病毒名称:
Worm.BBeagle.k
类别: 蠕虫
病毒资料:
破坏方法:
病毒:"恶鹰"变种
一个蠕虫病毒
病毒形为:
该病毒将检测系统时间,当前时间大于2005年4月25号之后时病毒册除自己在注册表里加的启动项。并退出(什么事也不做)
病毒将自己复制到%system%目录下。文件名为:winsys.exe
并在注册表HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
中加入自己的键值ssate.exe
病毒将建立几个线程分别执行病毒功能:
病毒线程1:
病毒搜索所有硬盘,并尝试在以下扩展名文件中搜索email地址并向这些地址发送带毒邮件。病毒搜索email地址的文件扩展名:
wab,txt,msg,htm,XML,dbx,mdx,eml,nch,mmf,ods,cfg,ASP,PHP
pl,adb,tbb,sht,uin,cgi
当病毒发现搜索的目录名中包含字串“shar”将把自己的复本复制过去文件名为
以下之一:
Microsoft Office 2003 Crack, Working!.exe,Microsoft Office XP working Crack, Keygen.exe
Microsoft Windows XP, WinXP Crack, working Keygen.exe,Porno Screensaver.scr.Porno, sex, oral, anal cool, awesome!!.exe
Porno pics arhive, xxx.exe,Serials.txt.exe.Windown Longhorn Beta Leak.exe,
Windows Sourcecode update.doc.exe
XXX hardcore images.exe,Opera 8 New!.exe.WinAMP 5 Pro Keygen Crack Update.exe,
WinAmp 6 New!.exe
Matrix 3 Revolution English SuBTitles.exe,Adobe Photoshop 9 full.exe,Ahead Nero
7.exe
ACDSee 9.exe
病毒邮件的特征:
包括以下字串。
E-mail account security warning,Notify about using the e-mail account,Warning
about your e-mail account
Important notify about your e-mail account,Email account utilization warning
Notify about your e-mail account utilization,E-mail account disabling warning
Some of our clients complained about the spam (negative e-mail content)
outgoing from your e-mail account. Probably, you have been infected by,a proxy-
relay trojan server.
In order to keep your computer safe,..follow the instrUCtions
For more information see the attached file,Further details can be obtained from
attached file,
Advanced details can be found in attached file,For details see the attach,For
details see the attached file
For further details see the attach..Please, read the attach for further details
Pay attention on attached file.
病毒线程2:(后门)
驻留内存并监听2745端口,当有联接时,根据传来的数据判别是否下载一个文件
到%windows%目录下启动,从特定网站下载文件,自毁等操作。
病毒线程3:
线束一些病毒体内的进程名的进程。
ATUPDATER.EXE,AVWUPD32.EXE,AVPUPD.EXE,LUALL.EXE,DRWEBUPW.EXE,ICssUPPNT.EXE
ICSUPP95.EXE,UPDATE.EXE,NUPGRADE.EXE,ATUPDATER.EXE,AUPDATE.EXE,AUTODOWN.EXE
AUTOTRACE.EXE,AUTOUPDATE.EXE,AVXQUAR.EXE,CFIAUDIT.EXE,MCUPDATE.EXE,
NUPGRADE.EXE
OUTPOST.EXE,AVLTMAIN.EXE
线程4:
尝试联接以下网址:并把一些信息,如端口号2745传上去。
http://***postertog.de/scr.php
http://***www.gfotxt.net/scr.php
http://***www.maiklibis.de/scr.php
病毒的清除法:
使用光华反病毒软件,彻底删除。
病毒演示:
病毒FAQ:
Windows下的PE病毒。
发现日期:
2004-3-4