病毒名称:
Worm.Multex.b
类别: 蠕虫
病毒资料:
破坏方法:
该病毒采用UPX压缩,是一个通过P2P和 微软“震荡波”漏洞传播的蠕虫病毒。
该病毒流程如下:
1.复制自己到系统目录:
%SYSDIR%\ieXP1orer.exe
2.修改下列注册表键值以求随系统自启动:
HKEY_LOCAL_MACHINE\Software\Microsoft Windows\CurrentVersion\Run
"iestart"="%SYSDIR%\iexp1orer.exe"
3.病毒将复制自己到P2P软件“Kazaa”的共享目录下,可能文件名如下:
"WinAMP5.exe"
"icq2004-final.exe"
"nicegirlsshowv12.scr"
"matrix.scr"
"tropicallagoonss.scr"
"eroticgirls2.0.exe"
"winamp6.exe"
"opera7.7.exe"
"childporno.pif"
"crazzygirls.scr"
"opera7.x crack.exe"
"dvdplayer.exe"
"dap53.exe"
"trillian 2.0 crack.exe"
"kmd.exe"
"icqlite.exe"
"WinZip 9.0.exe"
"iMeshV4.exe"
"icqpro2003b.exe"
"zlsSetup_45_538_001.exe"
"Morpheus.exe"
"LimeWireWin.exe"
"wrar330.exe"
"trillian-v2.74h.exe"
"dap71.exe"
"WinZip 9.0 crack.exe"
"wrar330 crack.exe"
"icqpro2003b crack.exe"
"iMeshV4 crack.exe"
"dap53 crack.exe"
4.病毒也将建立一个FTP服务器
5.病毒将通过TCP 445端口连接随机产生的IP地址,如果成功,病毒将利用“震荡波”漏洞攻击此IP,成功后将在此IP上运行一个 shell ,绑定随机的TCP 端口,同时将回连本地感染机器建立的FTP服务器 ,成功后将从本机下载病毒执行
6.病毒将向所有ICQ联系人发送诱惑性的消息,消息如下,OICQ,MSN 等:
fun game http://www.***.com/ajr/game.exe =)
funy game http://www.***.com/ajr/game.exe =))
i now play in game http://www.***.com/ajr/game.exe
:-):-)
my photos (archived) http://www.***.***.it/claroline142/photo.exe
whoah! check this out! (self-extracting archive) http://***.***.***/icon/icon.exe
funny flash-game :)) http://***.***.***/game.exe
http://www.***/claroline142/photo.exe lol =))
it's all about you http://***.***.***/game.exe :)
http://www.***.it/claroline142/photo.exe i cried
:-D
http://***/icon/icon.exe funny :D
该链接下载的文件是病毒“Mydoom”
病毒的清除法:
使用光华反病毒软件,彻底删除。
病毒演示:
病毒FAQ:
Windows下的PE病毒。
发现日期:
2004-10-9