引用:
原帖由 mizi16 于 2008-8-25 01:58 发表 
最近遇到病毒了 uISGRLFile.dat文件一直出现在桌面 删了又出来 怎么办啊 高手谢谢了`!!!
转贴的。 希望有用。
Email-Worm.Win32.Bagle.gb分析
安天实验室 CERT组分析
一、病毒标签:
病毒名称: Email-Worm.Win32.Bagle.gb
病毒类型: 蠕虫类
文件 MD5: 702F26300BB856FC5A27DD47090237BB
公开范围: 完全公开
危害等级: 4
文件长度: 185,912 字节
感染系统: windows 98以上版本
开发工具: Microsoft Visual C++ 6.0
加壳类型: 无
二、病毒描述:
该病毒为邮件蠕虫,可通过邮件自行传播。病毒运行后,复制衍生病毒文件系统目录下,并删除自身。修改注册表,添加启动项,以达到随机启动的目的。将IeBar1.dll插入到EXPLORER.EXE进程中,主动连接网络,下载其它病毒文件到本机运行。
三、行为分析:
1、病毒运行后释放文件:
%Program Files%\DeskAdTop\sInfo.ini
%System32%\eeeeee.ini
%System32%\eeeeee1.ini
%System32%\IeBar1.dll
2、添加启动项,以达到随机启动的目的:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IEBarUp
键值:字符串:"RunDll32"C:\WINDOWS\system32\IeBar1.dll",Run%SystemRoot%\Driver Cache"
3、将IeBar1.dll插入到EXPLORER.EXE进程中
4、主动连接网络,下载相关病毒文件信息:
地址列表:
218.12.196.143
218.12.196.140.
222.35.73.17
202.108.32.181
下载及释放文件列表:
%Program Files%\DeskAdTop\sInfo.ini
%WINDIR%\Downloaded Program Files\865735\adkwlib1.dat
%WINDIR%\Downloaded Program Files\865735\adkwlib1.dat.1
%WINDIR%\Downloaded Program Files\865735\adkwlib1.dat.tmp
%WINDIR%\Downloaded Program Files\865735\adrec.dat
%WINDIR%\Downloaded Program Files\865735\allverx.dat
%WINDIR%\Downloaded Program Files\865735\bk\skin1.GIF
%WINDIR%\Downloaded Program Files\865735\bk\skin2.GIF
%WINDIR%\Downloaded Program Files\865735\CodeConvert\regCodeMap.ini
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSB52UC.TXT
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSGB2UC.TXT
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSGBK2UC.TXT
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSUC2B5.TXT
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSUC2GB.TXT
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSUC2GBK.TXT
%WINDIR%\Downloaded Program Files\865735\config\MidSegData0.idx
%WINDIR%\Downloaded Program Files\865735\config\MidSegData1.idx
%WINDIR%\Downloaded Program Files\865735\config\ZSDict_Word.dat
%WINDIR%\Downloaded Program Files\865735\hissys.dat
%WINDIR%\Downloaded Program Files\865735\IP.dat
%WINDIR%\Downloaded Program Files\865735\NTDLL32.dll
%WINDIR%\Downloaded Program Files\865735\SHLWAPI32.DLL
%WINDIR%\Downloaded Program Files\865735\sInfo.ini
%WINDIR%\Downloaded Program Files\865735\uISGRLFile.dat
%WINDIR%\Downloaded Program Files\865735\wpp_entity.txt
%WINDIR%\Downloaded Program Files\865735\wpp_keyword.txt
%WINDIR%\Downloaded Program Files\865735\_uninstall
%System32%\CharSet.dll
%System32%\CreateDomTree.dll
%System32%\drivers\mspcidrv.sys
%System32%\IEHelper.dll
%System32%\internet.exe
%System32%\NTDLL32.dll
%System32%\WebPageParser.dll
%WINDIR%\Temp\FDC15X.tmp
5、该病毒执行后开始搜索计算机中E-mail地址,搜索到后自动发送邮件,在邮件附件中包含病毒体
注释:
%Windir% WINDODWS所在目录
