瑞星卡卡安全论坛技术交流区反病毒/反流氓软件论坛 提供4个病毒!特别提醒:没有大人的指导下,小孩请勿试。(已修改)【求助】

12   2  /  2  页   跳转

提供4个病毒!特别提醒:没有大人的指导下,小孩请勿试。(已修改)【求助】

病毒指向 : W32.Rbot.mx蠕虫病毒
用rising最新病毒数据库无法 查;杀.
要用最新的诺顿Symantec AntiVirus 10.0管用.
gototop
 

第一个包:Backdoor.Win32.Vanbot.bf
第三个包:Backdoor.Win32.Vanbot.ay
第二个包和第四个包目前未发现异常。(-.-!)
Backdoor.Win32.Vanbot.bf
Backdoor.Win32.Vanbot.ay
均属于同一类。
Name :  Rizo
Alias(别名): W32/IRCBot.XO, Backdoor.Win32.Rizo.c, Backdoor.Win32.VanBot.ad, Backdoor.Win32.Rbot.bmj
Type: Backdoor, Network Worm
Category: Trojan
Platform: Win32
Date of Discovery: October 18, 2006
Summary 
Rizo is a family of IRC bot-based backdoors with network worm capabilities. Rizo can spread itself to remote computers with the help of an exploit. Unlike many other exploits that download a copy of malware from an already infected computer, Rizo's exploit downloads and runs a file from a website. Every time this website is accessed, a repacked variant is offered for download.
Disinfection 

Disinfection of Network Worms

A network worm uses local network (LAN) to spread itsself, so to stop its spreading it is advised to temporarily take down a network until all workstations and servers are disinfected. A single infected workstation can re-infect already cleaned computers and ruin all previous disinfection attempts. However if F-Secure Anti-Virus version 5.40 or a later version is installed on computers connected to a local network, it is recommended to set disinfection action of the On-Access Scanner (OAS) to 'Disinfect Automatically'. Such action will allow to protect already cleaned workstations connected to an infected network from further re-infection by a network worm.
Detailed Description 
Rizo is a backdoor-worm that spreads within local networks and via the Internet. When it arrives on an infected computer it copies itself to the Windows System folder with the name of winlogin32.exe and creates several startup strings in the Registry:


[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
cpanel=%winsysdir%\winlogin32.exe

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
cpanel=%winsysdir%\winlogin32.exe


Being active, the backdoor connects to the following IRC servers:


ircc.debelizombi.com
xv21.debelizombi.com


Then the malware joins an IRC channel named #!v21! using the password 'tn10a4' without quotes. The port for connection is 8008.

The Rizo backdoor-worm can do any of the following:


Download and run files
Scan for vulnerable computers and spread to them
List and terminate processes
Join and part IRC channels, change nicks, change server
Send current IP address to a hacker
Report bot uptime to a hacker
Create remote command shell
Delete files
'Call home' by accessing the dl1.debelizombi.com website

The URL above can be also used to upgrade the copy of the backdoor. At the moment the page contains only the text string 'EMPTY'.


The exploit in the backdoor's body is partially encrypted. When sent over to a target computer, the exploit decrypts itself (simple XOR 0x99 operation), resolves several APIs, downloads a file to the Windows System folder from the dl1.debelizombi.com website and runs it. The name of the downloaded file is a.exe.





gototop
 

这种病毒非常少见的,你怎么会遇上呢?╭∩╮(︶︿︶)╭∩╮
gototop
 

真的就被我遇到了,而且不是一个,是一大群,
主机感染了N台 ,局域网内的2000机器了大部分被感染了.

情况非常严重,
gototop
 

我可以肯定的是第四个包也是同一类.,应该是最新的变种,因为我到目前为止,只在两台上有看到.
gototop
 

都查不多搞定了,又可以闲下来了.

提醒各位,这个病毒要发现的早,发现的越早越好搞定.
gototop
 

没装虚拟机,还是压缩个PM版主吧!
gototop
 

玩病毒,有趣。
gototop
 
12   2  /  2  页   跳转
页面顶部
Powered by Discuz!NT