Worm.Nocana.c

2008-02-23 09:22:18来源:互联网 阅读 ()

新老客户大回馈,云服务器低至5折

病毒名称: Worm.Nocana.c 类别: 蠕虫病毒 病毒资料: 破坏方法:

启动方式:

注册表启动,相关的注册表键值为:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion
\RunServices\KeyValue
"%SYSDIR%\CURFILE"

HKLM\SOFTWARE\Microsoft\Windows
\CurrentVersion\Run\KeyValue
"%SYSDIR%\CURFILE"

HKCU\SOFTWARE\Microsoft\Windows
\CurrentVersion\Run\KeyValue
"%SYSDIR%\CURFILE"

其中KeyValue为不定值

传播方式:

病毒通过P2P文件共享和邮件附件进行传播。

病毒行为:

1.VB写的病毒,能够终止许多诸如avp等反病毒软件

2.病毒通过邮件传染时附带一个附件,邮件的标题一般为:

Out of my heart?
Nelly Furtado!
TIPs: HOW TO DEFACE A WEBSERVER?
What New in The ScreenSaver!
FoxNews Reporter: There are no Solution for SARS?
Get Your Free XXX PassWord!
Gotcha baby!>Crack for Nokia LogoManager 1.3
Help me plz?
Tds2-Nt.exe
News: US Goverment try to make wars with Tehran..
Re: are you married?

(3)Alert! New Variant Anacon.C has been detected!

SHakE yOur BodY bAbE!
Patch for Microsoft Windows XP 64bit
Your FTP Password: iuahdf7d8hfF

Get Free SMTP Server at Click Here!

正文一般为:

Hello dear,I'm gonna missed you babe, hope we can see again!In Love,*Rekcahlem ~<>~ Anacon
i babe, Still missing me! I have send to you a special gift I made it my own.

Just for you. Check it out the attachment.
Your Love,Rekcahlem,reat to see you again babe!
This is file you want las week.
Please don't distribute it to other.
Regard,V.C.Attention!
附件就是病毒。

3.通过p2p传播时会复制自身到以下p2p软件的目录下:

The Matrix Evolution.mpg.exe
The Matrix Reloaded Preview.jpg.exe
Jonny English (JE).avi.exe
DOOM III Demo.exe
WinAMP3.exe
JugdeDread.exe
Microsoft Visual Studio.exe
gangXcop.exe
Upgrade you HandPhone.exe
About SARS Solution.doc.exe
Dont eat pork. SARS in there.jpg.exe
VISE.exe MSVisual C .exe
QuickInstaller.exe
Q111023.exe
jdbgmgr.exe
WindowsXP PowerToys.exe
InternationalDictionary.exe
EAGames.exe
SEX_HOTorCOOL.exe

4.病毒发作时格式化D盘,删除C盘根目录下所有文件

5.病毒会建立一个bat文件将下列目录文件改名:

C:\Inetpub\wwwroot\
D:\Inetpub\wwwroot

index.htm -> ANA_Index.htm
default.htm -> ANA_Default.htm
index.Html -> ANA_Index.html
default.html -> ANA_Default.html
index.ASP -> ANA_Index.asp
default.asp -> ANA_Default.asp

6.病毒还带有一个后门,通过这个后门,病毒可以:

开关光驱,开关剪贴板,记录键盘,显示隐藏TaskBar,关闭CTRL-ALT-DEL,隐藏驱动器,偷取密码,盗ICQ的UIN,盗取系统信息等

病毒的清除法: 使用光华反病毒软件,彻底删除。 病毒演示: 病毒FAQ: Windows下的PE病毒。
发现日期: 2003-6-2

标签:

版权申明:本站文章部分自网络,如有侵权,请联系:west999com@outlook.com
特别注意:本站所有转载文章言论不代表本站观点,本站所提供的摄影照片,插画,设计作品,如需使用,请与原作者联系,版权归原作者所有

上一篇:Worm.Nocana.a

下一篇:Harm.Laorenshen.d.drop1