pioneer
超级版主
       
积分 4563
发帖 4545
注册 2007-7-16 来自 BJ
|
#2
病毒分析
该样本程序被执行后,调用系统“cacls.exe”命令提升下列目录权限,赋予“everyone”用户完全控制权限:
Quote: | %SystemRoot%\system32
%Temp% |
|
尝试使用下列命令关闭“ESET NOD32 ”与“ScanFrm.exe”进程,实现自身保护:
Quote: | sc config ekrn start= disabled
taskkill /im ekrn.exe /f
taskkill /im ScanFrm.exe /f |
|
利用自身资源创建名为“killkb.dll”的文件到目录“%SystemRoot%\system32\”下,创建成功后利用系统“rundll32.exe”带参数“droqp”进行加载,成功加载后,替换目录“%SystemRoot%\system32\drivers\”下“acpiec.sys”文件,并创建下列“RESSDT”服务:
Quote: | 项:
HKLM\SYSTEM\CurrentControlSet\Services\RESSDT
键值:DisplayName
指向数据:RESSDT
健值:ImagePath
指向数据:%SystemRoot%\system32\drivers\acpiec.sys |
|
服务创建成功后调用此服务,恢复系统SSDT表,企图突破“卡巴”杀软的主动防御,并利用下列命令尝试关闭“avp.exe”进程:
Quote: | sc config avp start= disabled
taskkill /im avp.exe /f |
|
遍历查找下列安全进程,找到后尝试关闭该安全进程,实现自身的保护:
Quote: | 360safe.exe
360safebox.exe
360tray.exe
agentsvr.exe
anti-trojan.exe
antiarp.exe
antivir.exe
autodown.exe
avkserv.exe
avp.exe
avpupd.exe
avsched32.exe
avsynmgr.exe
avwin95.exe
ccenter.exe
cfiaudit.exe
cfind.exe
cfinet.exe
cfinet32.exe
drrtp.exe
dv95.exe
dv95_o.exe
dvp95.exe
egui.exe
ekrn.exe
jed.exe
kaccore.exe
kasmain.exe
kav32.exe
kavstart.exe
kissvc.exe
kmailmon.exe
kpfw32.exe
kpfwsvc.exe
kppmain.exe
krf.exe
kvmonxp.exe
kvprescan.exe
kwatch.exe
luall.exe
lucomserver.exe
mcafee.exe
mcnasvc.exe
mcproxy.exe
mcshield.exe
mon.exe
moniker.exe
moolive.exe
mpfsrv.exe
n32acan.exe
navapsvc.exe
navapw32.exe
navlu32.exe
navnt.exe
navrunr.exe
navsched.exe
navw.exe
navw32.exe
navwnt.exe
pccclient.exe
pccguide.exe
pcciomon.exe
pccmain.exe
pccwin98.exe
pcfwallicon.exe
persfw.exe
pop3trap.exe
ppppwallrun.exe
program.exe
prot.exe
pview95.exe
qqdoctor.exe
ras.exe
rav.exe
rav7.exe
rav7win.exe
ravmon.exe
ravmond.exe
ravstub.exe
ravtask.exe
rescue32.exe
rfw.exe
rfwmain.exe
rfwsrv.exe
rsmain.exe
rsnetsvr.exe
rstray.exe
safeboxtray.exe
safeweb.exe
scam32.exe
scan.exe
scan32.exe
scanfrm.exe
scanpm.exe
scon.exe
scrscan.exe
secu.exe
serv95.exe
sirc32.exe
smc.exe
smtpsvc.exe
sphinx.exe
spy.exe
sweep95.exe
tbscan.exe
tca.exe
tds2-98.exe
tds2-nt.exe
tmntsrv.exe
tmoagent.exe
tmproxy.exe
tmupdito.exe
tsc.exe
ulibcfg.exe
vavrunr.exe
vet95.exe
vettray.exe
vir.exe
vpc32.exe
vsecomr.exe
vshwin32.exe
vsscan40
vsstat.exe
webscan.exe
webscanx.exe
webtrap.exe
wfindv32.exe
windows优化大师.exe
wink.exe
zonealarm.exe |
|
