瑞星卡卡安全论坛技术交流区可疑文件交流 以假换真的ctfmon.exe,采用文件夹图标的 ctfmen.exe

1   1  /  1  页   跳转

以假换真的ctfmon.exe,采用文件夹图标的 ctfmen.exe

以假换真的ctfmon.exe,采用文件夹图标的 ctfmen.exe


 附件: 您所在的用户组无法下载或查看附件


 附件: 您所在的用户组无法下载或查看附件


解压密码:virus

文件说明符 : C:\WINDOWS\system32\ctfmon.exe
属性 : A---
数字签名:否
PE文件:是
获取文件版本信息大小失败!
创建时间 : 2002-10-7 12:0:0
修改时间 : 2008-9-5 15:31:58
大小 : 368640 字节 360.0 KB
MD5 : c338ff709aa7d081514d9a3c4bfe9c58
SHA1: 12E2502A7061278F9684B4212C47C7B3C14C387D
CRC32: 1d6b1689

文件说明符 : C:\Documents and Settings\ctfmen.exe
属性 : A---
数字签名:否
PE文件:是
语言 : 中文(中国)
文件版本 : 1.00
产品版本 : 1.00
产品名称 : download_progress
公司名称 : Cutting Edge Custom Software
内部名称 : mxi22
源文件名 : mxi22.exe
创建时间 : 2008-8-19 17:39:39
修改时间 : 2008-8-20 16:45:28
大小 : 18549 字节 18.117 KB
MD5 : b901943fd5ac10087c0ba9c344398154
SHA1: 63D5587C6E8DF217D9E5C360A957CE2347B36214
CRC32: 003c85ee

件 ctfmon.exe 接收于 2008.09.07 09:11:48 (CET)
反病毒引擎版本最后更新扫描结果
AhnLab-V32008.9.6.02008.09.06-
AntiVir7.8.1.282008.09.05TR/PSW.Online.aklp
Authentium5.1.0.42008.09.06W32/Heuristic-210!Eldorado
Avast4.8.1195.02008.09.06Win32:Agent-ZRP
AVG8.0.0.1612008.09.07PSW.OnlineGames.P
BitDefender7.22008.09.07Generic.Malware.Yd!.4652BC92
CAT-QuickHeal9.502008.09.06TrojanPSW.OnLineGames.es
ClamAV0.93.12008.09.07Trojan.Spy-51273
DrWeb4.44.0.091702008.09.06-
eSafe7.0.17.02008.09.03Suspicious File
eTrust-Vet31.6.60722008.09.05-
Ewido4.02008.09.06-
F-Prot4.4.4.562008.09.06W32/Heuristic-210!Eldorado
F-Secure8.0.14332.02008.09.07Trojan.Win32.KillAV.alu
Fortinet3.112.0.02008.09.07-
GData192008.09.07Trojan.Win32.KillAV.alu
IkarusT3.1.1.34.02008.09.07Trojan-Downloader.Win32.Zlob.and
K7AntiVirus7.10.4432008.09.05-
Kaspersky7.0.0.1252008.09.07Trojan.Win32.KillAV.alu
McAfee53782008.09.05New Malware.aj
Microsoft1.39032008.09.07-
NOD32v234232008.09.06-
Norman5.80.022008.09.05W32/Packed_Upack.A
Panda9.0.0.42008.09.06Suspicious file
PCTools4.4.2.02008.09.06Packed/Upack
Prevx1V22008.09.07-
Rising20.60.61.002008.09.07-
Sophos4.33.02008.09.07Sus/ComPack-K
Sunbelt3.1.1610.12008.09.05VIPRE.Suspicious
Symantec102008.09.07-
TheHacker6.3.0.8.0752008.09.06W32/Behav-Heuristic-060
TrendMicro8.700.0.10042008.09.05PAK_Generic.006
VBA323.12.8.52008.09.06-
ViRobot2008.9.5.13652008.09.06-
VirusBuster4.5.11.02008.09.06Packed/Upack
Webwasher-Gateway6.6.22008.09.05Trojan.PSW.Online.aklp


附加信息
File size: 368640 bytes
MD5...: c338ff709aa7d081514d9a3c4bfe9c58
SHA1..: 12e2502a7061278f9684b4212c47c7b3c14c387d
SHA256: 31ada46585328cbd7b9e0f18f8f53279b63d6cc411b21cc5a7a6ea75cfa34cdc
SHA512: 3809d8ee9d413b68ad6a1466f8a4c3bc5553f91a53437e35df6f1b6aa27c61fe
12aa75a4c587205b9212d25a85174ae1a1a8d7f5be9ceed0767f8a88a9b25a85
PEiD..: -
TrID..: File type identification
DOS Executable Generic (100.0%)
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x401018
timedatestamp.....: 0x4011b0be (Fri Jan 23 23:39:42 2004)
machinetype.......: 0x14c (I386)

