病毒信息:
病毒名称: Worm.Beagle.k
中文名称: 恶鹰变种K
威胁级别: 3C
病毒别名:贝革热
W32.Beagle.k@mm [Symantec]
WORM_BAGLE.k [Trend]
病毒类型: 蠕虫、后门
受影响系统:Win9x/Win2000/WinXP
技术特点:
· 传染条件:利用电子邮件高速传播;
· 系统修改:
A、自我复制到 %System%winsys.exe;
B、创建以下文件:
%system%winsys.exeopen
该文件是一个加过密的ZIP文件包,密码随机生成,内容是病毒代码;
C、添加以下键值
"ssate.exe"="%System%winsys.exe"
到 HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionRun
以便病毒可随机自启动;
D、打开TCP端口2745进行监听。允行攻击者通过一段特殊的信息发送到此端口,可使病毒自动
下载新的程序到受感染系统的%Windir%目录中,名字为iuplda<x>.exe,<x>为随机字母。
新下载的程序可能为新病毒;
E、发送HTTP GET 请求到以下网址,通TCP端口80。
postertog.de
www.gfotxt.net
www.maiklibis.de
病毒通过此操作来获得受感染系统的IP地址和打开的端口号;
F、中止部份反病毒软件的升级程序,来阻止反病毒软件升级:
Atupdater.exe
Aupdate.exe
Autodown.exe
Autotrace.exe
Autoupdate.exe
Avltmain.exe
Avpupd.exe
Avwupd32.exe
Avxquar.exe
Cfiaudit.exe
Drwebupw.exe
Icssuppnt.exe
Icsupp95.exe
Luall.exe
Mcupdate.exe
Nupgrade.exe
Outpost.exe
Update.exe
G、 查找后缀名为以下后缀的文件,并从中提取电子邮件地址:
.wab .txt .msg .htm .xml .dbx .mdx .eml .nch .mmf .ods .cfg .asp .php .pl
.adb .tbb .sht .uin .cgi
· 传播方式:
A、 释放病毒复本到名字含有字符串"shar"的文件夹中,使病毒具备网络共享传播和通过P2P软
件传播的能力,病毒复本的名字为:
ACDSee 9.exe
Adobe Photoshop 9 full.exe
Ahead Nero 7.exe
Matrix 3 Revolution English Subtitles.exe
Microsoft Office 2003 Crack, Working!.exe
Microsoft Office XP working Crack, Keygen.exe
Microsoft Windows XP, WinXP Crack, working Keygen.exe
Opera 8 New!.exe
Porno pics arhive, xxx.exe
Porno Screensaver.scr
Porno, sex, oral, anal cool, awesome!!.exe
Serials.txt.exe
WinAmp 5 Pro Keygen Crack Update.exe
WinAmp 6 New!.exe
Windown Longhorn Beta Leak.exeWindows Sourcecode update.doc.exe
XXX hardcore images.exe
B、病毒使用自己发信引擎发信,其邮件特征为:
发件人: <具有欺骗性的>(可能是以下字符串中的任意):
management@<recipient domain>
administration@<recipient domain>
staff@<recipient domain>
noreply@<recipient domain>
support@<recipient domain>
主题: (可能是以下字符串中的任意):
E-mail account disabling warning.
E-mail account security warning.
Email account utilization warning.
Important notify about your e-mail account.
Notify about using the e-mail account.
Notify about your e-mail account utilization.
Warning about your e-mail account.
内容:(可能是以下字符串中的任意组合):
Dear user of <domain>,
Dear user of <domain> gateway e-mail server,
Dear user of e-mail server "<domain>",
Hello user of <domain> e-mail server,
Dear user of "<domain>" mailing system,
Dear user, the management of <domain> mailing system wants to let you know
that,
Your e-mail account has been temporary disabled because of unauthorized access.
Our main mailing server will be temporary unavaible for next two days,
to continue receiving mail in these days you have to configure our free
auto-forwarding service.
Your e-mail account will be disabled because of improper using in next
three days, if you are still wishing to use it, please, resign your
account information.
We warn you about some attacks on your e-mail account. Your computer may
contain viruses, in order to keep your computer and e-mail account safe,
please, follow the instructions.
Our antivirus software has detected a large ammount of viruses outgoing
from your email account, you may use our free anti-virus tool to clean up
your computer software.
Some of our clients complained about the spam (negative e-mail content)
outgoing from your e-mail account. Probably, you have been infected by
a proxy-relay trojan server. In order to keep your computer safe,
follow the instructions.
For more information see the attached file.
Further details can be obtained from attached file.
Advanced details can be found in attached file.
For details see the attach.
For details see the attached file.
For further details see the attach.
Please, read the attach for further details.
Pay attention on attached file.
The <domain> team http://www.<domain >
The Management,
Sincerely,
Best wishes,
Have a good day,
Cheers,
Kind regards,
For security reasons attached file is password protected. The password is
"<password>".
For security purposes the attached file is password protected. Password is
"<password>".
Attached file protected with the password for security reasons. Password is
<password>.
In order to read the attach you have to use the following password: <password>.
注意: <domain> 为邮件服务器的域,比如:21cn.com
附件名: <可能是以下字符串中的任意>.zip:
Attach
Information
Readme
Document
Info
TextDocument
TextFile
MoreInfo
Message
Zip文件中是病毒复本,名字由随机字符组。ZIP包可能加密,密码会出现在邮件内容中
病毒会避免发送病毒邮件到含有以下字符串的邮件地址
@hotmail.com
@msn.com
@microsoft
@avp.
noreply
local
root@
postmaster@
自由广告区 |
分类导航 |
邮件新闻资讯: IT业界 | 邮件服务器 | 邮件趣闻 | 移动电邮 电子邮箱 | 反垃圾邮件|邮件客户端|网络安全 行业数据 | 邮件人物 | 网站公告 | 行业法规 网络技术: 邮件原理 | 网络协议 | 网络管理 | 传输介质 线路接入 | 路由接口 | 邮件存储 | 华为3Com CISCO技术 | 网络与服务器硬件 操作系统: Windows 9X | Linux&Uinx | Windows NT Windows Vista | FreeBSD | 其它操作系统 邮件服务器: 程序与开发 | Exchange | Qmail | Postfix Sendmail | MDaemon | Domino | Foxmail KerioMail | JavaMail | Winwebmail |James Merak&VisNetic | CMailServer | WinMail 金笛邮件系统 | 其它 | 反垃圾邮件: 综述| 客户端反垃圾邮件|服务器端反垃圾邮件 邮件客户端软件: Outlook | Foxmail | DreamMail| KooMail The bat | 雷鸟 | Eudora |Becky! |Pegasus IncrediMail |其它 电子邮箱: 个人邮箱 | 企业邮箱 |Gmail 移动电子邮件:服务器 | 客户端 | 技术前沿 邮件网络安全: 软件漏洞 | 安全知识 | 病毒公告 |防火墙 攻防技术 | 病毒查杀| ISA | 数字签名 邮件营销: Email营销 | 网络营销 | 营销技巧 |营销案例 邮件人才:招聘 | 职场 | 培训 | 指南 | 职场 解决方案: 邮件系统|反垃圾邮件 |安全 |移动电邮 |招标 产品评测: 邮件系统 |反垃圾邮件 |邮箱 |安全 |客户端 |