利用自身资源创建名为“update.dll”的文件到目录“%SystemRoot%\system32\”下,创建成功后利用系统“rundll32.exe”带参数“scan”进行加载,成功加载后,访问下列木马列表网址,进行大量木马下载并运行:
列表网址内容如下:
访问下列网址进行刷流量统计:
修改系统“hosts”文件如下,实现对指定网址进行劫持:
Quote: | 127.0.0.1 v.onondown.com.cn
127.0.0.2 ymsdasdw1.cn
127.0.0.3 h96b.info
127.0.0.0 fuck.zttwp.cn
127.0.0.0 www.hackerbf.cn
127.0.0.0 geekbyfeng.cn
127.0.0.0 121.14.101.68
127.0.0.0 ppp.etimes888.com
127.0.0.0 www.bypk.com
127.0.0.0 CSC3-2004-crl.verisign.com
127.0.0.1 va9sdhun23.cn
127.0.0.0 udp.hjob123.com
127.0.0.2 bnasnd83nd.cn
127.0.0.0 www.gamehacker.com.cn
127.0.0.0 gamehacker.com.cn
127.0.0.3 adlaji.cn
127.0.0.1 858656.com
127.1.1.1 bnasnd83nd.cn
127.0.0.1 my123.com
127.0.0.0 user1.12-27.net
127.0.0.1 8749.com
127.0.0.0 fengent.cn
127.0.0.1 4199.com
127.0.0.1 user1.16-22.net
127.0.0.1 7379.com
127.0.0.1 2be37c5f.3f6e2cc5f0b.com
127.0.0.1 7255.com
127.0.0.1 user1.23-12.net
127.0.0.1 3448.com
127.0.0.1 www.guccia.net
127.0.0.1 7939.com
127.0.0.1 a.o1o1o1.nEt
127.0.0.1 8009.com
127.0.0.1 user1.12-73.cn
127.0.0.1 piaoxue.com
127.0.0.1 3n8nlasd.cn
127.0.0.1 kzdh.com
127.0.0.0 www.sony888.cn
127.0.0.1 about.blank.la
127.0.0.0 user1.asp-33.cn
127.0.0.1 6781.com
127.0.0.0 www.netkwek.cn
127.0.0.1 7322.com
127.0.0.0 ymsdkad6.cn
127.0.0.1 localhost
127.0.0.0 www.lkwueir.cn
127.0.0.1 06.jacai.com
127.0.1.1 user1.23-17.net
127.0.0.1 1.jopenkk.com
127.0.0.0 upa.luzhiai.net
127.0.0.1 1.jopenqc.com
127.0.0.0 www.guccia.net
127.0.0.1 1.joppnqq.com
127.0.0.0 4m9mnlmi.cn
127.0.0.1 1.xqhgm.com
127.0.0.0 mm119mkssd.cn
127.0.0.1 100.332233.com
127.0.0.0 61.128.171.115:8080
127.0.0.1 121.11.90.79
127.0.0.0 www.1119111.com
127.0.0.1 121565.net
127.0.0.0 win.nihao69.cn
127.0.0.1 125.90.88.38
127.0.0.1 16888.6to23.com
127.0.0.1 2.joppnqq.com
127.0.0.0 puc.lianxiac.net
127.0.0.1 204.177.92.68
127.0.0.0 pud.lianxiac.net
127.0.0.1 210.74.145.236
127.0.0.0 210.76.0.133
127.0.0.1 219.129.239.220
127.0.0.0 61.166.32.2
127.0.0.1 219.153.40.221
127.0.0.0 218.92.186.27
127.0.0.1 219.153.46.27
127.0.0.0 www.fsfsfag.cn
127.0.0.1 219.153.52.123
127.0.0.0 ovo.ovovov.cn
127.0.0.1 221.195.42.71
127.0.0.0 dw.com.com
127.0.0.1 222.73.218.115
127.0.0.1 203.110.168.233:80
127.0.0.1 3.joppnqq.com
127.0.0.1 203.110.168.221:80
127.0.0.1 363xx.com
127.0.0.1 www1.ip10086.com.cm
127.0.0.1 4199.com
127.0.0.1 blog.ip10086.com.cn
127.0.0.1 43242.com
127.0.0.1 www.ccji68.cn
127.0.0.1 5.xqhgm.com
127.0.0.0 t.myblank.cn
127.0.0.1 520.mm5208.com
