病毒描述: <br />
该病毒运行后,衍生病毒文件到系统目录下。添加注册表随机运行项以随机引导病毒体。<br />
从指定服务器下载大量病毒体,包含大量游戏盗号程序,以及 ARP欺骗程序。 <br />
<br />
行为分析: <br />
1 、衍生下列副本与文件:</font></p>
<p><font face="宋体"> %WinDir%\sclgntfys.dll <br />
%WinDir%\winamps.dll <br />
%WinDir%\SysSun1\Ghook.dll <br />
%WinDir%\SysSun1\svchost.exe <br />
%WinDir%\cmdbcs.exe <br />
%WinDir%\gv.dll <br />
%WinDir%\mppds.exe <br />
%WinDir%\javhavm.exe <br />
%WinDir%\msccrt.exe<br />
%WinDir%\shualai.exe <br />
%WinDir%\winform.exe <br />
%System32%\upnpsvc.exe <br />
%System32%\systemt.exe <br />
%System32%\systemm.exe <br />
%System32%\SMSSS.exe <br />
%System32%\servet.exe <br />
%System32%\MSTCS.exe <br />
%System32%\alg32.exe <br />
%System32%\8.exe <br />
%System32%\system\.setupq\*.* <br />
%System32%\system\sysbacks\*.* <br />
%Documents and settings%\ 当前用户名 \local settings\temp\*.* <br />
…………… </font></p>
<p><font face="宋体">2 、新建注册表键值: </font></p>
<p><font face="宋体"> HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UMWdfmgr\Description <br />
Value: String: " 启用 windows 用户模式驱动程序。 " <br />
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UMWdfmgr\DisplayName <br />
Value: String: "Windows User Mode Driver" <br />
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UMWdfmgr\ImagePath <br />
Value: Type: REG_EXPAND_SZ Length: 46 (0x2e) bytes <br />
rundll32.exe C:\WINDOWS\winamps. dll _start@16. <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\msupdate <br />
Value: String: "%WINDOWS%\AntiAdwa.exe other" <br />
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\<br />
Winlogon\Notify\sclgntfys\DllName <br />
Value: String: "%\WINDOWS%\sclgntfys.dll <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\0c4 <br />
Value: String: "%WINDOWS%\AntiAdwa.exe other" <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\cmdbcs <br />
Value: String: "%WINDOWS%\cmdbcs.exe " <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\cmdbs <br />
Value: String: "%WINDOWS%\cmds.exe" <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\javhavm <br />
Value: String: "%WINDOWS%\javhavm.exer" <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\<br />
Run\KernelFaultcheck <br />
Value: String: "%WINDOWS%\system32\dumprep.exe" <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\mppds <br />
Value: String: "%WINDOWS%\mppds.exe" <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\pxdnd <br />
Value: String: "%Documents and settings%\ 当前用户名 \<br />
local settings\temp\win4.exe" <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\shualai <br />
Value: String: "%WINDOWS%\shualai.exe" <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\testrun <br />
Value: String: "%WINDOWS%\testexe.exer" <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\upxdndq <br />
bitscn_com
Value: String: "%Documents and settings%\ 当前用户名 \<br />
local settings\temp\upxdnd.exe" <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\<br />
Policies\Explorer\Run\sun <br />
Value: String: "%WINDOWS%\syssun1\svchost.exe" <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\<br />
Policies\Explorer\Run\wm <br />
Value: String: "%WINDOWS%\syswm7\svchost.exe" </font></p>
<p><font face="宋体">3 、连接下列服务器 , 下载病毒体: </font></p>
<p><font face="宋体"> Host:(2*8.6.1*5.1*)b*ol*m.com/up/win1.exe <br />
Host: t.g*u*.com(2*2.7*.15.9*)/0.exe <br />
Host: t.g*u*.com(2*2.7*.15.9*)/0/AVG.exe <br />
Host: t.g*u*.com(2*2.7*.15.9*)//0/SMSSS.exe <br /> bitscn_com
Host:
www.1*d*m.com(2*2.7*.15.3*)/xia/kehu0703.exe </font></p>
<p><font face="宋体">4 、下载的病毒体 novel.exe 会发起 ARP 欺骗。 <br />
<br />
注: % System% 是一个可变路径。病毒通过查询操作系统来决定当前 System 文件夹的位置。 Windows2000/NT 中默认的安装路径是 C:\Winnt\System32 , windows95/98/me 中默认的安装路径是 C:\Windows\System , windowsXP 中默认的安装路径是 C:\Windows\System32 。 <br />
</font></p>
