病毒名称(中文):
病毒别名:
威胁级别:
★☆☆☆☆
病毒类型:
木马程序
病毒长度:
96896
影响系统:
Win9xWinMeWinNTWin2000WinXPWin2003
病毒行为:
该病毒是一个QQ盗号木马。
1、生成的文件
%SystemRoot%\system32\severe.exe
%SystemRoot%\system32\mmlucj.exe
%SystemRoot%\system32\drivers\avipit.exe
%SystemRoot%\system32\drivers\conime.exe
%SystemRoot%\system32\mmlucj.dll
2、添加启动项
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
"mmlucj"="%SystemRoot%\system32\severe.exe"
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
"avipit"="%SystemRoot%\system32\mmlucj.exe"
HKLM\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon
"Shell"="%SystemRoot%\system32\drivers\conime.exe"
3、结束下列进程
PFW.exe,Kav.exe,KVOL.exe,KVFW.exe,adam.exe,qqav.exe,qqkav.exe,TBMon.exe,kav32.exe,kvwsc.exe,CCAPP.exe,KRegEx.exe,kavsvc.exe,VPTray.exe,RAVMON.exe,EGHOST.exe,KavPFW.exe,SHSTAT.exe,RavTask.exe,TrojDie.kxp,Iparmor.exe,MAILMON.exe,MCAGENT.exe,KAVPLUS.exe,RavMonD.exe,Rtvscan.exe,Nvsvc32.exe,KVMonXP.exe,Kvsrvxp.exe,CCenter.exe,KpopMon.exe,RfwMain.exe,KWATCHUI.exe,MCVSESCN.exe,MSKAGENT.exe,kvolself.exe,KVCenter.kxp,kavstart.exe,RAVTIMER.exe,RRfwMain.exe,FireTray.exe,UpdaterUI.exe,KVSrvXp_1.exe,RavService.exe
4、修改注册表使系统总是不显示隐藏文件。
software\microsoft\windows\currentversion\explorer\advanced\folder\hidden\showall
"CheckedValue"="0"
5、该病毒在d,e,f,g,h,i盘生成autorun.inf和OSO.exe作成autorun启动。
--------------------------------
[AutoRun]
open=OSO.exe
shellexecute=OSO.exe
shell\Auto\command=OSO.exe
---------------------------------
6、使用互斥体,使下列进程不能运行
A}cNqqc{[TWQkgdfv7(3=ExeMutex_QQRobber2.0
@ijNqqc{[TWQkgdfv7(3=DllMutex_QQRobber2.0
AntiTrojan3721
ASSISTSHELLMUTEX
SKYNET_PERSONAL_FIREWALL
KingsoftAntivirusScanProgram7Mutex
7、访问下列网址,并会尝试下载@#$#.htm、30w.txt、dqhx1.txt、down.txt、dqhx3.txt等文件。
lqrs>*)tsr(``642*fin=http://***.cd321.com
lqrs>*)tsr(``642*kcw=http://***.cd321.net
lqrs>*)tsr(532?43+eli=http://***.677977.com
lqrs>*)tsr(`ps757+eli=http://***.ctv163.com
lqrs>*)tsr(``642*kcw+66t*q~w=http://***.cd321.net/30w.txt
lqrs>*)tsr(`ps757+eli*ggilh,`jqm*q~w=http://***.cd321.com/admin/down.txt
8、生成并执行hx1.bat处理文件,设置系统时间为2004-1-22。
9、调用sc.exe程序停止相关反病毒软件服务和禁止启动运行
-----------------------------------------
stopKVWSC
configKVWSCstart=disabled
stopKVSrvXP
configKVSrvXPstart=disabled
stopkavsvc
configkavsvcstart=disabled
stopRsCCenter
configRsCCenterstart=disabled
stopRsRavMon
------------------------------------------
10、映像劫持,使得不能使用下列软件
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\MagicSet.exe
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\Rav.exe
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\avp.com
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\avp.exe
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\KRegEx.exe
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\KvDetect.exe
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\KvXP.kxp
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\TrojDie.kxp
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\KVMonXP.kxp
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\IceSword.exe
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\mmsk.exe
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\WoptiClean.exe
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\kabaload.exe
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\360Safe.exe
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\runiep.exe
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\iparmo.exe
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\adam.exe
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\RavMon.exe
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\QQDoctor.exe
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\SREng.EXE
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\Ras.exe
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\msconfig.exe
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\regedit.exe
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\regedit.com
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\msconfig.com
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\PFW.exe
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\PFWLiveUpdate.exe
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\EGHOST.exe
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions\NOD32.exe
"Debugger"="%SystemRoot%\system32\drivers\avipit.exe"
11、修改host文件,屏蔽下列网址
127.0.0.1localhost
127.0.0.1mmsk.cn
127.0.0.1ikaka.com
127.0.0.1safe.qq.com
127.0.0.1360safe.com
127.0.0.1www.mmsk.cn
127.0.0.1www.ikaka.com
127.0.0.1tool.ikaka.com
127.0.0.1www.360safe.com
127.0.0.1zs.kingsoft.com
127.0.0.1forum.ikaka.com
127.0.0.1up.rising.com.cn
127.0.0.1scan.kingsoft.com
127.0.0.1kvup.jiangmin.com
127.0.0.1reg.rising.com.cn
127.0.0.1update.rising.com.cn
127.0.0.1update7.jiangmin.com
127.0.0.1download.rising.com.cn
127.0.0.1dnl-us1.kaspersky-labs.com
127.0.0.1dnl-us2.kaspersky-labs.com
127.0.0.1dnl-us3.kaspersky-labs.com
127.0.0.1dnl-us4.kaspersky-labs.com
127.0.0.1dnl-us5.kaspersky-labs.com
127.0.0.1dnl-us6.kaspersky-labs.com
127.0.0.1dnl-us7.kaspersky-labs.com
127.0.0.1dnl-us8.kaspersky-labs.com
127.0.0.1dnl-us9.kaspersky-labs.com
127.0.0.1dnl-us10.kaspersky-labs.com
127.0.0.1dnl-eu1.kaspersky-labs.com
127.0.0.1dnl-eu2.kaspersky-labs.com
127.0.0.1dnl-eu3.kaspersky-labs.com
127.0.0.1dnl-eu4.kaspersky-labs.com
127.0.0.1dnl-eu5.kaspersky-labs.com
127.0.0.1dnl-eu6.kaspersky-labs.com
127.0.0.1dnl-eu7.kaspersky-labs.com
127.0.0.1dnl-eu8.kaspersky-labs.com
127.0.0.1dnl-eu9.kaspersky-labs.com
127.0.0.1dnl-eu10.kaspersky-labs.com