Worm.Mydoom.q

王朝百科·作者佚名  2009-12-26  
宽屏版  字体: |||超大  

病毒别名:I-Worm.Mydoom.q[AVP]

处理时间:

威胁级别:★★★

中文名称:

病毒类型:蠕虫

影响系统:Win9x/WinNT/Win2K/WinXP/Win2003

病毒行为:

蠕虫

编写工具:UPX加壳

传染条件:网络传播。

发作条件:

系统修改:

a、将自身复制到:

%Windows%

asor32a.dll

%System%winpsd.exe

b、在注册表主键:

HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun

添加如下键值:

"winpsd" = "%System%winpsd.exe"

C、在注册表主键:

HKEY_CURRENT_USERSoftwareMicrosoftInternet Explorer

添加如下键名:

"InstaledFlashhMX""="1"

如果该键名已存在,表示计算机已经感染,病毒不会再运行。

D、创建互斥量:43jfds93872

E、从

http://www.ricolour.com/ispy.1.jpg

http://www.ricolour.com/coco3.jpg

http://www.ricolour.com/guestbook/temp/temp587.gif

http://zenandjce.com/guestbook/temp/temp728.gif

下载后门程序winvpn32.exe(Win32.Hack.Surila.g)并运行该后门。

发作现象:

通过以下注册表键值函获得,SMTP地址

HKEY_CURRENT_USERSoftwareMicrosoftInternet Account ManagerAccounts

"SMTP Email Address"

HKEY_CURRENT_USERSoftwareMicrosoftOfficeOutlookOMI Account ManagerAccounts

"SMTP Email Address"

在如下后缀名文件中搜索邮件地址

.htm

.sht

.php

.asp

.dbx

.tbb

.adb

.wab

.pl

如果搜索的邮件地址含有以下字符

"syma"

"icrosof"

"msn."

"hotmail"

"panda"

"sopho"

"borlan"

"inpris"

"example"

"mydomai"

"nodomai"

"ruslis"

".gov"

"gov."

".mil"

"foo."

"unix"

"math"

"bsd"

"mit.e"

"gnu"

"fsf."

"ibm.com"

"google"

"kernel"

"linux"

"fido"

"usenet"

"iana"

"ietf"

"rfc-ed"

"sendmail"

"arin."

"ripe."

"isi.e"

"isc.o"

"secur"

"acketst"

"pgp"

"tanford.e"

"utgers.ed"

"mozilla"

"icrosoft"

"support"

"ntivi"

"unix"

"bsd"

"linux"

"listserv"

"certific"

"google"

"accoun"

"abuse"

"upport"

"www"

则不发送给该地址

邮件发信人,为如下之一:

"alex"

"michael"

"james"

"mike"

"kevin"

"david"

"george"

"sam"

"andrew"

"jose"

"leo"

"maria"

"jim"

"brian"

"serg"

"mary"

"ray"

"tom"

"peter"

"robert"

"bob"

"jane"

"joe"

"dan"

"dave"

"matt"

"steve"

"smith"

"stan"

"bill"

"bob"

"jack"

"fred"

"ted"

"adam"

"brent"

"alice"

"anna"

"brenda"

"claudia"

"debby"

"helen"

"jerry"

"jimmy"

"julie"

"linda"

"sandra"

发件域名为如下之一:

t-online.de

mail.com

yahoo.com

hotmail.com

从HKEY_CURRENT_USERSoftwareMicrosoftInternet Account Manager读到的域名

邮件主题为: photos

邮件内容为: LOL!;))))

病毒附件名: photos_arc.exe

2004年8月20日21点后自动停止运行

特别说明:

 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
 
© 2005- 王朝百科 版权所有