Cảnh báo VIRUS !

Thảo luận trong 'Nội Quy & Thông Báo' bắt đầu bởi TA_MOBILE, 31 Tháng một 2004.

  1. TA_MOBILE +84904069909

    Thông tin về Virus:

    Tên Virus: W32/Mydoom@MM
    Các tên khác:
    Novarg (F-Secure)
    W32.Novarg.A@mm (Symantec)
    Win32.Mydoom.A (CA)
    Win32/Shimg (CA)
    WORM_MIMAIL.R (Trend)

    Mức độ nguy hiểm: Rất nguy hiểm - Phá hoại
    Ngày phát hiện đầu tiên: 01/26/2004
    Độ dài của virus: 22,528 bytes
    Lây lan qua: E-mail

    Virus Characteristics:
    This is a mass-mailing and peer-to-peer file-sharing worm that bears the following characteristics:

    contains its own SMTP engine to construct outgoing messages
    contains a backdoor component (see below)
    contains a Denial of Service payload

    <b>Note: Receiving an email alert stating that the virus came from your email address is not an indication that you are infected as the virus often forges the from address.</b>

    The virus arrives in an email message as follows:

    From: (Spoofed email sender)
    Do not assume that the sender address is an indication that the sender is infected. Additionally you may receive alert messages from a mail server that you are infected, which may not be the case.

    Subject: (Varies, such as)

    Error
    Status
    Server Report
    Mail Transaction Failed
    Mail Delivery System
    hello
    hi
    Body: (Varies, such as)

    The message cannot be represented in 7-bit ASCII encoding and has been sent as a binary attachment.
    The message contains Unicode characters and has been sent as a binary attachment.
    Mail transaction failed. Partial message is available.
    Attachment: (varies [.bat, .exe, .pif, .cmd, .scr] - often arrives in a ZIP archive) (22,528 bytes)

    examples (common names, but can be random)
    doc.bat
    document.zip
    message.zip
    readme.zip
    text.pif
    hello.cmd
    body.scr
    test.htm.pif
    data.txt.exe
    file.scr
    In the case of two file extensions, multiple spaces may be inserted as well, for example:

    document.htm (many spaces) .pif
    The icon used by the file tries to make it appear as if the attachment is a text file:




    When this file is run (manually), it copies itself to the WINDOWS SYSTEM directory as taskmon.exe

    %SysDir%\taskmon.exe
    (Where %Sysdir% is the Windows System directory, for example C:\WINDOWS\SYSTEM)


    It creates the following registry entry to hook Windows startup:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\
    CurrentVersion\Run "TaskMon" = %SysDir%\taskmon.exe
    The virus uses a DLL that it creates in the Windows System directory:

    %SysDir%\shimgapi.dll (4,096 bytes)
    This DLL is injected into the EXPLORER.EXE upon reboot via this registry key:

    HKEY_CLASSES_ROOT\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InProcServer32 "(Default)" = %SysDir%\shimgapi.dll
    The virus will not replicate on the 12th February or later (although the DLL will still be installed).

    Peer To Peer Propagation
    The worm copies itself to the KaZaa Shared Directory with the following filenames:

    nuke2004
    office_crack
    rootkitXP
    strip-girl-2.0bdcom_patches
    activation_crack
    icq2004-final
    winamp

    Đọc thêm thông tin ở đây:
    http://vil.nai.com/vil/content/v_100983.htm

    Công cụ diệt Virus này:
    http://vil.nai.com/vil/stinger/
  2. ZAGO

    ZAGO Ex-Mod

    Bài viết:
    175
    Được Like:
    32
    CẨN THẬN ....CỰC KỲ LUÔN .TÔI ĐÃ BỊ DÍNH MỘT CON MÁY TÍNH ......HIÊN GIỜ NÓ ĐANG PHÁT TÁN RA KHẮP MỌI NƠI ....HÃY DÙNG NORTON UPDATE LIÊN TỤC ĐỂ ĐỀ PHÒNG