<p><font face="宋体">--------------------------------------------------------------------------------<br />
清除方案: <br />
1 、 使用安天木马防线可彻底清除此病毒 ( 推荐 )</font></p>
<p><font face="宋体">2 、 手工清除请按照行为分析删除对应文件,恢复相关系统设置。 <br />
(1) 使用安天木马防线断开网络,结束病毒进程: <br />
IEXPLORE.EXE <br /> bitscn.com
novel.exe <br />
upnpsvc.exe <br />
(2) 删除并恢复病毒添加与修改的注册表键值:<br />
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\<br />
Services\UMWdfmgr\Description <br />
Value: String: " 启用 windows 用户模式驱动程序。 " <br />
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\<br />
Services\UMWdfmgr\DisplayName <br />
Value: String: "Windows User Mode Driver" <br />
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\<br />
Services\UMWdfmgr\ImagePath <br />
Value: Type: REG_EXPAND_SZ Length: 46 (0x2e) bytes <br />
rundll32.exe C:\WINDOWS\winamps. dll _start@16. <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\<br />
CurrentVersion\Run\msupdate <br />
bitscn_com
Value: String: "%WINDOWS%\AntiAdwa.exe other" <br />
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\<br />
CurrentVersion\Winlogon\Notify\sclgntfys\DllName<br />
Value: String: "%\WINDOWS%\sclgntfys.dll <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\<br />
CurrentVersion\Run\0c4 <br />
Value: String: "%WINDOWS%\AntiAdwa.exe other" <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\<br />
CurrentVersion\Run\cmdbcs <br />
Value: String: "%WINDOWS%\cmdbcs.exe " <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\<br />
CurrentVersion\Run\cmdbs <br />
Value: String: "%WINDOWS%\cmds.exe" <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\<br />
CurrentVersion\Run\javhavm <br />
Value: String: "%WINDOWS%\javhavm.exer" <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\<br />
CurrentVersion\Run\KernelFaultcheck <br />
Value: String: "%WINDOWS%\system32\dumprep.exe" <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\<br />
CurrentVersion\Run\mppds <br />
Value: String: "%WINDOWS%\mppds.exe" <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\<br />
CurrentVersion\Run\pxdnd <br />
Value: String: "%Documents and settings%\ 当前用户 \<br />
localsettings\temp\win4.exe" <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\<br />
CurrentVersion\Run\shualai<br />
Value: String: "%WINDOWS%\shualai.exe" <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\<br />
CurrentVersion\Run\testrun<br />
Value: String: "%WINDOWS%\testexe.exer" <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\<br />
CurrentVersion\Run\upxdndq <br />
Value: String: "%Documents and settings%\ <br />
当前用户名 \local settings\temp\upxdnd.exe" <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\<br />
CurrentVersion\Policies\Explorer\Run\sun <br />
Value: String: "%WINDOWS%\syssun1\svchost.exe" <br />
HKEY_CURRENT_USER\Software\Microsoft\Windows\<br />
CurrentVersion\Policies\Explorer\Run\wm <br />
Value: String: "%WINDOWS%\syswm7\svchost.exe" </font></p>
<p><font face="宋体"> (3) 删除病毒释放文件:<br />
%WinDir%\sclgntfys.dll <br />
%WinDir%\winamps.dll <br />
%WinDir%\SysSun1\Ghook.dll <br />
%WinDir%\SysSun1\svchost.exe <br />
%WinDir%\cmdbcs.exe <br />
%WinDir%\gv.dll <br />
%WinDir%\mppds.exe <br />
%WinDir%\javhavm.exe <br />
%WinDir%\msccrt.exe <br />
%WinDir%\rising390.exe <br />
%WinDir%\shualai.exe <br />
%WinDir%\winform.exe <br />
%System32%\upnpsvc.exe <br />
%System32%\systemt.exe <br />
%System32%\systemm.exe <br />
%System32%\SMSSS.exe <br />
%System32%\servet.exe <br />
%System32%\MSTCS.exe <br />
%System32%\alg32.exe <br />
%System32%\8.exe <br />
%WINDOWS%\syssun1\*.* <br />
%System32%\syswm7\*.* <br />
%System32%\system\.setupq\*.* <br />
%System32%\system\sysbacks\*.* <br />
%Documents and settings%\ 当前用户名 \<br />
local settings\temp\*.* <br />
…………… </font></p>
————————————————————————————
这才是木马源码、
楼上的脑残啊