ESPNSTAR 體育台網站又被植入惡意連結,此惡意程式為 QQPass 變種,最近有瀏覽這個網頁的網友,應該要盡速檢查自己的電腦。請各位暫時不要瀏覽這個網站,以免中毒,等確認他們已經修復後,會在此更新訊息。另外,此惡意程式是利用微軟所公佈的安全漏洞 (Vulnerability in Windows Animated Cursor Handling) (此為零時差攻擊) (此惡意程式應該會偷帳號與密碼)。
**請幫忙通知他們,謝謝**
惡意連結是放置在 default.js 檔案中的:
惡意程式碼的一部分為:
執行之後,有下面的行為:
[Added process]
C:\WINDOWS\avp.exe
[DLL injection]
C:\WINDOWS\system32\ldmedia5.dll (注入 IE 的執行程序)
[Added service]
NAME: VGADown
DISPLAY: Audio Adapter
FILE: C:\WINDOWS\avp.exe
NAME: WS2IFSL (這是正常的服務)
DISPLAY: Windows Socket 2.0 Non-IFS Service Provider Support Environment
FILE: \SystemRoot\System32\drivers\ws2ifsl.sys
[Added file]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C13NVBMZ\dhtmllib[1].js
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C13NVBMZ\flash[1].exe
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C13NVBMZ\getflashplayer[1].htm
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\SEUIMLSE\default[1].js
C:\WINDOWS\avp.exe
C:\WINDOWS\system32\ldmedia5.dll
[Added LSP]
ID: 1012
NAME: MSAFD Tcpip [RAW/IP] (連結至 C:\WINDOWS\system32\ldmedia5.dll)
ID: 1013
NAME: MSAFD Tcpip [TCP/IP] (連結至 C:\WINDOWS\system32\ldmedia5.dll)
到目前為止 (2007/4/4 @ 22:30),下面的防毒軟體可以偵測到這些惡意檔案:
avp.exe:
[ AntiVir ], "HEUR/Malware"
[ Avast ], "Win32:Lineage-406"
[ Ewido ], "Trojan.Maran.cs"
[ Fortinet ], "W32/Maran.DQ!tr.pws"
[ F-Secure ], "Trojan-PSW.Win32.Maran.dq"
[ Ikarus ], "Trojan-PWS.Win32.Maran.ah"
[ Kaspersky ], "Trojan-PSW.Win32.Maran.dq"
[ Panda ], "Suspicious file"
[ Trend ], "Possible_Virus"
[ Webwasher-Gateway], "Heuristic.Malware"
flash[1].exe:
[ AntiVir ], "TR/PSW.Maran.AU"
[ Avast ], "Win32:Maran"
[ AVG ], "PSW.Generic3.UGU"
[ BitDefender ], "Generic.Malware.FB.31BA62EC"
[ CAT-QuickHeal ], "(Suspicious) - DNAScan"
[ eSafe ], "suspicious Trojan/Worm"
[ Ewido ], "Trojan.Maran.cs"
xskj.jpg:
[ AhnLab-V3 ], “Win-Trojan/Exploit-ANI.B”
[ AntiVir ], “EXP/MS05-002.Ani.A”
[ BitDefender ], “Exploit.Win32.MS05-002.Gen”
[ CAT-QuickHeal ], “Exploit.MS05-002〃
[ ClamAV ], “Exploit.W32.MS05-002〃
[ eTrust-Vet ], “Win32/MSA-935423!exploit”
[ Ewido ], “Not-A-Virus.Exploit.Win32.IMGANI.h”
[ F-Secure ], “Exploit.Win32.IMG-ANI.h”
[ Kaspersky ], “Exploit.Win32.IMG-ANI.h”
[ McAfee ], “Exploit-ANIfile.c”
[ Microsoft ], “TrojanDownloader:Win32/Anicmoo.gen!D”
[ NOD32v2 ], “a variant of Win32/TrojanDownloader.Ani.Gen”
[ Norman ], “RIFF/Ani_exploit.gen”
[ Sophos ], “Troj/Animoo-U”
[ Symantec ], “Trojan.Anicmoo”
[ Trend ], "EXPL_ANICMOO.GEN"
[ VirusBuster ], “Exploit.ANIFile.G”
[ Webwasher-Gateway ], “Exploit.MS05-002.Ani.A”
ldmedia5.dll:
[ AntiVir ], "TR/Drop.Maran.C.3"
[ AVG ], "PSW.Generic3.UGT"
[ Ewido ], "Trojan.Maran.cs"
[ BitDefender ], "Trojan.PWS.Maran.AY"
[ Fortinet ], "W32/Maran.DQ!tr.pws"
[ Kaspersky ], "Trojan-PSW.Win32.Maran.dq"
[ Alwil ], "Win32:Maran-D [Trj]"
[ Nod32 ], "a variant of Win32/PSW.Maran trojan"
[ Fortinet ], "suspicious"
[ HBEDV ], "TR/Drop.Maran.C.3"
[ Rising ], "Trojan.PSW.Gamania.xg"
[ Ewido ], "Trojan.Maran.cs"
[ Grisoft ], "Trojan horse PSW.Generic3.UGT"
[ F-Secure ], "Trojan-PSW.Win32.Maran.dq"
[ Panda ], "Suspicious file"
[ Webwasher-Gateway ], "Trojan.Drop.Maran.C.3"-----
文章標籤
全站熱搜
