10、發(fā)送ICMP探測數(shù)據(jù)"Hello,World",判斷網(wǎng)絡(luò)狀態(tài),網(wǎng)絡(luò)可用時(shí), 枚舉內(nèi)網(wǎng)所有共享主機(jī),并嘗試用弱口令連接[url=file://\\IPC$]\\IPC$[/url]、\admin$等共享目錄,連接成功后進(jìn)行網(wǎng)絡(luò)感染。 11、感染用戶機(jī)器上的exe文件,但不感染以下文件夾中的文件: system system32 windows documents and settings system Volume Information Recycled winnt Program Files Windows NT WindowsUpdate Windows Media Player Outlook Express Internet Explorer ComPlus Applications NetMeeting Common Files Messenger Microsoft Office InstallShield Installation Information MSN Microsoft Frontpage Movie Maker MSN Gaming Zone 12、枚舉系統(tǒng)進(jìn)程,嘗試將病毒dll(vdll.dll)選擇性注入以下進(jìn)程名對應(yīng)的進(jìn)程: Explorer Iexplore 找到符合條件的進(jìn)程后隨機(jī)注入以上兩個進(jìn)程中的其中一個。 13、當(dāng)外網(wǎng)可用時(shí),被注入的dll文件嘗試連接以下網(wǎng)站下載并運(yùn)行相關(guān)程序: http://www.17**.com/gua/zt.txt 保存為:c:\1.txt http://www.17**.com/gua/wow.txt 保存為:c:\1.txt http://www.17**.com/gua/mx.txt 保存為:c:\1.txt http://www.17**.com/gua/zt.exe 保存為:%SystemRoot%Sy.exe http://www.17**.com/gua/wow.exe 保存為:%SystemRoot%\1Sy.exe http://www.17**.com/gua/mx.exe 保存為:%SystemRoot%\2Sy.exe 注:三個程序都為木馬程序 14、病毒會將下載后的"1.txt"的內(nèi)容添加到以下相關(guān)注冊表項(xiàng):
[HKEY_LOCAL_MACHINE\SOFTWARE\Soft\DownloadWWW] "auto"="1" [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows] "ver_down0"="[boot loader]\\\\\\\\\\\\\\\\+++++++++++++++++++++++" "ver_down1"="[boot loader] timeout=30 [operating systems] multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS=\"Microsoft Windows XP Professional\" ////" "ver_down2"="default=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS=\"Microsoft Windows XP Professional\" /////"