Trojan-Dropper.Win32.Agent.bdo

Trojan-Dropper.Win32.Agent.bdo是一種計算機病毒。 該病毒運行後,衍生病毒檔案到系統目錄下。添加註冊表隨機運行項以隨機引導病毒體。 從指定伺服器下載大量病毒體,包含大量遊戲盜號程式,以及 ARP欺騙程式。

簡介,行為分析,清除方案,

簡介

病毒名稱: Trojan-Dropper.Win32.Agent.bdo
中文名稱: 下載者變種
病毒類型: 木馬類
檔案 MD5: 85EC8DB377E6849DBDA9A1321C049AAA
公開範圍: 完全公開
危害等級: 4
檔案長度: 加殼後 83,456 位元組,脫殼後120,832 位元組
感染系統: Win9X以上系統
開發工具: Microsoft Visual C++ 6.0
加殼類型: UPX 0.89.6 - 1.02 / 1.05 - 1.24 -> Markus & Laszlo

行為分析

1 、衍生下列副本與檔案:
%WinDir%\sclgntfys.dll
%WinDir%\winamps.dll
%WinDir%\SysSun1\Ghook.dll
%WinDir%\SysSun1\svchost.exe
%WinDir%\cmdbcs.exe
%WinDir%\gv.dll
%WinDir%\mppds.exe
%WinDir%\javhavm.exe
%WinDir%\msccrt.exe
%WinDir%\shualai.exe
%WinDir%\winform.exe
%System32%\upnpsvc.exe
%System32%\systemt.exe
%System32%\systemm.exe
%System32%\SMSSS.exe
%System32%\servet.exe
%System32%\MSTCS.exe
%System32%\alg32.exe
%System32%\8.exe
%System32%\system\.setupq\*.*
%System32%\system\sysbacks\*.*
%Documents and settings%\ 當前用戶名 \local settings\temp\*.*
……………
2 、新建註冊表鍵值
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UMWdfmgr\Description
Value: String: " 啟用 windows 用戶模式驅動程式。 "
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UMWdfmgr\DisplayName
Value: String: "Windows User Mode Driver"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UMWdfmgr\ImagePath
Value: Type: REG_EXPAND_SZ Length: 46 (0x2e) bytes
rundll32.exe C:\WINDOWS\winamps. dll _start@16.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\msupdate
Value: String: "%WINDOWS%\AntiAdwa.exe other"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\
Winlogon\Notify\sclgntfys\DllName
Value: String: "%\WINDOWS%\sclgntfys.dll
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\0c4
Value: String: "%WINDOWS%\AntiAdwa.exe other"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\cmdbcs
Value: String: "%WINDOWS%\cmdbcs.exe "
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\cmdbs
Value: String: "%WINDOWS%\cmds.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\javhavm
Value: String: "%WINDOWS%\javhavm.exer"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
Run\KernelFaultcheck
Value: String: "%WINDOWS%\system32\dumprep.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\mppds
Value: String: "%WINDOWS%\mppds.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\pxdnd
Value: String: "%Documents and settings%\ 當前用戶名 \
local settings\temp\win4.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\shualai
Value: String: "%WINDOWS%\shualai.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\testrun
Value: String: "%WINDOWS%\testexe.exer"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\upxdndq
Value: String: "%Documents and settings%\ 當前用戶名 \
local settings\temp\upxdnd.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
Policies\Explorer\Run\sun
Value: String: "%WINDOWS%\syssun1\svchost.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
Policies\Explorer\Run\wm
Value: String: "%WINDOWS%\syswm7\svchost.exe"
4 、下載的病毒體
novel.exe會發起ARP 欺騙
註: % System% 是一個可變路徑。病毒通過查詢作業系統來決定當前 System 資料夾的位置。 Windows2000/NT 中默認的安裝路徑是 C:\Winnt\System32 , windows95/98/me 中默認的安裝路徑是 C:\Windows\System , windowsXP 中默認的安裝路徑是 C:\Windows\System32

