Transfer from the original forum Jakee posts:
Recently many netizens reflect their machine is called a gray pigeon Trojan virus, this virus is very naughty, in different kill soft have different names such as: Gpigeon, Huigezi, Feutel, in the computer to clear it is very troublesome, especially its just opened issued 2005, Through the interception of Windows System API to achieve program file hiding, proces
The safety clinic's duty doctor Sails, is inquiring some information. Then push the door into a sick man. The patient said he had recently been robbed of a number of Internet accounts associated with himself and wanted to see what was the reason for the doctor.
Zhang Fan asked the patient has not installed anti-virus software. Patients said they installed antivirus software is the latest version of Kaspersky, not only on a daily basis to update the
First, the preface
Virus class teacher threw us a copy of the VBS script virus code to try to analyze, here the analysis process sent out for everyone's reference, if found in what is wrong or what is suggested, you can leave a message to me, thank you!
Ii. Table of Contents
The entire analysis process can be divided into the following sections:
0x00 Preparation Work0x01 Decryption part0x02 function Ana
The virus generates the following files:
Code:
C:\WINDOWS\system32\1.inf
C:\WINDOWS\system32\chostbl.exe
C:\WINDOWS\system32\lovesbl.dll
Create Autorun.inf and Sbl.exe under each partition and constantly detect whether the Chostbl.exe properties are hidden
Registration service ANHAO_VIP_CAHW Point to C:\WINDOWS\system32\chostbl.exe, the purpose of boot up.
Startup type: Automatic
Display Name: A good DownLoad cahw
Call the TerminateProcess function
Panda defender, from Europe's top kill virus software developer Panda Software unique concept and quality, the most advanced easy-to-use anti-virus software, perfect block from the internet all kinds of threats to computer security factors.
Panda Antivirus 2008 Main new features:
1, to add new security early warning mechanism. By default, users are prevented from logging on to a known malicious site, rega
Virus name: TROJAN.DELF.RSD MD5 216a3783443fc9c46fe4d32aa13c390f
After running the virus sample, automatically copy the copy to the%systemroot% directory
%systemroot%\flashplay.dll
%systemroot%\ge_1237.exe
X:\flashplay.dll
X:\readme.txt.exe
X:\autorun.inf
X refers to a non-system drive letter
%systemroot% is an environment variable,
What's inside Autorun.inf:
[Autorun]
Open=.\readme.txt.exe
Shell\1=open
About Rundll2000.exe, also do not know is a what the virus. In the computer also did not find other strange elephants, there is no abnormal, is a little uncomfortable in the heart. The machine is our ... You don't want any uninvited guests.
Rundll2000.exe Virus Manual cleanup
Reboot the computer and enter Safe Mode (press F8 when the computer starts)
Delete the following files:
C:\Program files\internet Exp
Releasing files
Copy Code code as follows:
%program files%\internet Explorer\plugins\autorun.inf
%program files%\internet Explorer\plugins\pagefile.pif
%program files%\internet Explorer\plugins\winnice.dll
X:\Autorun.inf (x is not a system disk other letter)
X:\pagefile.pif
Add registry information such as Startup items
Copy Code code as follows:
Hkey_local_machine\software\microsoft\windows\currentversion\explorer\shellexecutehooks] { 06a68ad9-ff6
suspect a Trojan or virus, or if the system starts too slowly, use this tool to look at the startup item.
The first time you run, the font displayed is very uncomfortable, please go to the menu "Options"-"font" set the font to "Arial" 9th, then no problem.
Link: http://www.sysinternals.com/Files/Autoruns.zip
V8.11 version download page: http://www.skycn.com/soft/17567.html
QUOTE:
Startuplist 1.52.1
Description: Foreign
Virus Name: Worm.Pabug.ck
Size: 38,132 bytes
md5:2391109c40ccb0f982b86af86cfbc900
Adding Shell way: FSG2.0
Written Language: Delphi
How to spread: through mobile media or Web page malicious script propagation
Through the virtual machine operation, and after the Shell OD analysis, its behavior is as follows:
File creation:
%systemroot%\system32\gfosdg.exe
%systemroot%\system32\gfosdg.dll
%systemroot%\system32\severe.exe
%systemroot%\system32\drivers
Where is a bear cat burning incense?????Not a panda in incense, but all the EXE icon pocket into a burning 3 fragrant little panda, the icon is very cutePay in a manual way:Panda Variety Spoclsv.exe SolutionVirus name: WORM.WIN32.DELF.BF (Kaspersky)Virus alias: WORM.NIMAYA.D (Rising)win32.trojan.qqrobber.nw.22835 (Poison PA)Virus size: 22,886 bytesAdding Shell way: upackSample md5:9749216a37d57cf4b2e528c027
After you select the "show hidden files" option, you will find that a file on the USB flash drive disappears immediately. When you enable the folder option, the "hidden file not displayed" option is still found. Another window will be opened when you click drive letter icons such as C and D!
Condition description
1. Hidden Files cannot be displayed;
2. When you click drive letter icons such as C and D, another window is opened;
3rd, when using winrar.exe, we found that the CIDR root directory co
Trojan Horse is a remote control of the virus program, the program has a strong concealment and harm, it can be unnoticed in the state of control you or monitor you. Some people say, since the Trojan is so powerful, then I can not be far away from it!
However, this trojan is really "naughty", it can be no matter whether you welcome, as long as it is happy, it will try to get into your "home"! Ah, that also got, hurry to see their own computer there i
Trojan Horse brute force removal to remove the following files:
Quote:
C:\WINDOWS\system\1sass.exe
C:\WINDOWS\System32\DRIVERS\2pwsdor.sys
C:\WINDOWS\system32\drivers\k87wovjoq.sys
C:\WINDOWS\system32\xswfgklsjnspp.dll
and use Sreng to remove the corresponding service items and drivers, as follows:
----------------------------------
Start Project-> service-> Win32 Service Application-> Select Hide Microsoft Services and delete the following name:
Quote:
[Rising Protected Storage/ris
Jiangmin the definition of the virus is named: TROJANSPY.AGENT.RW
Releasing files
%system%\drivers\svchost.exe
%system%\drivers\msnet.sys
%system%\jet300.dll
Add registry information
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services]
Msnet%system%\drivers\msnet.sys
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services]
Svchost%system%\drivers\svchost.exe
Main Features
Jet300.dll inserted into the sys
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.