Harm.Smith.c
病毒名称:
Harm.Smith.c
类别: 蠕虫病毒
病毒资料:
破坏方法:
采用Borland C++写的病毒,该病毒将导致计算机无法正常使用。
病毒流程如下:
1.病毒将复制自己到如下目录:
C:\WINDOWS\system32\WinServer.exe
C:\WINDOWS\system32\Setup.exe
C:\WINDOWS\system32\WinBios.exe
C:\WINDOWS\system32\NetBios.exe
C:\WINDOWS\system32\NetServer.exe
C:\WINDOWS\system32\WinNote.exe
C:\WINDOWS\system32\WinProfile.exe
C:\WINDOWS\system32\WinLoadfile.exe
C:\WINDOWS\system32\WinAuto.exe
C:\WINDOWS\system\WinConfig.exe
2.病毒修改下列注册表键值键值:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
"WinServer.exe" = "C:\WINDOWS\system32\WinServer.exe"
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
"WinBios.exe" = "C:\WINDOWS\system32\WinBios.exe"
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
"NetBios.exe" = "C:\WINDOWS\system32\NetBios.exe"
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
"NetServer.exe" = "C:\WINDOWS\system32\NetServer.exe"
HKLM\SOFTWARE\Classes\.inf\(默认) = "txtfile" 原来为:inffile
HKLM\SOFTWARE\Classes\.reg\(默认) = "txtfile" 原来为:regfile
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies
\System DisableRegistryTools = 0x1
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies
\EXPlorer NoRun = 0x1
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies
\Explorer NoDrives = 0x8
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies
\Explorer NoRealMode = 0x1
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies
\Explorer NoLogOff = 0x1
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies
\Explorer NoSetTaskBar = 0x1
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies
\Explore NoChangeStartMenu = 0x1
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies
\Explorer NoStartMenu = 0x1
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies
\Explorer NoSetFolders = 0x1
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies
\Explorer NoFolderOptions = 0x1
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies
\Explorer NoFind = 0x1
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies
\Explorer NoRecentDocsMenu = 0x1
HKU\.DEFAULT\Software\Microsoft\Internet Explorer\Main
"Show_URLToolBar" = "no"
HKU\.DEFAULT\Software\Microsoft\Internet Explorer\Main
"Show_StatusBar" = "no"
HKU\.DEFAULT\Control Panel\desktop
"AutoEndTasks" = "no"
HKCR\txtfile\shell\open\command\(默认) = "C:\WINDOWS
\system32\WinNote.exe"
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion
\WinLogon
"LegalNoticeCaption" = "美丽的丽江"
"LegalNoticeText" = "欢迎进入美丽的丽江!"
3.病毒可能通过自己的SMTP引擎发送带毒邮件,邮件特征如下:
邮件接收用户名为:username@sina.com.cn 、username@263.com.cn,其中
"username"为下列之一:
zhang wang Li Zhao Liu yang du chuan qi he yuan Wu hai
ma hou
dao xing
qiu ren weng hua hong bi ding dang zhong gong liang su
huang jin mi
mu huo
hai zhang li ling lie le la lao liao ca cai co cu cun
can ce bai bi bao
bo bang di da dan dang du dun de ding din e e
病毒的清除法:
使用光华反病毒软件,彻底删除。
病毒演示:
病毒FAQ:
Windows下的PE病毒。
发现日期:
2004-7-26