ESPNSTAR 體育台網站又被植入惡意連結,此惡意程式為 QQPass 變種,最近有瀏覽這個網頁的網友,應該要盡速檢查自己的電腦。請各位暫時不要瀏覽這個網站,以免中毒,等確認他們已經修復後,會在此更新訊息。另外,此惡意程式是利用微軟所公佈的安全漏洞 (Vulnerability in Windows Animated Cursor Handling) (此為零時差攻擊) (此惡意程式應該會偷帳號與密碼)。 **請幫忙通知他們,謝謝** 惡意連結是放置在 default.js 檔案中的: 惡意程式碼的一部分為: 執行之後,有下面的行為: [Added process] C:\WINDOWS\avp.exe [DLL injection] C:\WINDOWS\system32\ldmedia5.dll (注入 IE 的執行程序) [Added service] NAME: VGADown DISPLAY: Audio Adapter FILE: C:\WINDOWS\avp.exe NAME: WS2IFSL (這是正常的服務) DISPLAY: Windows Socket 2.0 Non-IFS Service Provider Support Environment FILE: \SystemRoot\System32\drivers\ws2ifsl.sys [Added file] C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C13NVBMZ\dhtmllib[1].js C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C13NVBMZ\flash[1].exe C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C13NVBMZ\getflashplayer[1].htm C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\SEUIMLSE\default[1].js C:\WINDOWS\avp.exe C:\WINDOWS\system32\ldmedia5.dll [Added LSP] ID: 1012 NAME: MSAFD Tcpip [RAW/IP] (連結至 C:\WINDOWS\system32\ldmedia5.dll) ID: 1013 NAME: MSAFD Tcpip [TCP/IP] (連結至 C:\WINDOWS\system32\ldmedia5.dll) 到目前為止 (2007/4/4 @ 22:30),下面的防毒軟體可以偵測到這些惡意檔案: avp.exe: [ AntiVir ], "HEUR/Malware" [ Avast ], "Win32:Lineage-406" [ Ewido ], "Trojan.Maran.cs" [ Fortinet ], "W32/Maran.DQ!tr.pws" [ F-Secure ], "Trojan-PSW.Win32.Maran.dq" [ Ikarus ], "Trojan-PWS.Win32.Maran.ah" [ Kaspersky ], "Trojan-PSW.Win32.Maran.dq" [ Panda ], "Suspicious file" [ Trend ], "Possible_Virus" [ Webwasher-Gateway], "Heuristic.Malware" flash[1].exe: [ AntiVir ], "TR/PSW.Maran.AU" [ Avast ], "Win32:Maran" [ AVG ], "PSW.Generic3.UGU" [ BitDefender ], "Generic.Malware.FB.31BA62EC" [ CAT-QuickHeal ], "(Suspicious) - DNAScan" [ eSafe ], "suspicious Trojan/Worm" [ Ewido ], "Trojan.Maran.cs" xskj.jpg: [ AhnLab-V3 ], “Win-Trojan/Exploit-ANI.B” [ AntiVir ], “EXP/MS05-002.Ani.A” [ BitDefender ], “Exploit.Win32.MS05-002.Gen” [ CAT-QuickHeal ], “Exploit.MS05-002〃 [ ClamAV ], “Exploit.W32.MS05-002〃 [ eTrust-Vet ], “Win32/MSA-935423!exploit” [ Ewido ], “Not-A-Virus.Exploit.Win32.IMGANI.h” [ F-Secure ], “Exploit.Win32.IMG-ANI.h” [ Kaspersky ], “Exploit.Win32.IMG-ANI.h” [ McAfee ], “Exploit-ANIfile.c” [ Microsoft ], “TrojanDownloader:Win32/Anicmoo.gen!D” [ NOD32v2 ], “a variant of Win32/TrojanDownloader.Ani.Gen” [ Norman ], “RIFF/Ani_exploit.gen” [ Sophos ], “Troj/Animoo-U” [ Symantec ], “Trojan.Anicmoo” [ Trend ], "EXPL_ANICMOO.GEN" [ VirusBuster ], “Exploit.ANIFile.G” [ Webwasher-Gateway ], “Exploit.MS05-002.Ani.A” ldmedia5.dll: [ AntiVir ], "TR/Drop.Maran.C.3" [ AVG ], "PSW.Generic3.UGT" [ Ewido ], "Trojan.Maran.cs" [ BitDefender ], "Trojan.PWS.Maran.AY" [ Fortinet ], "W32/Maran.DQ!tr.pws" [ Kaspersky ], "Trojan-PSW.Win32.Maran.dq" [ Alwil ], "Win32:Maran-D [Trj]" [ Nod32 ], "a variant of Win32/PSW.Maran trojan" [ Fortinet ], "suspicious" [ HBEDV ], "TR/Drop.Maran.C.3" [ Rising ], "Trojan.PSW.Gamania.xg" [ Ewido ], "Trojan.Maran.cs" [ Grisoft ], "Trojan horse PSW.Generic3.UGT" [ F-Secure ], "Trojan-PSW.Win32.Maran.dq" [ Panda ], "Suspicious file" [ Webwasher-Gateway ], "Trojan.Drop.Maran.C.3"-----
文章標籤
全站熱搜
創作者介紹
創作者 rogerspeaking 的頭像
rogerspeaking

大砲開講

rogerspeaking 發表在 痞客邦 留言(0) 人氣(140)