位置:首页 > 电脑资讯 > 新病毒“快客”可通过MSN/P2P双重感染

新病毒“快客”可通过MSN/P2P双重感染

时间:2005-11-24  |  作者:江民科技  |  阅读:242
    病毒类型:蠕虫
    病毒大小:17429字节
    传播方式:网络
    危害程度:★★★

    2005年3月7日,江民反病毒中心截获一个通过MSN和P2P软件快速传播的蠕虫病毒I-Worm/MSN.Sofast。



    病毒具体技术特征如下:

    1. 通过MSN向用户好友发送病毒文件,可能的文件名如下:

    MSLARISSA.pif
    CmdPrompt32.pif
    SP00Lsv32.pif
    LOVE_LETTER_FOR_YOU.pif
    WinVBS.vbs
    MESSAGE_TO_BROPIA.txt
    Hey LARISSA fuck off, you fucking n00b!.. Bla bla to your fucking
    Crazy frog gets killed by train!.pif
    Annoying crazy frog getting killed.pif
    See my lesbian friends.pif
    LOL that ur pic!.pif
    My new photo!.pif
    Me on holiday!.pif
    The Cat And The Fan piccy.pif
    How a Blonde Eats a Banana...pif
    Mona Lisa Wants Her Smile Back.pif
    Topless in Mini Skirt! lol.pif
    Fat Elvis! lol.pif

    2. 病毒运行后,将创建下列文件:
    %SystemDir%\serbw.exe, 17429字节
    %SystemDir%\formatsys.exe, 17429字节
    %WinDir%\msmbw.exe, 17429字节
    c:\crazy-frog.html, 745字节
    c:\lspt.exe, 17429字节
    c:\crazy frog gets killed by train!.pif, 17429字节
    c:\annoying crazy frog getting killed.pif, 17429字节
    c:\see my lesbian friends.pif, 17429字节
    c:\lol that ur pic!.pif, 17429字节
    c:\my new photo!.pif, 17429字节
    c:\me on holiday!.pif, 17429字节
    c:\the cat and the fan piccy.pif, 17429字节
    c:\how a blonde eats a banana...pif, 17429字节
    c:\mona lisa wants her smile back.pif, 17429字节
    c:\topless in mini skirt! lol.pif, 17429字节
    c:\fat elvis! lol.pif, 17429字节
    c:\jennifer lopez.scr, 17429字节
    c:\message to n00b larissa.txt, 156字节

    其中c:\message to n00b larissa.txt内容如下:
    Hey LARISSA fuck off, you fucking n00b!.. Bla bla to your fucking
    Saving the world from Bropia, the world n33ds saving from you!

    '-S-K-Y-'-D-E-V-I-L-'
    3. 在注册表中添加下列启动项:
  [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
CurrentVersion\policies\Explorer\Run]
  "serpe" = %SystemDir%\serbw.exe
  [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
  "serpe" = %SystemDir%\serbw.exe
  [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices]
  "serpe" = %SystemDir%\serbw.exe
  [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\
CurrentVersion\Policies\Explorer\Run]
  "serpe" = %SystemDir%\serbw.exe
  这样,在Windows启动时,病毒就可以自动执行。


  4. 修改%SystemDir%\drivers\etc\hosts文件,屏蔽多个反病毒网站:
  64.233.167.104 www.symantec.com
  64.233.167.104 www.sophos.com
  64.233.167.104 www.mcafee.com
  64.233.167.104 www.viruslist.com
  64.233.167.104 www.f-secure.com
  64.233.167.104 www.avp.com
  64.233.167.104 www.kaspersky.com
  64.233.167.104 www.networkassociates.com
  64.233.167.104 www.ca.com
  64.233.167.104 www.my-etrust.com
  64.233.167.104 www.nai.com
  64.233.167.104 www.trendmicro.com
  64.233.167.104 www.grisoft.com
  64.233.167.104 securityresponse.symantec.com
  64.233.167.104 symantec.com
  64.233.167.104 sophos.com
  64.233.167.104 mcafee.com
  64.233.167.104 liveupdate.symantecliveupdate.com
  64.233.167.104 viruslist.com
  64.233.167.104 f-secure.com
  64.233.167.104 kaspersky.com
  64.233.167.104 kaspersky-labs.com
  64.233.167.104 avp.com
  64.233.167.104 networkassociates.com
  64.233.167.104 ca.com
  64.233.167.104 mast.mcafee.com
  64.233.167.104 my-etrust.com
  64.233.167.104 download.mcafee.com
  64.233.167.104 dispatch.mcafee.com
  64.233.167.104 secure.nai.com
  64.233.167.104 nai.com
  64.233.167.104 update.symantec.com
  64.233.167.104 updates.symantec.com
  64.233.167.104 us.mcafee.com
  64.233.167.104 liveupdate.symantec.com
  64.233.167.104 customer.symantec.com
  64.233.167.104 rads.mcafee.com
  64.233.167.104 trendmicro.com
  64.233.167.104 grisoft.com
  64.233.167.104 sandbox.norman.no
  64.233.167.104 www.pandasoftware.com
  64.233.167.104 uk.trendmicro-europe.com

  5. 结束多种杀毒软件和防火墙进程。

  6. 禁止注册表编辑器和任务管理器运行。

  7. 通过复制到共享文件夹和P2P软件共享文件夹传播,可能的文件名为Messenger Plus! 3.50.exe

  8. 打开网页c:\crazy-frog.html,连接http://frog.0catch.com/网站。

  针对该病毒,江民公司已经在第一时间升级。请广大用户一定要提高警惕,不要点击来自MSN的不明文件,并立即升级到3月7日病毒库,即可全面查杀该病毒,保护您的系统不受威胁。

福利游戏

相关文章

更多

精选合集

更多

大家都在玩

热门话题

大家都在看

更多