这是一个木马程序,它会读取用户系统的一些配置信息,并制造后门,连接病毒作者指定的远程服务器,等待黑客连接。
在磁盘中释放出以下文件:
C:WINDOWSTEMPawtqnkhe.dll
在注册表中创建了以下信息:
"HKCUSoftwareMicrosoftWindows NT Script HostMicrosoft DxDiagWinSettings"
"HKLMSoftwareMicrosoftActive SetupInstalled Components{5Y99AE78-58TT-11dW-BE53-Y67078979Y}"
在注册表中设置了以下信息:
"HKCUSoftwareMicrosoftWindows NT Script HostMicrosoft DxDiagWinSettings" "Bulas" "1"
"HKCUSoftwareMicrosoftWindows NT Script HostMicrosoft DxDiagWinSettings" "FW_KILL" "1"
"HKCUSoftwareMicrosoftWindows NT Script HostMicrosoft DxDiagWinSettings" "XP_FW_Disable" "1"
"HKCUSoftwareMicrosoftWindows NT Script HostMicrosoft DxDiagWinSettings" "XP_SYS_Recovery" "1"
"HKCUSoftwareMicrosoftWindows NT Script HostMicrosoft DxDiagWinSettings" "ICQ_UIN" "`lddon/on,hq/hogn"
"HKCUSoftwareMicrosoftWindows NT Script HostMicrosoft DxDiagWinSettings" "ICQ_UIN2" ""
"HKCUSoftwareMicrosoftWindows NT Script HostMicrosoft DxDiagWinSettings" "Kurban_Ismi" "whbuhl"
"HKCUSoftwareMicrosoftWindows NT Script HostMicrosoft DxDiagWinSettings" "Mail" ""
"HKCUSoftwareMicrosoftWindows NT Script HostMicrosoft DxDiagWinSettings" "Online_List" ""
"HKCUSoftwareMicrosoftWindows NT Script HostMicrosoft DxDiagWinSettings" "Port" "4001"
"HKCUSoftwareMicrosoftWindows NT Script HostMicrosoft DxDiagWinSettings" "Sifre" "0325"
"HKCUSoftwareMicrosoftWindows NT Script HostMicrosoft DxDiagWinSettings" "Hata" ""
"HKCUSoftwareMicrosoftWindows NT Script HostMicrosoft DxDiagWinSettings" "KSil" "1"
"HKCUSoftwareMicrosoftWindows NT Script HostMicrosoft DxDiagWinSettings" "LanNotifie" ""
"HKLMSoftwareMicrosoftActive SetupInstalled Components{5Y99AE78-58TT-11dW-BE53-Y67078979Y}" "StubPath" "C:WINDOWSsystemsservice.exe"
在注册表中修改了以下信息:
"HKLMSoftwareMicrosoftWindows NTCurrentVersionWinlogon" "Shell" "Explorer.exe C:WINDOWSsystem32fservice.exe"
会从以下注册表中读取信息:
"HKCUSoftwareBorlandLocales"
"HKCUSoftwareBorlandDelphiLocales"
"HKCUSoftwareMicrosoftActive SetupInstalled Components{5Y99AE78-58TT-11dW-BE53-Y67078979Y}"
病毒会连接作者指定的网址:
病毒会从 http://dd6.tesekl.info/net.exe 下载文件至本地计算机 c:
et.exe
域名:"dd6.tesekl.info" 端口:80 (TCP)
dd6.tesekl.info/net.exe
在系统中创建了以下进程:
病毒创建了一个CLSID为 {E93AD7C1-C347-11D1-A3E2-00A0C90AEA82} 类名为 VBRuntime6 的 COM 组件
病毒会通过以下途径传播:
病毒会修改硬盘中存在的可执行文件