清除方案

1 、 使用安天木馬防線可徹底清除此病毒 ( 推薦 )
2 、 手工清除請按照行為分析刪除對應檔案,恢復相關係統設定。
(1) 使用安天木馬防線斷開網路,結束病毒進程:
IEXPLORE.EXE
novel.exe
upnpsvc.exe
(2) 刪除並恢復病毒添加與修改的註冊表鍵值
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\UMWdfmgr\Description
Value: String: " 啟用 windows 用戶模式驅動程式。 "
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\UMWdfmgr\DisplayName
Value: String: "Windows User Mode Driver"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\UMWdfmgr\ImagePath
Value: Type: REG_EXPAND_SZ Length: 46 (0x2e) bytes
rundll32.exe C:\WINDOWS\winamps. dll _start@16.
HKEY_CURRENT_USER\Software\Microsoft\Windows\
CurrentVersion\Run\msupdate
Value: String: "%WINDOWS%\AntiAdwa.exe other"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\
CurrentVersion\Winlogon\Notify\sclgntfys\DllName
Value: String: "%\WINDOWS%\sclgntfys.dll
HKEY_CURRENT_USER\Software\Microsoft\Windows\
CurrentVersion\Run\0c4
Value: String: "%WINDOWS%\AntiAdwa.exe other"
HKEY_CURRENT_USER\Software\Microsoft\Windows\
CurrentVersion\Run\cmdbcs
Value: String: "%WINDOWS%\cmdbcs.exe "
HKEY_CURRENT_USER\Software\Microsoft\Windows\
CurrentVersion\Run\cmdbs
Value: String: "%WINDOWS%\cmds.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\
CurrentVersion\Run\javhavm
Value: String: "%WINDOWS%\javhavm.exer"
HKEY_CURRENT_USER\Software\Microsoft\Windows\
CurrentVersion\Run\KernelFaultcheck
Value: String: "%WINDOWS%\system32\dumprep.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\
CurrentVersion\Run\mppds
Value: String: "%WINDOWS%\mppds.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\
CurrentVersion\Run\pxdnd
Value: String: "%Documents and settings%\ 當前用戶 \
localsettings\temp\win4.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\
CurrentVersion\Run\shualai
Value: String: "%WINDOWS%\shualai.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\
CurrentVersion\Run\testrun
Value: String: "%WINDOWS%\testexe.exer"
HKEY_CURRENT_USER\Software\Microsoft\Windows\
CurrentVersion\Run\upxdndq
Value: String: "%Documents and settings%\
當前用戶名 \local settings\temp\upxdnd.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\
CurrentVersion\Policies\Explorer\Run\sun
Value: String: "%WINDOWS%\syssun1\svchost.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\
CurrentVersion\Policies\Explorer\Run\wm
Value: String: "%WINDOWS%\syswm7\svchost.exe"
(3) 刪除病毒釋放檔案:
%WinDir%\sclgntfys.dll
%WinDir%\winamps.dll
%WinDir%\SysSun1\Ghook.dll
%WinDir%\SysSun1\svchost.exe
%WinDir%\cmdbcs.exe
%WinDir%\gv.dll
%WinDir%\mppds.exe
%WinDir%\javhavm.exe
%WinDir%\msccrt.exe
%WinDir%\rising390.exe
%WinDir%\shualai.exe
%WinDir%\winform.exe
%System32%\upnpsvc.exe
%System32%\systemt.exe
%System32%\systemm.exe
%System32%\SMSSS.exe
%System32%\servet.exe
%System32%\MSTCS.exe
%System32%\alg32.exe
%System32%\8.exe
%WINDOWS%\syssun1\*.*
%System32%\syswm7\*.*
%System32%\system\.setupq\*.*
%System32%\system\sysbacks\*.*
%Documents and settings%\ 當前用戶名 \
local settings\temp\*.*
……………

相關詞條

熱門詞條

聯絡我們