%DriveLetter% 逻辑驱动器根目录
%ProgramFiles% 系统程序默认安装目录
%HomeDrive% 当前启动系统所在分区
%Documents and Settings% 当前用户文档根目录
%Temp% 当前用户TEMP缓存变量;路径为:
%Documents and Settings%\当前用户\Local Settings\Temp
%System32% 是一个可变路径;
病毒通过查询操作系统来决定当前System32文件夹的位置;
Windows2000/NT中默认的安装路径是 C:\Winnt\System32;
Windows95/98/Me中默认的安装路径是 C:\Windows\System;
WindowsXP中默认的安装路径是 C:\Windows\System32。
四、 清除方案:
1、使用安天木马防线可彻底清除此病毒(推荐),请到安天网站下载:
www.antiy.com 。
2、手工清除请按照行为分析删除对应文件,恢复相关系统设置。推荐使用ATool(安天安全管理工具),ATool下载地址:
www.antiy.com或
http://www.antiy.com/download/index.htm 。
(1) 使用安天木马防线或ATool中的“进程管理”关闭病毒进程
(2) 强行删除病毒释放与下载文件
%Program Files%\DeskAdTop\sInfo.ini
%System32%\eeeeee.ini
%System32%\eeeeee1.ini
%System32%\IeBar1.dll
%Program Files%\DeskAdTop\sInfo.ini
%WINDIR%\Downloaded Program Files\865735\adkwlib1.dat
%WINDIR%\Downloaded Program Files\865735\adkwlib1.dat.1
%WINDIR%\Downloaded Program Files\865735\adkwlib1.dat.tmp
%WINDIR%\Downloaded Program Files\865735\adrec.dat
%WINDIR%\Downloaded Program Files\865735\allverx.dat
%WINDIR%\Downloaded Program Files\865735\bk\skin1.GIF
%WINDIR%\Downloaded Program Files\865735\bk\skin2.GIF
%WINDIR%\Downloaded Program Files\865735\CodeConvert\regCodeMap.ini
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSB52UC.TXT
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSGB2UC.TXT
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSGBK2UC.TXT
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSUC2B5.TXT
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSUC2GB.TXT
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSUC2GBK.TXT
%WINDIR%\Downloaded Program Files\865735\config\MidSegData0.idx
%WINDIR%\Downloaded Program Files\865735\config\MidSegData1.idx
%WINDIR%\Downloaded Program Files\865735\config\ZSDict_Word.dat
%WINDIR%\Downloaded Program Files\865735\hissys.dat
%WINDIR%\Downloaded Program Files\865735\IP.dat
%WINDIR%\Downloaded Program Files\865735\NTDLL32.dll
%WINDIR%\Downloaded Program Files\865735\SHLWAPI32.DLL
%WINDIR%\Downloaded Program Files\865735\sInfo.ini
%WINDIR%\Downloaded Program Files\865735\uISGRLFile.dat
%WINDIR%\Downloaded Program Files\865735\wpp_entity.txt
%WINDIR%\Downloaded Program Files\865735\wpp_keyword.txt
%WINDIR%\Downloaded Program Files\865735\_uninstall
%System32%\CharSet.dll
%System32%\CreateDomTree.dll
%System32%\drivers\mspcidrv.sys
%System32%\IEHelper.dll
%System32%\internet.exe
%System32%\NTDLL32.dll
%System32%\WebPageParser.dll
%WINDIR%\Temp\FDC15X.tmp
(3) 恢复病毒修改的注册表项目,删除病毒添加的注册表项
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IEBarUp
键值:字符串:"RunDll32"C:\WINDOWS\system32\IeBar1.dll",Run%SystemRoot%\Driver Cache"
本贴来自ZDNetChina中文社区
http://bbs.zdnet.com.cn ,本贴地址:
http://bbs.zdnet.com.cn/viewthread.php?tid=180936