127.0.0.0 x.myblank.cn
127.0.0.1 59.34.131.54
127.0.0.1 210.51.45.5
127.0.0.1 59.34.198.228
127.0.0.1 www.ew1q.cn
127.0.0.1 59.34.198.88
127.0.0.1 59.34.198.97
127.0.0.1 60.190.114.101
127.0.0.1 60.190.218.34
127.0.0.0 qq-xing.com.cn
127.0.0.1 60.191.124.252
127.0.0.1 61.145.117.212
127.0.0.1 61.157.109.222
127.0.0.1 75.126.3.216
127.0.0.1 75.126.3.217
127.0.0.1 75.126.3.218
127.0.0.0 59.125.231.177:17777
127.0.0.1 75.126.3.220
127.0.0.1 75.126.3.221
127.0.0.1 75.126.3.222
127.0.0.1 772630.com
127.0.0.1 832823.cn
127.0.0.1 8749.com
127.0.0.1 888.jopenqc.com
127.0.0.1 89382.cn
127.0.0.1 8v8.biz
127.0.0.1 97725.com
127.0.0.1 9gg.biz
127.0.0.1 www.9000music.com
127.0.0.1 test.591jx.com
127.0.0.1 a.topxxxx.cn
127.0.0.1 picon.chinaren.com
127.0.0.1 www.5566.net
127.0.0.1 p.qqkx.com
127.0.0.1 news.netandtv.com
127.0.0.1 z.neter888.cn
127.0.0.1 b.myblank.cn
127.0.0.1 wvw.wokutu.com
127.0.0.1 unionch.qyule.com
127.0.0.1 www.qyule.com
127.0.0.1 it.itjc.cn
127.0.0.1 www.linkwww.com
127.0.0.1 vod.kaicn.com
127.0.0.1 www.tx8688.com
127.0.0.1 b.neter888.cn
127.0.0.1 promote.huanqiu.com
127.0.0.1 www.huanqiu.com
127.0.0.1 www.haokanla.com
127.0.0.1 play.unionsky.cn
127.0.0.1 www.52v.com
127.0.0.1 www.gghka.cn
127.0.0.1 icon.ajiang.net
127.0.0.1 new.ete.cn
127.0.0.1 www.stiae.cn
127.0.0.1 o.neter888.cn
127.0.0.1 comm.jinti.com
127.0.0.1 www.google-analytics.com
127.0.0.1 hz.mmstat.com
127.0.0.1 www.game175.cn
127.0.0.1 x.neter888.cn
127.0.0.1 z.neter888.cn
127.0.0.1 p.etimes888.com
127.0.0.1 hx.etimes888.com
127.0.0.1 abc.qqkx.com
127.0.0.1 dm.popdm.cn
127.0.0.1 www.yl9999.com
127.0.0.1 www.dajiadoushe.cn
127.0.0.1 v.onondown.com.cn
127.0.0.1 www.interoo.net
127.0.0.1 bally1.bally-bally.net
127.0.0.1 www.bao5605509.cn
127.0.0.1 www.rty456.cn
127.0.0.1 www.werqwer.cn
127.0.0.1 1.360-1.cn
127.0.0.1 user1.23-16.net
127.0.0.1 www.guccia.net
127.0.0.1 www.interoo.net
127.0.0.1 upa.netsool.net
127.0.0.1 js.users.51.la
127.0.0.1 vip2.51.la
127.0.0.1 web.51.la
127.0.0.1 qq.gong2008.com
127.0.0.1 2008tl.copyip.com
127.0.0.1 tla.laozihuolaile.cn
127.0.0.1 www.tx6868.cn
127.0.0.1 p001.tiloaiai.com
127.0.0.1 s1.tl8tl.com
127.0.0.1 s1.gong2008.com
127.0.0.1 4b3ce56f9g.3f6e2cc5f0b.com
127.0.0.1 2be37c5f.3f6e2cc5f0b.com |
|
遍历磁盘,拷贝自身名为“1.exe”到磁盘分区根目录,并创建“autorun.inf”文件,均修改属性为“隐藏”,“autorun.inf”内容为:
|
※文章所有权归【pioneer】与【东方微点论坛】共同所有,转载请注明出处!※
|
 |
|