瑞星卡卡安全论坛技术交流区反病毒/反流氓软件论坛 【原创】假冒QQ图标的svhostkeep.exe,svhost.exe病毒

1   1  /  1  页   跳转

【原创】假冒QQ图标的svhostkeep.exe,svhost.exe病毒

【原创】假冒QQ图标的svhostkeep.exe,svhost.exe病毒

图文请参考

http://hi.baidu.com/sreng/blog/item/617c8358438066dc9c8204da.html

在修复过程,还有异常,请发邮件:ufwihgu9168@yahoo.com.cn




File:  qq.rar 
MD5:  97abe0065e045a8c99a7aac81fbdc821 
Rising: Win32.Eirus.b 
卡巴不报病毒
测试时间:2007-08-19
更新时间:




运行后病毒样本,自动删除病毒本身,自动复制副本到%SYSTEM%目录下
%SYSTEMroot%\svhostkeep.exe
%SYSTEMroot%\svhost.exe
x:\Documents and Settings\你的用户名\Local Settings\Temp\E_4\spec.fne
x:\Documents and Settings\你的用户名\Local Settings\Temp\E_4\eapi.fne
x:\Documents and Settings\你的用户名\Local Settings\Temp\E_4\iext2.fne及所创建的文件.
x:\Recycled\krnln.exe
X:\Program Files\QQ\QQ .exe<见图一>



删除桌面上QQ及QQ直播的,
X:\Documents and Settings\MIB\桌面\QQ
X:\Documents and Settings\MIB\桌面\QQlive5.0
并替换在桌面上的QQ快捷方式及QQ目录下的QQ文件.
x:\Documents and Settings\MIB\桌面\腾讯QQ.lnk


中止所有杀毒软件<俺的电脑使用的MACFEE,可惜没有中断掉,关闭了QQ医生,


创建下列IFEO劫持项:
"Debugger"="X:\windows\system32\svhost.exe

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AdPop.Exe]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AdPop.Exe ]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AUTODOWN.EXE]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE ]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVPM.EXE ]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\EGHOST.EXE]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IceSword.exe]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAV32.exe]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVPFW.EXE]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavscr.exe]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVsvc.exe]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVSvcUI.exe]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KMailMon.EXE ]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPFW32.EXE]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPFWSvc.EXE]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVFW.EXE g']
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVSrvXP.exe]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVwsc.exe]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvXP.kxp]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatch.EXE]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MAILMON.EXE]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Navapsvc.exe]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navw32.EXE]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NMain.exe]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pfw.exe]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQDoctor.exe]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMon.exe]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAVmonD.exe]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ravtimer.exe]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rising.exe]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RTHDCPL.EXE]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\srtask.exe]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TBSCAN.EXE]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TCA.EXE]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\THGUARD.EXE]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojanHunter.exe]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WEBSCANX.EXE]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wmiprvse.exe]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WoptiProcess.exe]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\修复工具.exe]

附SRENG日志:
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
    <Userinit><C:\windows\system32\C:\Recycled\krnln.exe,userinit.exe,svhost.exe>[(Verified)Microsoft Corporation]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AdPop.Exe]
    <IFEO[AdPop.Exe]><svhost.exe>  []
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AdPop.Exe ]
    <IFEO[AdPop.Exe ]><mmsb.exe>  [N/A]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AUTODOWN.EXE]
    <IFEO[AUTODOWN.EXE]><svhost.exe>  []
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE ]
    <IFEO[AVP.EXE ]><svhost.exe>  []

HOSTS 文件
127.0.0.1 www.360safe.com
127.0.0.1 360safe.com
127.0.0.1 www.skycn.com/soft/3252.html
127.0.0.1 skycn.com/soft/3252.html
127.0.0.1 www.skycn.com/soft/24158.html
127.0.0.1 skycn.com/soft/24158.html
127.0.0.1 mmsk.cn
127.0.0.1 www.mmsk.cn
127.0.0.1 www.luosoft.com/index1.htm
127.0.0.1 www.luosoft.com/index2.htm
127.0.0.1 www.luosoft.com/index3.htm
127.0.0.1 luosoft.com/index3.htm
127.0.0.1 www.luosoft.com
127.0.0.1 luosoft.com
127.0.0.1 safe.qq.com/product
127.0.0.1 safe.qq.com
127.0.0.1 www.safe.qq.com/product
127.0.0.1 www.safe.qq.com
127.0.0.1 www.onlinedown.net/soft/37369.htm


解决方法:

1.把IceSword.exe更改文件名为:ceSword.exe,双击运行后.

文件---设置---禁止进线性创建,结束病毒进程:svhost.exe

2.直接使用ceSword.exe删除病毒文件
%SYSTEMroot%\svhostkeep.exe
%SYSTEMroot%\svhost.exe


嘻嘻!在这里没有把autoruns劫持,取消禁止进线性创建后,直接运行autoruns<见图>,一步一步删除也行,想偷懒可以使用其它工具来修复.

3.运行SREng2,使用“启动项目”--注册表--选择要修改的项
<Userinit><C:\windows\system32\C:\Recycled\krnln.exe,userinit.exe,svhost.exe>
,点“编辑”在“值”里删除C:\Recycled\krnln.exe,svhost.exe>

4.重置HOSTS文件.

5.运行SREng2,使用:系统修复--文件关联--全选--修复

6.卸载掉QQ.同时删除QQ文件夹.重新安装一次.

7.x:\Documents and Settings\你的用户名\Local Settings\Temp\E_4\删除文件夹.

[用户系统信息]Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
最后编辑2007-08-20 00:29:14.937000000
分享到:
gototop
 

本文中工具下载:

http://free5.ys168.com/?ufwihgu168


如有错误,请指出,谢谢
gototop
 
1   1  /  1  页   跳转
页面顶部
Powered by Discuz!NT