Proxy Trojan and SQL Phantom variant

Source: Internet
Author: User
Tags md5 microsoft sql server

Jiangmin 9.21 Virus Broadcast

English Name: TrojanDropper.Agent.aaxa

Chinese name: "Agent Trojan" variant Aaxa

Virus Length: 23552 bytes

Virus type: Trojan Horse releasing device

Hazard Level: ★★★

Impact Platform: Win 9x/me/nt/2000/xp/2003

MD5 Check: 35db985e312f22cc6ead0a4a5f2d0a2d

Feature Description:

TrojanDropper.Agent.aaxa "Agent Trojan" variant Aaxa is "proxy Trojan Horse" Trojan release family of one of the newest members, using "Microsoft Visual C + + 6.0" written, and after the shell protection processing. "Agent Trojan" variant Aaxa after running, will self copy to the infected computer system under the "%SystemRoot%\System32 \dllcache\" folder, renamed to "Systembox.bak." Releases the shell-protected malicious DLL component "*.dll" under the%systemroot%\system32\ folder (the file name is obtained sequentially from the Netsvcs service group, typically starting with "6to4"), and copies it to the%systemroot%\ System32\dllcache\ folder. In addition, the malicious driver "Wmisvc.sys" is released under the "%SystemRoot%\System32 \drivers\" folder to end the self-protection of all types of security software. End the process of a large number of security software, while using the registry image file hijacking function, interfering with the normal operation of these security software. "Agent Trojan" variant Aaxa released DLL files in the run, will download other types of Trojans or connection to the designated hanging horse page, thereby causing different degrees of loss to users. "Agent Trojan" variant Aaxa can also be propagated through mobile storage devices and network Places, and it will replicate itself as "[Disk character]:\recycle. {645ff040-5081-101b-9f08-00aa002f954e}\ghost.exe "and generate" Autorun.inf "files to activate the self using the system's AutoPlay feature. Connect to a network place with a weak password by using its own password table, and once the connection succeeds, it replicates itself to the "c:\" of the computer, renames "Bootfont.exe", and activates it using the Scheduled Tasks feature. In addition, the "Agent Trojan" variant Aaxa will have a partial extension of ". exe", ". asp", ". htm", ". html", ". aspx" and ". RAR file is infected, causing more risk to the user. "Agent Trojan" variant Aaxa will be registered as a system service in the infected computer, so as to achieve the power-on self-starter.

English Name: EXPLOIT.SQLSHELL.O

Chinese name: "SQL Phantom" variant O

Virus Length: 227328 bytes

Virus type: Vulnerability virus

Hazard Level: ★

Impact Platform: Win 9x/me/nt/2000/xp/2003

MD5 Check: 750e784163ea09d7889b4e1110b985e2

Feature Description:

EXPLOIT.SQLSHELL.O "SQL Phantom" Variant O is one of the newest members of the "SQL Phantom" vulnerability Virus family, written in a high-level language, and is a DLL-functional component released by other malicious programs, protected by Shell. The "SQL Phantom" variant o Runtime releases the shell-protected malicious DLL component "Dwinter.dll" and "Dwintel.dll" in the "%systemroot%\system32\" directory of the infected system. The SQL Phantom variant o attacks a known vulnerability in Microsoft SQL Server 2003 or other versions, searches for database services that exist within the current network segment, and connects to a database service that uses a weak password and is logged in in mixed authentication mode. The hacker sends a specific query to make the previously released DLL file invoked, and once the call succeeds, "SQL Phantom" variant o may download other malicious programs via FTP, or execute arbitrary code on the server, causing varying degrees of damage to users of the infected system.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.