遇到让文件夹变文件的 Trojan.Win32.ECode.ee / Trojan-Dropper.Win32.Flystud.ko
endurer 原创
2009-04-29 第1版
最近一位朋友的电脑反应很慢,而且出现了奇怪的现象:U盘中原有来文件夹全变成了文件。请偶帮忙看看。
下载 pe_xscan 扫描 log 并分析,发现如下可疑项(进程模块略):
pe_xscan 09-04-28 by Purple Endurer
2009-4-29 13:7:47
Windows XP Service Pack 2(5.1.2600)
MSIE:7.0.5730.11
管理员用户组
正常模式
O4 - HKLM/../Run: [EB1B66] C:/WINDOWS/system32/3D98FC/EB1B66.EXE
O4 - Startup: EB1B66.lnk -> C:/WINDOWS/system32/3D98FC/EB1B66.EXE
Log要比:
生出.exe尾巴?原来是MS-DOS.com,fonts.exe,Default.exe,HelpHost.com等做怪1
javascript:void(0)
中的简单,也许是卡卡安全助手的U盘免疫功能在起作用。
到 http://purpleendurer.ys168.com 下载 bat_do 和 FileInfo。
用FileInfo提取文件信息,用 bat_do 打包备份后延时删除。
用IceSword终止进程EB1B66.EXE,强制删除文件。
用卡卡安全助手清理病毒启动项。
用WinRAR浏览U盘,发现原来的文件夹还是存在的,只是被隐藏起来了。用attrib 命令去除这些文件夹的隐藏和系统属性。
附:病毒文件信息:
文件说明符 : C:/WINDOWS/system32/3D98FC/EB1B66.EXE
属性 : -SHR
数字签名:否
PE文件:是
获取文件版本信息大小失败!
创建时间 : 2009-4-13 10:35:16
修改时间 : 2009-4-13 10:35:16
大小 : 1403113 字节 1.346 MB
MD5 : 0c7cc2b1b82cae03e9a25f14faf9e4ea
SHA1: 1041469D96DE77EA526350CA9FE4D61EF2708E2A
CRC32: f33b77ec
文件 EB1B66.EXE 接收于 2009.04.29 05:19:26 (CET)
反病毒引擎 | 版本 | 最后更新 | 扫描结果 |
a-squared | 4.0.0.101 | 2009.04.29 | Trojan.Peed!IK |
AhnLab-V3 | 5.0.0.2 | 2009.04.28 | - |
AntiVir | 7.9.0.156 | 2009.04.28 | TR/Dropper.Gen |
Antiy-AVL | 2.0.3.1 | 2009.04.28 | - |
Authentium | 5.1.2.4 | 2009.04.27 | W32/Nuj.A.gen!Eldorado |
Avast | 4.8.1335.0 | 2009.04.28 | - |
AVG | 8.5.0.287 | 2009.04.28 | - |
BitDefender | 7.2 | 2009.04.29 | Dropped:Trojan.Peed.Gen |
CAT-QuickHeal | 10.00 | 2009.04.28 | Win32.Trojan-Dropper.Flystud.ko.5.Pack |
ClamAV | 0.94.1 | 2009.04.28 | - |
Comodo | 1140 | 2009.04.28 | - |
DrWeb | 4.44.0.09170 | 2009.04.29 | - |
eSafe | 7.0.17.0 | 2009.04.27 | - |
eTrust-Vet | 31.6.6480 | 2009.04.28 | - |
F-Prot | 4.4.4.56 | 2009.04.27 | W32/Nuj.A.gen!Eldorado |
F-Secure | 8.0.14470.0 | 2009.04.29 | Trojan-Dropper.Win32.Flystud.ko |
Fortinet | 3.117.0.0 | 2009.04.29 | - |
GData | 19 | 2009.04.29 | Dropped:Trojan.Peed.Gen |
Ikarus | T3.1.1.49.0 | 2009.04.29 | Trojan.Peed |
K7AntiVirus | 7.10.717 | 2009.04.27 | Trojan-Dropper.Win32.Flystud.ko |
Kaspersky | 7.0.0.125 | 2009.04.29 | Trojan-Dropper.Win32.Flystud.ko |
McAfee | 5599 | 2009.04.28 | W32/Autorun.worm.ev |
McAfee+Artemis | 5599 | 2009.04.28 | W32/Autorun.worm.ev |
McAfee-GW-Edition | 6.7.6 | 2009.04.29 | Trojan.Dropper.Gen |
Microsoft | 1.4602 | 2009.04.28 | Backdoor:Win32/FlyAgent.F |
NOD32 | 4041 | 2009.04.28 | - |
Norman | 6.00.06 | 2009.04.28 | - |
nProtect | 2009.1.8.0 | 2009.04.28 | Trojan-Dropper/W32.FlyStudio.1403113 |
