Jiang min reminds you today that in today's Virus, the Virus. Autorun. dr "U disk parasite" variants dr and TrojanDownloader. VB. rg "video baby" variants rg are worth noting.
Virus name: Virus. Autorun. dr
Chinese name: "U disk parasite" variant dr (also known as "Web page receiver ")
Virus length: 62512 bytes
Virus Type: Trojan
Hazard level:★★★
Affected Platforms: Win 9X/ME/NT/2000/XP/2003
Virus. Autorun. dr The "U disk parasite" variant dr is the latest variant of the "U disk parasite" family, also known as "Web page receiver", written using the Delphi tool. Create a virus route crsss.exe after the U-disk parasitic insects change to DRDs. Modify the Registry to enable automatic startup of Trojans. Search hard disk with the extension *. htm ,*. html ,*. asp ,*. aspx ,*. php ,*. jsp web script file, insert malicious URL Connection to it, the use of MS06-014, MS06-046, MS07-017 and other system vulnerabilities to download and execute a large number of vicious online game Trojan, steal the game player account and password, it brings huge losses to players. The dr variant of "USB flash drive parasite" forcibly modifies the IE homepage and sets the homepage as a fake Microsoft website ghost. Damage the key value of the registry of the operating system, so that the system cannot display hidden files. In addition, the dr variant of the "USB flash drive parasite" will also spread through mobile storage devices such as USB flash drives and MP3. When you double-click the USB flash drive, the virus will be activated to infect the system.
Virus name: TrojanDownloader. VB. rg
Chinese name: "video baby" variant rg
Virus length: 15872 bytes
Virus Type: Trojan download
Hazard level:★
Affected Platforms: Win 9X/ME/NT/2000/XP/2003
TrojanDownloader. VB. rg the "video baby" variant rg is one of the latest members of the "video baby" Trojan downloader family. It is written in VB 6.0 and shelled. After the "video baby" variant rg runs, it connects to the server specified by the hacker in the background of the infected computer, downloads malicious program components, and automatically calls and runs on the infected computer. Modify the Registry to enable automatic startup of Trojans. The downloaded malicious program may be a backdoor or an online game Trojan, reducing the security of infected computers. Meanwhile, hackers may also steal the private information of users infected with computers, threats to user privacy.
[Content navigation] |
Page 1st: Pay attention to the use of system vulnerabilities to download virus Trojans |
Page 2nd: Pay attention to the use of system vulnerabilities to download virus Trojans |