Trojan.INF.HIDDENTEAR.THAOGBA
INF/Agent.J trojan (NOD32)
Windows

恶意软件类型:
Trojan
有(yǒu)破坏性?:
没有(yǒu)
加密?:
没有(yǒu)
In the Wild:
是的
概要
它以文(wén)件的形式出现在系统中(zhōng),可(kě)能(néng)是其他(tā)恶意软件投放的,或者是用(yòng)户在访问恶意网站时无意中(zhōng)下载的。
????????,?????????
技(jì )术详细信息
???????
It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
??
??? .INF ????????:
[version]
Signature=$chicago$
AdvancedINF=2.5
[DefaultInstall]
CustomDestination=CustInstDestSectionAllUsers
RunPreSetupCommands=RunPreSetupCommandsSection
[RunPreSetupCommandsSection]
; Commands Here will be run Before Setup Begins to install
cmd /c start "C:\Windows\temp\{Random Characters}.exe"
taskkill /IM cmstp.exe /F
[CustInstDestSectionAllUsers]
49000,49001=AllUSer_LDIDSection, 7
[AllUSer_LDIDSection]
"HKLM", "SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\CMMGR32.EXE", "ProfileInstallPath", "%UnexpectedError%", ""
[Strings]
ServiceName="Crimson"
ShortSvcName="Crimson"
??????
????????,??????????:
- C:\Windows\temp\{Random Characters}.exe
- taskkill /IM cmstp.exe /F
解决方案
Step 1
??Windows ME?XP??,????,????????????,??????????
Step 2
?????AUTORUN.INF??,?Trojan.INF.HIDDENTEAR.THAOGBA??,???????
- [version]
Signature=$chicago$
AdvancedINF=2.5
[DefaultInstall]
CustomDestination=CustInstDestSectionAllUsers
RunPreSetupCommands=RunPreSetupCommandsSection
[RunPreSetupCommandsSection]
; Commands Here will be run Before Setup Begins to install
cmd /c start "C:\Windows\temp\{Random Characters}.exe"
taskkill /IM cmstp.exe /F
[CustInstDestSectionAllUsers]
49000,49001=AllUSer_LDIDSection, 7
[AllUSer_LDIDSection]
"HKLM", "SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\CMMGR32.EXE", "ProfileInstallPath", "%UnexpectedError%", ""
[Strings]
ServiceName="Crimson"
ShortSvcName="Crimson"
Step 3
?????????????,???????Trojan.INF.HIDDENTEAR.THAOGBA?? ????????????????????????,????????????????????????????????????????