Use Excel to destroy DLL Trojans

Source: Internet
Author: User
DLL Trojans are evil by Using DLL files. New processes are not displayed in the Process List during Trojan running, and many DLL Trojans are inserted into key processes of the system (which cannot be terminated ), anti-Virus Software
It cannot be detected, which poses a great threat to system security. If you do not have a horse-killing weapon at hand, you can copy the Office Excel files. Next let's take a look at how we use
Exceldeploy this trojan that is inserted into the lsass.exe process!

Step 1: Search for infected Processes

Recently, after I started online for a while, I felt that the network speed was extremely slow, so I ran "netstat-a-n ".
-O "View open ports and connections. The connection initiated by the process PID 580 is extremely suspicious: The status is established, indicating that two machines are communicating (see figure 1 ). Manage tasks
This process is explained by lsass.exe. lsass.exe is a security mechanism for Microsoft Windows systems and is used for local security and login policies. Obviously
This process does not require open ports and external connections. Therefore, it is determined that the process is likely to insert a DLL Trojan. If the Wrangler is not currently connected, you can use the port status to determine whether the request is successful, as shown in figure
Time_wait means that the connection has ended, indicating that the port has been accessed, but the access has ended, indicating that hackers have intruded into the local machine. Listening indicates that the listener is in the pending status.
However, only the TCP Service port can be in the listening status.

TIPS: the premise for judging whether the attack is successful is to identify the infected process. By the type of the inserted process, the DLL Trojan can be roughly divided:
1. Plug-in for example, notepad.exepolicipolicer.exe (this trojan is easy to judge and will not start anyProgram, Open the task manager. If you find the above process, you can determine the target ).
Listener will not open the port connection ).

3.for the open end process like alg.exew.svchost.exe on the plug-in, the connection status, connection IP address, and DLL call should be used to make a comprehensive judgment.

Step 2: track Trojans

Knowing the process of inserting the DLL Trojan, we can compare the DLL module called by the process.

1. Run the "tasklist/M/FO list" command prompt on other normal computers.
> G: \ dll1.txtexport: After all the preceding DLL files are output in the form of logs, open dll.txtand copy the DLL file list loaded by lsass.exe (see figure 2 ).

2..open exceland copy the DLL file loaded by lsass.exe on the normal computer and CMB to column A and column B. Because Excel has a serial number, you can easily find two
The number of DLL files loaded by lsass.exe is different (64 and 68 ). Set the font of Column B to red, cut column B content, paste it to column A, and click "Data/sort" in Excel
After the data is re-sorted, the trojan files are in the continuous red DLL files, which are mswsock. dll, psapi. dll, wshtcpip. dll,
Share. dll (see figure 3 ).

TIPS:

If you cannot determine which process is inserted with a Trojan, You can first output all DLL files, then sort the files in Excel and compare them with normal DLL files, and find the newly added DLL files one by one for troubleshooting.

Step 3: delete the trojan file

From the above, we can see that the DLL Trojan is in the four more files above, and now we can find these files through the search function (the DLL files are mostly in the system directory, and the search scope can be limited here ), and view attributes
Finally, find c: \ windows \ system32 \ share. dll. Now, in safe mode, delete share. dll, and find it based on its creation time and size.
To the trojan and delete it. Generally, Microsoft system DLL files have version labels, and most of the files have the same date. You can use these attributes to determine.

TIPS: You can directly Delete the DLL Trojan after the process is terminated.

Step 4: Back up data to prevent potential problems

It is difficult to judge. Therefore, we usually
Use the tasklist command to back up the DLL files of common system processes. In this way, you can restart and close any irrelevant programs when you suspect that you want to do so, and then quickly find the trojan in Excel sorting.
Fierce!

Note: The system has multiple svchost.exe processes, but their process PID is different and must be backed up separately.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.