
COM3

  
  1
  
  Key Change,Value Change
  
  6
  
  HKLM\
Software\
Microsoft\
Tracing\
RASAPI32

  
  0
  
  Attributes Change,Value Change,Security  Descriptor Change
  
  3
  
  HKLM\
System\
CurrentControlSet\
Services\
WinSock2\
Parameters\
NameSpace_Catalog5

  
  0
  
  Key Change
  
  1
  
  HKLM\
System\
CurrentControlSet\
Services\
WinSock2\
Parameters\
Protocol_Catalog9

  
  0
  
  Key Change
  
  1
  
  HKU

  
  1
  
  Key Change,Value Change
  
  5
  
  HKU\
S
  
  1
  
  5
  
  21
  
 
·文件删除
C:\Documents andSettings\Administrator\Local Settings\Temporary InternetFiles\Content.IE5\WDUF49AN\RemindSet[1].xml
C:\Documents andSettings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\WDUF49AN\fankong[1].shtml
 
·文件创建
C:\Documents andSettings\Administrator\Local Settings\Temporary InternetFiles\Content.IE5\GPURSX23\pixviewer[1].swf
C:\Documents andSettings\Administrator\Local Settings\Temporary InternetFiles\Content.IE5\ODM3O1U3\fankong[1].htm
C:\Documents and Settings\Administrator\LocalSettings\Temporary Internet Files\Content.IE5\WDUF49AN\RemindSet[1].xml
C:\Documents andSettings\Administrator\Local Settings\Temporary InternetFiles\Content.IE5\WDUF49AN\fankong[1].shtml
 
·文件修改
C:\Documents andSettings\Administrator\Local Settings\Temporary InternetFiles\Content.IE5\GPURSX23\pixviewer[1].swf
C:\Documents andSettings\Administrator\Local Settings\Temporary InternetFiles\Content.IE5\ODM3O1U3\fankong[1].htm
C:\Documents andSettings\Administrator\Local Settings\Temporary InternetFiles\Content.IE5\WDUF49AN\RemindSet[1].xml
C:\Documents andSettings\Administrator\Local Settings\Temporary InternetFiles\Content.IE5\WDUF49AN\fankong[1].shtml
Ip
MountPointManager
PIPE\lsarpc
\Device\Afd\AsyncConnectHlp
\Device\Afd\Endpoint
\Device\Ip
\Device\NetBT_Tcpip_{1AD45B38-4060-4F73-BB1E-A0439A2D97EB}
\Device\RasAcd
\Device\Tcp



[ 本帖最后由 fengtaks 于 2009-11-18 22:30 编辑 ]
ray1106
发表于 2009-11-18 12:10:47 | 显示全部楼层
neutralized by IKARUS
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2026-4-19 23:18 , Processed in 0.088584 second(s), 4 queries , Redis On.

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表