( 3 sections )
name viradd virsiz rawdsiz ntrpy md5
PS 0x1000 0x7000 0x1f0 5.12 2d2d52cd874e5b5e9686d72eec201a70
@d@ 0x8000 0x9000 0x178c 7.76 beecfbaf6663351300b445c479b48c0f
Gt@@ 0x11000 0x1000 0x1f0 5.12 2d2d52cd874e5b5e9686d72eec201a70

( 0 imports )

( 0 exports )
packers (Kaspersky): PE_Patch, UPack
packers (Authentium): UPack
packers (F-Prot): UPack



文件 ctfmen.exe 接收于 2008.09.07 09:19:26 (CET)
反病毒引擎版本最后更新扫描结果
AhnLab-V32008.9.6.02008.09.06-
AntiVir7.8.1.282008.09.05TR/Downloader.Gen
Authentium5.1.0.42008.09.06W32/new-malware!Maximus
Avast4.8.1195.02008.09.06-
AVG8.0.0.1612008.09.07-
BitDefender7.22008.09.07Trojan.Downloader.VB.VSV
CAT-QuickHeal9.502008.09.06(Suspicious) - DNAScan
ClamAV0.93.12008.09.07-
DrWeb4.44.0.091702008.09.06-
eSafe7.0.17.02008.09.03Suspicious File
eTrust-Vet31.6.60722008.09.05-
Ewido4.02008.09.06-
F-Prot4.4.4.562008.09.06W32/new-malware!Maximus
F-Secure8.0.14332.02008.09.07Suspicious_F.gen
Fortinet3.112.0.02008.09.07-
GData192008.09.07-
IkarusT3.1.1.34.02008.09.07-
K7AntiVirus7.10.4432008.09.05-
Kaspersky7.0.0.1252008.09.07-
McAfee53782008.09.05-
Microsoft1.39032008.09.07-
NOD32v234232008.09.06probably a variant of Win32/TrojanDownloader.VB.NPP
Norman5.80.022008.09.05W32/Packed/FSG_2.A
Panda9.0.0.42008.09.06Suspicious file
PCTools4.4.2.02008.09.06Packed/FSG
Prevx1V22008.09.07-
Rising20.60.61.002008.09.07-
Sophos4.33.02008.09.07Mal/Emogen-N
Sunbelt3.1.1610.12008.09.05VIPRE.Suspicious
Symantec102008.09.07Downloader
TheHacker6.3.0.8.0752008.09.06-
TrendMicro8.700.0.10042008.09.05PAK_Generic.002
VBA323.12.8.52008.09.06-
ViRobot2008.9.5.13652008.09.06-
VirusBuster4.5.11.02008.09.06Packed/FSG
Webwasher-Gateway6.6.22008.09.05Trojan.Downloader.Gen


附加信息
File size: 18549 bytes
MD5...: b901943fd5ac10087c0ba9c344398154
SHA1..: 63d5587c6e8df217d9e5c360a957ce2347b36214
SHA256: 4aa710e792bf9844e950c31d064c7dfdb2560a4b7f0ed3bd53ca1414005c7dfe
SHA512: fe16dc0cd035d48eeb485391b8cb5ab5c661ec29c5f50aef33ddac4bcd1a71e6
344cc29cf5e82c5f43b1c6314097fe3e887df98479d571e7137327caa1612de2
PEiD..: FSG v2.0 -> bart/xt
TrID..: File type identification
Win32 Executable Generic (67.9%)
Generic Win/DOS Executable (15.9%)
DOS Executable Generic (15.9%)
Targa bitmap (Original TGA Format) (0.0%)
MS Flight Simulator Aircraft Performance Info (0.0%)
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x400154
timedatestamp.....: 0x21475346 (Fri Sep 11 01:35:02 1987)
machinetype.......: 0x14c (I386)

( 2 sections )
name viradd virsiz rawdsiz ntrpy md5
0x1000 0x10000 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e
0x11000 0x5000 0x4675 7.28 f07d091280f400b888cfd94fd2ba22ad

( 1 imports )
> KERNEL32.dll: LoadLibraryA, GetProcAddress

( 0 exports )
packers (Kaspersky): FSG
packers (Authentium): FSG
packers (F-Prot): FSG


用户系统信息:Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; Maxthon)
http://blog.csdn.net/purpleendurer

宠辱不惊,笑看堂前花开花落; 去留无意,漫随天外云卷云舒。
分享到:
gototop
 

回复:以假换真的ctfmon.exe,采用文件夹图标的 ctfmen.exe

我想下一个试试看
gototop
 

回复 1F endurer 的帖子

此毒考验防火墙


 附件: 您所在的用户组无法下载或查看附件

进出tiyn都有问题


 附件: 您所在的用户组无法下载或查看附件

手动灭掉其进程,就彻底踏实了


 附件: 您所在的用户组无法下载或查看附件
最后编辑baohe 最后编辑于 2009-05-20 21:40:20
gototop
 

回复:以假换真的ctfmon.exe,采用文件夹图标的 ctfmen.exe

下载一下杀毒
gototop
 
1   1  /  1  页   跳转
页面顶部
Powered by Discuz!NT