主题:  大家小心“网页绑架者”木马!

恐龙特急克塞号

职务:普通成员
等级:3
金币:3.0
发贴:948
注册:2002/8/13 13:41:31
#12003/6/26 13:39:48
呵呵,国内对这类恶意程序好象没正式命名,我觉得叫“网页绑架者”比较好听。这一类的东西很多,有专门针对拨号用户的,也有普及型的,特点都是:用户网页打开后会自动跳转到一个国外网站去。单单更改注册表是不解决问题的,今天搞了好几个小时,又到国外站点上查了资料才搞定,很奇怪的是国内的站点上很少看到相关报道;金山有类似的介绍,但在清除方法上却不肯透露,而让人去选择在线服务,哎~~~~~~
我来跟大家贴贴吧,没准谁还可以用上呢。
金山的介绍(只说了其中一种):
Trojan.Aswnk  ★★ 传播:文件 网络

   该木马病毒特点是:

   病毒会释放一个DLL文件件,并且病毒会每隔15秒使用regsvr32.exe来加载此DLL文件来DLL来将用户的网页连接指向此类网站: 204.177.*.*/ ; 从而导至网络资源的浪费。

  如发现可疑文件,请email至:virus@kingsoft.net

  数据修复急救,请登陆:http://support.kingsoft.net

国外站点上找的帖子(我试过,管用):
Description
AutoSearch is an IE Browser Helper Object that hijacks address-bar searches. It knows about some of the other prevalent search-hijackers — IGetNet, CommonName and NewDotNet — and will steal back any address bar searches they take over
Also known as
AutoSearchBHO\Hijacker by Ad-Aware. MSInfoSys after its filename.
Distribution
As yet unknown.
What it does
Advertising
No, though Wink/ASWnk does. (See below.)
Any address bar search you do is sent to a single page at www.tunders.com (which includes only static adverts, no search results).
Privacy violation
No.
Security issues
No.
Stability problems
None known.
Removal
Open a DOS command prompt window (from Start->Programs->Accessories) and enter the following commands:
cd "%WinDir%\System"
regsvr32 /u msinfosys.dll
You should now be able to delete the 'msinfosys.dll' file in your System folder (inside the Windows folder; called 'System32' on Windows NT/2000/XP).
It is believed that AutoSearch is installed with or by Wink/ASWnk — check your system for this parasite.
Wink removal
Wink is a family of parasites based around dialler software. It cannot be detected by the script at this site. Some variants of Wink are actual diallers; others have had this function enabled and act as adware. Wink can download and execute arbitrary unsigned code from its controlling server at 204.177.92.204. It also puts an entry in Add/Remove Programs to run a file '[variant name]_uninstall.exe' in the Windows System folder, which fails to work.
Wink can be spotted by opening the registry (click 'Start', choose 'Run', enter 'regedit') and finding the key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run; Wink variants have a characteristic run string ending in '/noconnect'. This entry should be deleted, along with the keys HKEY_CLASSES_ROOT\.WINK, HKEY_CLASSES_ROOT\WINK File and HKEY_CURRENT_USER\Software\SiteIcons. Then restart and delete the program file, which lives in a folder called 'dialers' in 'C:\Program Files'.
Wink/ASWnk: not a dialler. Opens pop-up ads from fassia.net. Program file is ASWnk.exe in a Program Files folder called 'primesoft\ASWnk' (instead of the usual 'dialers').
Wink/nsdlua: not a dialler. Opens pop-up ads from (deep breath) 0-ol1oiz-xolxii1-oxli10ozl1l1-o-l-11-iizxp-l-0o-oll11iz0oil-ol.com. Program file is 'dialers\nsdlua\nsdlua.exe'. This is known to be loaded as a fake pop-up-killer application (which claims it has failed to run), by stopannoyingpopups.com; exploitation of an IE security hole is suspected here.
Wink/hot: various diallers: at least hot_swiss, hot_canada and hotsurprise_in have been seen. Program file is in the form 'dialers\hot_swiss\hot_swiss.exe' (and so on for the other variants).
Wink/UKVideo2: another dialler, program file 'dialers\ukvideo2\ukvideo2.exe'.
Wink/DateMaker: more diallers: at least datemakerspain and datemakerintl have been seen. Program file in the form 'dialers\datemakerspain\datemakerspain.exe' and so on. Uses registry key 'HKEY_CLASSES_ROOT\dting File' instead of 'WINK file'. Detected by Sophos anti-virus as Dial/Datemake and by Panda anti-virus as Trj/Pornspa.


克塞,前来拜访!

恐龙特急克塞号

职务:普通成员
等级:3
金币:3.0
发贴:948
注册:2002/8/13 13:41:31
#22003/6/26 13:57:31
为了大家方便点,我翻译其中一部分(如果说错了,请指正):
清除方法:
重新启动后进入DOS模式,或者直接在“运行”中执行“command”进入dos模式,
运行如下指令:cd "%WinDir%\System" 回车
regsvr32 /u msinfosys.dll 回车
停止该程序与系统挂钩部分的运行?(我个人的理解)
然后在系统的system文件夹内找到msinfosys.dll这个文件并删除,当然,是以win98
为例子。2000和xp就在system32文件夹里找。
然后呢,在注册表里找到
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
找到一个叫“/noconnect”的东西,删除(当然也不一定有这个);
然后在注册表的 HKEY_CLASSES_ROOT里找这几个东西:
HKEY_CLASSES_ROOT\.WINK,
HKEY_CLASSES_ROOT\WINK File ,
HKEY_CURRENT_USER\Software\SiteIcons,把他们都删除
然后重启,启动后删除program files里的名为dialers的文件夹(看来是带
拨号陷阱功能的)
当然,有的如果找不到“dialer”文件夹,那试着找“primesoft”文件夹,删除,变种不
同,生成的方式也不同;
最后,还要做的是系统的清理查找,看还有其他那些可疑的东东,毕竟敌人
不是一成不变的。至于一些细节,大家看上面的E文可能更清楚。


克塞,前来拜访!