最新的三个变种传播方式没什么变化,邮件、漏洞仍是其主要传播方式,安装MS04-011、MS03-026补丁仍是广大用户需要注意的。下面对三个变种作一下简单的介绍:
Mytob.aa,大小不等,FSG加壳。病毒运行后,会释放TASKGMR.EXE和HELLMSN.EXE,HELLMSN.EXE还会释放三个文件funny_pic.scr、my_photo2005.scr、see_this!!.scr。同时还修改注册表
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
asdasd = "taskgmsr.exe"
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices
asdasd = "taskgmsr.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
asdasd = "taskgmsr.exe"
HKEY_LOCAL_MACHINE\Software\Microsoft\Ole
asdasd = "taskgmsr.exe"
HKEY_LOCAL_MACHINE\System\ControlSet001\Control\Lsa
asdasd = "taskgmsr.exe"
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa
asdasd = "taskgmsr.exe"
HKEY_CURRENT_USER\Software\Microsoft\Ole
asdasd = "taskgmsr.exe"
HKEY_CURRENT_USER\System\CurrentControlSet\Control\Lsa
asdasd = "taskgmsr.exe"
蠕虫还会尝试链接irc服务器,进行后门的行为。并且修改hosts文件,阻止用户访问防病毒厂商的主页。
Mytob.ab,大小73,757Bytes,MEW加壳。病毒运行后,会生成COOLBOT.EXE,eminem vs 2pac.scr、funny pic.scr、photo album.scr,同时还释放出一个释放器winsys.exe,该释放器能释放一个取得权限的木马TROJ_ROOTKIT.H。并且修改注册表:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HELLBOT3 = "coolbot.exe"
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices
HELLBOT3 = "coolbot.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
HELLBOT3 = "coolbot.exe"
HKEY_LOCAL_MACHINE\Software\Microsoft\Ole
HELLBOT3 = "coolbot.exe"
HKEY_LOCAL_MACHINE\System\ControlSet001\Control\Lsa
HELLBOT3 = "coolbot.exe"
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa
HELLBOT3 = "coolbot.exe"
HKEY_CURRENT_USER\Software\Microsoft\Ole
HELLBOT3 = "coolbot.exe"
HKEY_CURRENT_USER\System\CurrentControlSet\Control\Lsa
HELLBOT3 = "coolbot.exe"
蠕虫还会尝试链接irc服务器,进行后门的行为。并且修改hosts文件,阻止用户访问防病毒厂商的主页。
Mytob.ac,45,270 Bytes。病毒运行后,会生成RNATHCHK.EXE、my_picture.scr、pic.scr、see_this!.pif。并修改注册表:
HKEY_CURRENT_USER\System\CurrentControlSet\Control\Lsa
RealPlayer Ath Check = "rnathchk.exe"
HKEY_CURRENT_USER\Software\Microsoft\OLE
RealPlayer Ath Check = "rnathchk.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
RealPlayer Ath Check = "rnathchk.exe"
HKEY_LOCAL_MACHINE\Software\Microsoft\Ole
RealPlayer Ath Check = "rnathchk.exe"
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices
RealPlayer Ath Check = "rnathchk.exe"
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
RealPlayer Ath Check = "rnathchk.exe"
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa
RealPlayer Ath Check = "rnathchk.exe"