词条 | Worm.Beagle.i病毒 |
释义 | § 名称 Worm.Beagle.i病毒 § 相关资料 病毒信息: 病毒名称: Worm.Beagle.i 中文名称: 恶鹰变种I 威胁级别: 3C 病毒别名:贝革热 W32.Beagle.J@mm 【Symantec】 WORM_BAGLE.J 【Trend】 病毒类型: 蠕虫、后门 受影响系统:Win9x/Win2000/WinXP 技术特点: · 传染条件:利用电子邮件高速传播; · 系统修改: A、将病毒自身拷贝到 %System%\\\\i11r54n4.exe; B、创建以下文件 %system%\\\\irun4.exeopen 该文件是一个加过密的ZIP文件包,密码随机生成,内容是病毒代码; C、添加以下键值 "ssate.exe"="%System%\\\\irun4.exe" 到 HKEY_CURRENT_USER\\\\SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run 以便病毒可随机自启动; 添加以下键值 HKEY_CURRENT_USER\\\\Software\\\\DateTime D、打开TCP端口2745进行监听。允行攻击者通过一段特殊的信息发送到此端口,可使病毒自动 下载新的程序到受感染系统的%Windir%目录中,名字为iuplda;.exe,;为随机字母。 新下载的程序可能为新病毒; E、发送HTTP GET 请求到以下网址,通TCP端口80。 postertog.de www.gfotxt.net www.maiklibis.de 病毒通过此操作来获得受感染系统的IP地址和打开的端口号 ; F、中止部份反病毒软件的升级程序,来阻止反病毒软件升级: Atupdater.exe Aupdate.exe Autodown.exe Autotrace.exe Autoupdate.exe Avltmain.exe Avpupd.exe Avwupd32.exe Avxquar.exe Cfiaudit.exe Drwebupw.exe Icssuppnt.exe Icsupp95.exe Luall.exe Mcupdate.exe Nupgrade.exe Outpost.exe Update.exe G、 查找后缀名为以下后缀的文件,并从中提取电子邮件地址: .wab .txt .msg .htm .xml .dbx .mdx .eml .nch .mmf .ods .cfg .asp .php .pl .adb .tbb .sht .uin .cgi · 传播方式: A、 释放病毒复本到名字含有字符串";shar";的文件夹中,使病毒具备网络共享传播和通过 P2P软件传播的能力,病毒复本的名字为: ACDSee 9.exe Adobe Photoshop 9 full.exe Ahead Nero 7.exe Matrix 3 Revolution English Subtitles.exe Microsoft Office 2003 Crack, Working!.exe Microsoft Office XP working Crack, Keygen.exe Microsoft Windows XP, WinXP Crack, working Keygen.exe Opera 8 New!.exe Porno pics arhive, xxx.exe Porno Screensaver.scr Porno, sex, oral, anal cool, awesome!!.exe Serials.txt.exe WinAmp 5 Pro Keygen Crack Update.exe WinAmp 6 New!.exe Windown Longhorn Beta Leak.exeWindows Sourcecode update.doc.exe XXX hardcore images.exe B、病毒使用自己发信引擎发信,其邮件特征为: 发件人: (可能是以下字符串中的任意): nagement@; administration@; staff@; noreply@; support@; 主题: (可能是以下字符串中的任意): E-mail account disabling warning. E-mail account security warning. Email account utilization warning. Important notify about your e-mail account. Notify about using the e-mail account. Notify about your e-mail account utilization. Warning about your e-mail account. 内容:(可能是以下字符串中的任意组合): Dear user of ;, Dear user of ; gateway e-mail server, Dear user of e-mail server ";;";, Hello user of ; e-mail server, Dear user of ";;"; mailing system, Dear user, the management of ; mailing system wants to let you know that, Your e-mail account has been temporary disabled because of unauthorized access. Our main mailing server will be temporary unavaible for next two days, to continue receiving mail in these days you have to configure our free auto-forwarding service. Your e-mail account will be disabled because of improper using in next three days, if you are still wishing to use it, please, resign your account information. We warn you about some attacks on your e-mail account. Your computer may contain viruses, in order