Navigacija
Lista poslednjih: 16, 32, 64, 128 poruka.

W32.HLLW.Deloder - kako ga najlakse ukloniti?

[es] :: Zaštita :: W32.HLLW.Deloder - kako ga najlakse ukloniti?

[ Pregleda: 2278 | Odgovora: 1 ] > FB > Twit

Postavi temu Odgovori

Autor

Pretraga teme: Traži
Markiranje Štampanje RSS

darkoPOKLONCIC
zg

Član broj: 5186
Poruke: 121
195.29.5.*



Profil

icon W32.HLLW.Deloder - kako ga najlakse ukloniti?21.07.2004. u 16:08 - pre 240 meseci
postoji li kakav patch il stagod?
 
Odgovor na temu

Sundance

Član broj: 7510
Poruke: 2559
*.sava.sczg.hr.



Profil

icon Re: W32.HLLW.Deloder - kako ga najlakse ukloniti?12.12.2004. u 12:30 - pre 235 meseci
When W32.HLLW.Deloder is run, it does the following:


Creates the mutex, testXserv.

Creates the value:

messnger [worm filename]

in the registry key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

so that the worm runs when you start Windows.

Copies the following two files, which are carried in the worms resources, to your computer:
Psexec.exe: This file is 36,352 bytes and is a legitimate remote process launcher. This file is not malicious. The worm uses it to replicate itself.
Inst.exe: This file is 684,562 bytes and is an installer of the Trojan, Backdoor.Dvldr, and is detected as such.


Launches multiple network replication threads. Every thread generates a random IP address. For every address, the worm attempts to:
Establish a connection using TCP port 445.
Copy the dropped Backdoor.Dvldr installer to the remote unrestricted share as the following files:
<random_ip>\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\inst.exe
<random_ip>\C\WINDOWS\Start Menu\Programs\Startup\inst.exe
<random_ip>\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\inst.exe


Inventories network resources and attempts to make a connection to each of them. If the shared resource is password-protected, then the worm attempts to connect to it using a brute-force attack. The worm uses an internal hard-coded list of various passwords that might have been used to restrict the shares, such as "admin," "pass," "12345," and so on.

Attempts to copy and run both itself and Backdoor.Dvldr, by using the legitimate remote process launcher.

Attempts to delete the following default shares (This action is not considered permanent, as the shares will be restored when you restart the computer):
E$
IPC$
ADMIN$
F$
D$
C$

The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.


Update the virus definitions.
Run a full system scan and delete all the files detected as W32.HLLW.Deloder or Backdoor.Dvldr.
Delete the value that was added to the registry.

For specific details on each of these steps, read the following instructions.

1. Updating the virus definitions
Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:
Running LiveUpdate, which is the easiest way to obtain virus definitions: These virus definitions are posted to the LiveUpdate servers once each week (usually on Wednesdays), unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, refer to the Virus Definitions (LiveUpdate).
Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). You should download the definitions from the Symantec Security Response Web site and manually install them. To determine whether definitions for this threat are available by the Intelligent Updater, refer to the Virus Definitions (Intelligent Updater).

The Intelligent Updater virus definitions are available here. For detailed instructions on how to download and install the Intelligent Updater virus definitions from the Symantec Security Response Web site, click here.

2. Scanning for and deleting the infected files
Start your Symantec antivirus program and make sure that it is configured to scan all the files.
For Norton AntiVirus consumer products: Read the document, "How to configure Norton AntiVirus to scan all files."
For Symantec AntiVirus Enterprise products: Read the document, "How to verify that a Symantec Corporate antivirus product is set to scan All Files."
Run a full system scan.
If any files are detected as infected with W32.HLLW.Deloder or Backdoor.Dvldr, click Delete.

3. Deleting the value from the registry

CAUTION: Symantec strongly recommends that you back up the registry before you make any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, "How to make a backup of the Windows registry," for instructions.

Click Start, and then click Run. (The Run dialog box appears.)
Type regedit

Then click OK. (The Registry Editor opens.)

Navigate to the key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

In the right pane, delete the value:

messnger [worm filename]

Exit the Registry Editor.

3 sekunde na google...
 
Odgovor na temu

[es] :: Zaštita :: W32.HLLW.Deloder - kako ga najlakse ukloniti?

[ Pregleda: 2278 | Odgovora: 1 ] > FB > Twit

Postavi temu Odgovori

Navigacija
Lista poslednjih: 16, 32, 64, 128 poruka.