Worm.NetSky.h
2008-02-23 09:26:13来源:互联网 阅读 ()
蠕虫病毒,VC 编写,采用PE-PACK加壳,病毒长度为22528字节。文件标图像文件夹。
从C到Z驱动器中所有.eml、.txt等21种扩展名的文件中搜取email地址,并创建大量线程发送病毒邮件。病毒体内有如下字符串:
"Skynet AntiVirus - MyDoom and Bagle are children"
一旦执行,病毒将执行以下操作:
1.本地首先将创建一个名为:"MI[SkyNet.cz]SystemsMutex"的互斥量来保证只运行病毒的一个副本;
2.复制自己到windows目录下:
%WINDIR%\maja.exe
3.添加如下键值:
"antivirus" = "%WINDIR%\maja.exe -antivirus service"
到注册表键:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 下,这是病毒自启动的伎俩;
4.病毒将删除下列注册表键值<大都是其它病毒建立的键值>:
删除键:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
下的如下键值:
"Taskmon"
"EXPlorer"
"system."
"msgsvr32"
"DELETE ME"
"service"
"Sentry"
"Windows Services Host"
删除键:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
下的如下键值:
"system."
删除键:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
下的如下键值:
"Taskmon"
"Explorer"
"d3dupdate.exe"
"au.exe"
"OLE"
"Windows Services Host"
"gouday.exe"
"rate.exe"
"sysmon.exe"
"srate.exe"
"ssate.exe"
删除键:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\PINF
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\WksPatch
删除子键:
HKEY_CLASSES_ROOT\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InProcServer32
注: 这是病毒"SCO炸弹"建立的键值
5.病毒从带有下列扩展名的文件中搜索Email地址:
".eml"
".txt"
".PHP"
".pl"
".htm"
".Html"
".vbs"
".rtf"
".uin"
".ASP"
".wab"
".doc"
".adb"
".tbb"
".dbx"
".sht"
".oft"
".msg"
".shtm"
".cgi"
".dhtm"
6.病毒使用自带的SMTP引擎向上面搜到的Email地址发送带毒邮件:
邮件带有如下特征:
标题为下列之一:
"Re: Your briefing"
"Re: Your picture"
"Re: Your loveletter"
"Re: Your TAN"
"Re: Your PIN"
"Re: Your bill"
"Re: Your details"
"Re: My details"
"Re: Zipped folder"
"Re: Secound Part"
"Re: Part 3"
"Re: Part 2"
"Re: Your application"
"Re: Your data"
"Re: Index"
"Re: Appending"
"Re: Hello"
"Re: Hi"
"Re: Your encrypted file"
"Re: Your folder"
"Re: Your file"
"Re: Yours"
"Re: Here the file"
"Re: Approved"
"Re: Document"
"Re: Samples"
消息正文为下列之一:
"Your document is attached."
"Here is the file."
"See the attached file for details."
"Please have a look at the attached file."
"Please read the attached file."
"Your file is attached."
附件名为下列之一:
"your_document.scr"
"document.scr"
"message_part2.scr"
"your_document.scr"
"document_full.scr"
"your_picture.pif"
"message_details.scr"
"your_file.scr"
"your_picture.scr"
"document_4351.scr"
"yours.scr"
"mp3music.scr"
"application.scr"
"all_document.scr"
"my_details.scr"
"document_Excel.scr"
"document_Word.scr"
"my_details.scr"
"your_details.scr"
"your_bill.scr"
"your_pin_88.scr"
"your_tan_33.scr"
"your_letter.scr"
"your_pic.scr"
"your_briefing.scr"
该病毒不会向包含下列字符的地址发送邮件:
"icrosoft"
"antivi"
"ymantec"
"spam"
"avp"
"f-secur"
"itdefender"
"orman"
"cafee"
"aspersky"
"f-pro"
"orton"
"fbi"
"abuse"
"messagelabs"
标签:
版权申明:本站文章部分自网络,如有侵权,请联系:west999com@outlook.com
特别注意:本站所有转载文章言论不代表本站观点,本站所提供的摄影照片,插画,设计作品,如需使用,请与原作者联系,版权归原作者所有
IDC资讯: 主机资讯 注册资讯 托管资讯 vps资讯 网站建设
网站运营: 建站经验 策划盈利 搜索优化 网站推广 免费资源
网络编程: Asp.Net编程 Asp编程 Php编程 Xml编程 Access Mssql Mysql 其它
服务器技术: Web服务器 Ftp服务器 Mail服务器 Dns服务器 安全防护
软件技巧: 其它软件 Word Excel Powerpoint Ghost Vista QQ空间 QQ FlashGet 迅雷
网页制作: FrontPages Dreamweaver Javascript css photoshop fireworks Flash