百度和GOOGLE乱码病毒的VBS专杀

近期出现一种病毒通过ARP攻击劫持用户和正常服务器之间的会话,在其中插入病毒代码。由此造成的后果是,用户正常访问这些网站时,会被引导下载病毒和木马程序,或者被跳转到其它网页。国内已经有部分知名网站受此影响。

傍晚拿到样本,写了个VBS专杀.

把以下代码复制进一个新建的记事本,后缀改为VBS,测试过,成功.最好在断网的环境下运行.

拿了ycosxhack的模版写,我真没效率,看来这种专杀没必要的话不做为好....还是去认真学习了.......

PS.修改好了....调试过了..安全模式下运行就杀干净.


on error resume next
msgbox "本专杀由[G-AVR]Gryesign提供---http://hi.baidu.com/greysign",64,"搜索引擎乱码病毒专杀,请在安全模式下运行"

'-----------------病毒进程结束模块开始-----------------
set w=getobject("winmgmts:")
set p=w.execquery("select * from win32_process where name='fyso.exe'")
for each i in p
i.terminate
next
on error resume next
set w=getobject("winmgmts:")
set p=w.execquery("select * from win32_process where name='jtso.exe'")
for each i in p
i.terminate
next
set w=getobject("winmgmts:")
set p=w.execquery("select * from win32_process where name='mhso.exe'")
for each i in p
i.terminate
next
set w=getobject("winmgmts:")
set p=w.execquery("select * from win32_process where name='qjso.exe'")
for each i in p
i.terminate
next
set w=getobject("winmgmts:")
set p=w.execquery("select * from win32_process where name='wgso.exe'")
for each i in p
i.terminate
next
set w=getobject("winmgmts:")
set p=w.execquery("select * from win32_process where name='wlso.exe'")
for each i in p
i.terminate
next
set w=getobject("winmgmts:")
set p=w.execquery("select * from win32_process where name='wmso.exe'")
for each i in p
i.terminate
next
set w=getobject("winmgmts:")
set p=w.execquery("select * from win32_process where name='woso.exe'")
for each i in p
i.terminate
next
set w=getobject("winmgmts:")
set p=w.execquery("select * from win32_process where name='ztso.exe'")
for each i in p
i.terminate
next

'-----------------病毒进程结束模块终止-----------------



'-----------------病毒文件删除模块开始-----------------

DIM objShell
set objShell=wscript.createObject("wscript.shell")
iReturn=objShell.Run("cmd.exe /C del %temp%\fyso.exe", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C del %temp%\jtso.exe", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C del %temp%\mhso.exe", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C del %temp%\qjso.exe", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C del %temp%\wgso.exe", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C del %temp%\wlso.exe", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C del %temp%\wmso.exe", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C del %temp%\woso.exe", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C del %temp%\ztso.exe", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C del %temp%\fyso0.dll", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C del %temp%\jtso0.dll", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C del %temp%\mhso0.dll", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C del %temp%\qjso0.dll", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C del %temp%\mhso0.dll", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C del %temp%\wgso0.dll", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C del %temp%\wlso0.dll", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C del %temp%\ztso0.dll", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C del %temp%\woso0.dll", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C del %temp%\wmso0.dll", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C attrib -a -s -h -r c:\progra~1\Intern~1\PLUGINS\BinNice.bak", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C attrib -a -s -h -r c:\progra~1\Intern~1\PLUGINS\BinNice.dll", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C del c:\progra~1\Intern~1\PLUGINS\BinNice.bak", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C del c:\progra~1\Intern~1\PLUGINS\BinNice.dll", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C del %temp%\smss.exe", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C del %temp%\svchost.exe", 0, TRUE)
iReturn=objShell.Run("cmd.exe /C del %temp%\IEXPLORE.EXE", 0, TRUE)

'-----------------病毒文件删除模块终止-----------------


'-----------------遍历删除各盘符根目录下病毒文件模块开始-----------------
set fso=createobject("scripting.filesystemobject")
set drvs=fso.drives
for each drv in drvs
if drv.drivetype=1 or drv.drivetype=2 or drv.drivetype=3 or drv.drivetype=4 then
set u=fso.getfile(drv.driveletter&":\autorun.inf")
u.attributes=0
u.delete
end if
next
'-----------------遍历删除各盘符根目录下病毒文件模块终止-----------------


'-----------------注册表操作模块开始-----------------
set reg=wscript.createobject("wscript.shell")
reg.regwrite "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL\CheckedValue",1,"REG_DWORD"
reg.regwrite "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL\DefaultValue",2,"REG_DWORD"
reg.regwrite "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\NOHIDDEN\CheckedValue",2,"REG_DWORD"
reg.regwrite "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\NOHIDDEN\DefaultValue",2,"REG_DWORD"
reg.regwrite "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit","C:\WINDOWS\system32\userinit.exe,"
reg.regdelete "HKEY_CLASSES_ROOT\CLSID\{06E6B6B6-BE3C-6E23-6C8E-B833E2CE63B8}"
reg.regdelete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{06E6B6B6-BE3C-6E23-6C8E-B833E2CE63B8}"
reg.regdelete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wosa"
reg.regdelete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ztsa"
reg.regdelete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fysa"
reg.regdelete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtsa"
reg.regdelete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mhsa"
reg.regdelete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qjsa"
reg.regdelete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wgsa"
reg.regdelete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wlsa"
reg.regdelete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmsa"
'-----------------注册表操作模块终止-----------------

'-----------------系统文件恢复模块开始-----------------

'-----------------系统文件修复模块终止-----------------

msgbox "病毒清除成功,请重启电脑!",64,"搜索引擎乱码病毒专杀"
最后编辑2007-04-29 12:06:52