Panda | 10.0.0.14 | 2009.04.28 | - |
PCTools | 4.4.2.0 | 2009.04.28 | - |
Prevx1 | 3.0 | 2009.04.29 | - |
Rising | 21.27.20.00 | 2009.04.29 | Trojan.Win32.ECode.ee |
Sophos | 4.41.0 | 2009.04.29 | Mal/EncPk-GF |
Sunbelt | 3.2.1858.2 | 2009.04.28 | - |
Symantec | 1.4.4.12 | 2009.04.29 | - |
TheHacker | 6.3.4.1.315 | 2009.04.28 | Trojan/Dropper.Flystud.ko |
TrendMicro | 8.700.0.1004 | 2009.04.28 | - |
VBA32 | 3.12.10.3 | 2009.04.29 | Trojan-Dropper.Win32.Flystud.ko |
ViRobot | 2009.4.29.1713 | 2009.04.29 | - |
VirusBuster | 4.6.5.0 | 2009.04.28 | - |
附加信息 |
File size: 1403113 bytes |
MD5...: 0c7cc2b1b82cae03e9a25f14faf9e4ea |
SHA1..: 1041469d96de77ea526350ca9fe4d61ef2708e2a |
SHA256: 83e1b43c05713852cc634fc9f207668fed3b064e55ec9e3e610a41711f0e29b1 |
SHA512: df8223a0d016a4d629a341295fc3bceb8f53b8b8bef7dd5558896abdfa0bbced e3772b2a89fe58267eda1d73d46d229b83731d5ea861716f18561fc940472606 |
ssdeep: 24576:lRylsJDvWrHuW9ly4S6DhQMjiWY0bEAq6J1kU+TPdFpGpH/6CxMSAbhAje jpRuYs:bylsZvWLLdLaM2WY0QAJb+TQ/RxshAQ+ |
PEiD..: - |
TrID..: File type identification Win32 Executable MS Visual C++ (generic) (62.9%) Win32 Executable Generic (14.2%) Win32 Dynamic Link Library (generic) (12.6%) Clipper DOS Executable (3.3%) Generic Win/DOS Executable (3.3%) |
PEInfo: PE Structure information ( base data ) entrypointaddress.: 0x1196 timedatestamp.....: 0x59bffa3 (Mon Dec 25 05:33:23 1972) machinetype.......: 0x14c (I386) ( 5 sections ) name viradd virsiz rawdsiz ntrpy md5 .text 0x1000 0x51ec 0x6000 7.00 670e499c5b780a8681954f88d5fd72b6 .rdata 0x7000 0xa4a 0x1000 3.58 367b7ce38d0c4c17f01e370dc697df5b .data 0x8000 0x1f58 0x2000 4.61 3c091462b8b46c0a497bde20c727eec4 .data 0xa000 0x22000 0x22000 7.82 61731cd337d924e0b4c229312caf0aae .rsrc 0x2c000 0x45b0 0x5000 4.33 2848a5a5ec1e2ae2bba1498f6767692d ( 2 imports ) > KERNEL32.dll: GetProcAddress, LoadLibraryA, CloseHandle, WriteFile, CreateDirectoryA, GetTempPathA, ReadFile, SetFilePointer, CreateFileA, GetModuleFileNameA, GetStringTypeA, LCMapStringW, LCMapStringA, HeapAlloc, HeapFree, GetModuleHandleA, GetStartupInfoA, GetCommandLineA, GetVersion, ExitProcess, HeapDestroy, HeapCreate, VirtualFree, VirtualAlloc, HeapReAlloc, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, FreeEnvironmentStringsA, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetFileType, RtlUnwind, GetCPInfo, GetACP, GetOEMCP, MultiByteToWideChar, GetStringTypeW > USER32.dll: MessageBoxA, wsprintfA ( 0 exports ) |
PDFiD.: - |
RDS...: NSRL Reference Data Set - |
packers (Kaspersky): PE-Crypt.CF |