TROJ_SHARIK.VDA
Troj.W32.Sharik.rlp!c (AegisLab); Trojan/Win32.Sharik (Antiy-AVL)
Windows

恶意软件类型:
Trojan
有(yǒu)破坏性?:
没有(yǒu)
加密?:
是的
In the Wild:
是的
概要
它以其他(tā)恶意软件释放的文(wén)件或用(yòng)户访问恶意网站时不知不觉下载的文(wén)件的形式到达系统。它开始执行然后再删除。
技(jì )术详细信息
安(ān)装(zhuāng)
它在受感染的系统中(zhōng)植入下列自身副本:
- %Application Data%\{random1}\{random2}.exe
- %User Temp%\{random1}\{random2}.exe
(注意: %Application Data% 是当前用(yòng)户的 Application Data 文(wén)件夹,通常位于 C:\Windows\Profiles\{user name}\Application Data (Windows 98 和 ME)、C:\WINNT\Profiles\{user name}\Application Data (Windows NT) 和 C:\Documents and Settings\{user name}\Local Settings\Application Data (Windows 2000、XP 和 Server 2003)。. %User Temp% 是当前用(yòng)户的 Temp 文(wén)件夹。通常位于 C:\Documents and Settings\{user name}\Local Settings\Temp (Windows 2000、XP 和 Server 2003)。)
它植入下列文(wén)件/组件:
- %Application Data%\{random1}\{random1}
(注意: %Application Data% 是当前用(yòng)户的 Application Data 文(wén)件夹,通常位于 C:\Windows\Profiles\{user name}\Application Data (Windows 98 和 ME)、C:\WINNT\Profiles\{user name}\Application Data (Windows NT) 和 C:\Documents and Settings\{user name}\Local Settings\Application Data (Windows 2000、XP 和 Server 2003)。)
它添加下列进程:
- explorer.exe
它创建下列将属性设置為(wèi)“系统”和“隐藏”的文(wén)件夹,以防止用(yòng)户发现并移除其组件:
- %Application Data%\{random1}
- %User Temp%\{random1}
(注意: %Application Data% 是当前用(yòng)户的 Application Data 文(wén)件夹,通常位于 C:\Windows\Profiles\{user name}\Application Data (Windows 98 和 ME)、C:\WINNT\Profiles\{user name}\Application Data (Windows NT) 和 C:\Documents and Settings\{user name}\Local Settings\Application Data (Windows 2000、XP 和 Server 2003)。. %User Temp% 是当前用(yòng)户的 Temp 文(wén)件夹。通常位于 C:\Documents and Settings\{user name}\Local Settings\Temp (Windows 2000、XP 和 Server 2003)。)
它添加下列互斥条目,确保一次只会运行一个副本:
- hashed computer name and volume serial number
它向下列进程中(zhōng)注入代码:
- explorer.exe
自启动技(jì )术
它添加下列注册表项,在系统每次启动时自行执行:
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Policies\
Explorer\Run
{installed program name in the system} = "%Application Data%\{random1}\{random2}.exe
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
{installed program name in the system} = "%Application Data%\{random1}\{random2}.exe
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Policies\
Explorer\Run
{installed program name in the system} = "%User Temp%\{random1}\{random2}.exe
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
{installed program name in the system} = "%User Temp%\{random1}\{random2}.exe
其他(tā)详细信息
它连接到下列网站,发送和接收信息:
- {BLOCKED}xdelete.cc/jertysijd/index.php
解决方案
Step 1
对于Windows ME和XP用(yòng)户,在扫描前,请确认已禁用(yòng)系统还原功能(néng),才可(kě)全面扫描计算机。
Step 3
重启进入安(ān)全模式
Step 4
删除该注册表值
注意事项:错误编辑Windows注册表会导致不可(kě)挽回的系统故障。只有(yǒu)在您掌握后或在系统管理(lǐ)员的帮助下才能(néng)完成这步。或者,请先阅读Microsoft文(wén)章,然后再修改计算机注册表。
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
- {installed program name in the system} = "%Application Data%\{random1}\{random2}.exe
- {installed program name in the system} = "%Application Data%\{random1}\{random2}.exe
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
- {installed program name in the system} = "%Application Data%\{random1}\{random2}.exe
- {installed program name in the system} = "%Application Data%\{random1}\{random2}.exe
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
- {installed program name in the system} = "%User Temp%\{random1}\{random2}.exe
- {installed program name in the system} = "%User Temp%\{random1}\{random2}.exe
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
- {installed program name in the system} = "%User Temp%\{random1}\{random2}.exe
- {installed program name in the system} = "%User Temp%\{random1}\{random2}.exe
Step 5
搜索和删除该文(wén)件
- %Application Data%\{random1}\{random2}.exe
- %User Temp%\{random1}\{random2}.exe
Step 6
搜索和删除这一文(wén)件夹
- %Application Data%\{random1}\
- %User Temp%\{random1}\
Step 7
重启进入正常模式,使用(yòng)亚信安(ān)全产(chǎn)品扫描计算机,检测TROJ_SHARIK.VDA文(wén)件 如果检测到的文(wén)件已被亚信安(ān)全产(chǎn)品清除、删除或隔离,则无需采取进一步措施。可(kě)以选择直接删除隔离的文(wén)件。请参阅知识库页(yè)面了解详细信息。