to keep your computer and e-mail account safe, please, follow the instructions. Our antivirus software has detected a large ammount of viruses outgoing from your email account, you may use our free anti-virus tool to clean up your computer software. Some of our clients complained about the spam (negative e-mail content) outgoing from your e-mail account. Probably, you have been infected by a proxy-relay trojan server. In order to keep your computer safe, follow the instructions. For more information see the attached file. Further details can be obtained from attached file. Advanced details can be found in attached file. For details see the attach. For details see the attached file. For further details see the attach. Please, read the attach for further details. Pay attention on attached file. The ; team http://www.; The Management, Sincerely, Best wishes, Have a good day, Cheers, Kind regards, For security reasons attached file is password protected. The password is ";;";. For security purposes the attached file is password protected. Password is";;";. Attached file protected with the password for security reasons. Password is;. In order to read the attach you have to use the following password: ;. 注意: 为邮件服务器的域,比如:21cn.com 附件名:【可能是以下字符串中的任意】.zip: Attach Information Readme Document Info TextDocument TextFile MoreInfo Message Zip文件中是病毒复本,名字由随机字符组。ZIP包可能加密,密码会出现在邮件内容中 病毒会避免发送病毒邮件到含有以下字符串的邮件地址 @hotmail.com @msn.com @microsoft @avp. noreply local root@ postmaster@ · 发作现象: 病毒使用“写字板”应用程序的图标,《如附图:》 解决方案: ·金山毒霸已经于3月3日对该病毒进行了应急处理,请升级最新版可完全查该病毒; · 请一定留意收到的邮件,如果有附件,请不要打开附件,更不要执行附件中的可执行程序,注 意病毒程序伪装的图标,不要轻信图标为“电子表格、文本文件、文件夹”的附件; · 手工解决方案: 首先,对于WinMe和Windows XP系统,请先关闭“系统还原功能” (毒霸论坛:反病毒可能需要用到的方法及操作 > 如何禁用Win Me/XP的“系统还原”功能) 对于系统是Windows9x,WindowsMe: 步骤一,删除病毒主程序 请使用干净的系统软盘引导系统到纯DOS模式,然后转到系统目录(默认的系统目录为 C:\\\\windows\\\\system),分别输入以下命令,以便删除病毒程序: C:\\\\Windows\\\\system>;del irun4.exe C:\\\\Windows\\\\system>;del irun4.exeopen 完毕后,取出系统软盘,重新引导到Windows系统。 如果手中没有系统软件盘,可以在引导系统时按“F5”键也可进入纯DOS模式。 步骤二,清除病毒在注册表里添加的项 打开注册表编辑器: 点击开始>运行, 输入REGEDIT, 按Enter; 在左边的面板中, 双击(按箭头顺序查找,找到后双击): HKEY_LOCAL_MACHINE > Software > Microsoft > Windows > CurrentVersion>Run 在右边的面板中, 找到并删除如下项目: "srate.exe"="%System%\\\\irun4.exe" 关闭注册表编辑器。 对于系统是Windows NT,Windows2000,Windows XP,Windows 2003 sever: 步骤一,使用进程序管里器结束病毒进程 右键单击任务栏,弹出菜单,选择“任务管理器”,调出“Windows任务管理器”窗口。在任务 管理器中,单击“进程”标签,在例表栏找病毒进程“irun4.exe”,单击“结束进程按钮”, 点击“是”,结束病毒进程,然后关闭“Windows任务管理器”; 步骤二,查找并删除病毒程序 通过“我的电脑”或“资源管理器”进入系统目录(Winnt\\\\system32或windows\\\\system32),找 到文件"irun4.exe和irun4.exeopen",将它们删除,注意清空回收站内的内容; 步骤三,清除病毒在注册表里添加的项 打开注册表编辑器: 点击开始>运行, 输入REGEDIT, 按Enter; 在左边的面板中, 双击(按箭头顺序查找,找到后双击): HKEY_LOCAL_MACHINE > Software > Microsoft > Windows > CurrentVersion > Run 在右边的面板中, 找到并删除如下项目: "srate.exe"="%System%\\\\irun4.exe" 关闭注册表编辑器. |
随便看 |
百科全书收录594082条中文百科知识,基本涵盖了大多数领域的百科知识,是一部内容开放、自由的电子版百科全书。