Replace the Ctfmon.exe download Window.exe method _ virus killing

Source: Internet
Author: User
Virus Description:
This virus uses the method that replaces input method to enter a program to disguise oneself, thus can use the original Ctfmon start a project to start oneself, and carry on downloading Trojan horse and infect HTM file operation

File:window.exe

size:19380 bytes

Modified:2007 year October 19, 17:42:28

md5:bdaa1ab926518c7d3c05b730c8b5872c

sha1:bf4c82aa7f169ff37f436b78bbe9aa7fd652118a

crc32:bec77526

1. After the virus runs, the following files are generated:

%systemroot%\system32\ctfmon.exe.tmp


End Ctfmon.exe process, then start

%systemroot%\system32\ctfmon.exe.tmp


2. Modify the Registration Form

At HKLM\SYSTEM\CurrentControlSet\Control\Session Manager

The following pendingfilerenameoperations add the key value so that after the reboot the Ctfmon.exe.tmp

Rename to Ctfmon.exe

  

  

3. Traverse the non-system partition below

php,jsp,asp,htm,html file, after which code is added

4. Through the netsh firewall add allowedprogram%systemroot%\system32\ctfmon.exe command

Add%systemroot%\system32\ctfmon.exe to the Allow list in the firewall

5. Try to connect other users ' computers in the local area network with the following password

901100
Mypass123
Mypass
Admin123
Mypc123
MyPC
Love
Pw123
Login
Login
Owner
Home
Zxcv
Yxcv
Qwer
Asdf
Temp123
Temp
Test123
Test
Fuck
Fuckyou
Root
Ator
Administrator
Patrick
123abc
1234qwer
123123
121212
111111
Alpha
2600
2003
2002
Enable
Godblessyou
Ihavenopass
123asd
Super
Computer
Server
123qwe
Sybase
abc123
Abcd
Database
passwd
Pass
88888888
11111111
000000
54321
654321
123456789
1234567
qq520
5201314
Admin
12345
12345678
Mein
Letmein
2112
Baseball
Qwerty
7777
5150
Fish
1313
Shadow
1111
Mustang
Pussy
Golf
123456
Harley
6969
Password
1234


6. Connect the network download Trojan Horse

Download Http://60.190.*/elf_listo.txt to%systemroot%\system32 below

Inside is a trojan download list

Download Http://60.190.*/win1.exe~http://60.190.*/win20.exe to C-packing directory below

Download Trojan Horse theft, you can steal the following game account password (not limited to)

Miracle World
Warcraft
Qq
Tian Long Eight Department
Asked
The legendary world ...

One of the legendary World Trojans also has the following words

After the Trojan is implanted, the Sreng log is as follows:

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.