Avira 病毒搜索

TR/Crypt.EPACK.24962

  • 名称
    TR/Crypt.EPACK.24962
  • 发现日期
    2016年2月25日
  • 类型
    Malware
  • 影响
     
  • 报告的感染
     
  • 操作系统
    Windows
  • VDF 版本
    7.11.98.122 (2013-08-27 21:08)

术语“TR”指的是能够窥探数据、侵犯您的隐私或对系统进行不需要的修改的特洛伊木马。

此文件可由恶意用户或恶意软件用来降低安全设置级别。

操作系统:Microsoft Windows。

  • VDF
    7.11.98.122 (2013-08-27 21:08)
  • 别名
    Avast: Win32:Malware-gen
    AVG: FileCryptor.HOO
    Dr. Web: Trojan.Encoder.3976
    Trend Micro: Ransom_LOCKY.E
    Microsoft: Ransom:Win32/Locky.A
    G Data: Trojan.GenericKD.3066022
    Kaspersky Lab: Trojan-Ransom.Win32.Locky.ba
    Bitdefender: Trojan.GenericKD.3066022
    ESET: Win32/Filecoder.Locky.A trojan
  • 文件
    重命名以下文件:
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\excel4.xls
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\excel.xls
    • %USERPROFILE%\Templates\winword2.doc
    • %USERPROFILE%\Templates\powerpnt.ppt
    • %USERPROFILE%\Templates\excel4.xls
    • %USERPROFILE%\Templates\excel.xls
    • %USERPROFILE%\Templates\winword.doc
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\winword2.doc
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\winword.doc
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\powerpnt.ppt
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\eula.1040.rtf
    • %DISKDRIVE%\totalcmd\REGISTER.RTF
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\eula.1028.rtf
    • %USERPROFILE%\Templates\quattro.wb2
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\quattro.wb2
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\eula.1037.rtf
    • %DISKDRIVE%\AUTOEXEC.BAT
    • %temporary internet files%\Content.IE5\QH9ZEEV0\deliver[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\dapmsn[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\download[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\Q9HNXVQDZNM[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\select[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\sf.dwnld[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\3eh[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\script_300_250[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\adframe[2].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\4a0253de6eac448d8f2c39c53f8926[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\abg[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\render_ads[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\min[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\show_ads[2].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\A524879_300_250[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\jquery.outerhtml[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\modernizr.custom.90514[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\jquery-1.4.2.min[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\fZnvW9PtDSQ[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\dd_belatedpng[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\ec22e9952c2296e3b17de63cd1bea1f2[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\anatm[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\deliver[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\ga[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\beacon[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\8WhVgFJlDOQ[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\bootstrap[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\script_300_250[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\en[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\jquery-1.5.1[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\jquery[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\min[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\show_ads_impl[2].js
    • %USERPROFILE%\Cookies\biluta@www.msn[1].txt
    • %USERPROFILE%\Cookies\[email protected][2].txt
    更改以下文件:
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\excel4.xls
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\excel.xls
    • %USERPROFILE%\Templates\winword2.doc
    • %USERPROFILE%\Templates\powerpnt.ppt
    • %USERPROFILE%\Templates\excel4.xls
    • %USERPROFILE%\Templates\excel.xls
    • %USERPROFILE%\Templates\winword.doc
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\winword2.doc
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\winword.doc
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\powerpnt.ppt
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\eula.1040.rtf
    • %DISKDRIVE%\totalcmd\REGISTER.RTF
    • %DISKDRIVE%\AUTOEXEC.BAT
    • %temporary internet files%\Content.IE5\QH9ZEEV0\deliver[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\dapmsn[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\download[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\Q9HNXVQDZNM[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\select[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\sf.dwnld[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\3eh[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\script_300_250[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\adframe[2].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\4a0253de6eac448d8f2c39c53f8926[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\abg[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\render_ads[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\min[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\show_ads[2].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\A524879_300_250[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\jquery.outerhtml[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\modernizr.custom.90514[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\jquery-1.4.2.min[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\fZnvW9PtDSQ[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\dd_belatedpng[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\ec22e9952c2296e3b17de63cd1bea1f2[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\anatm[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\deliver[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\ga[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\beacon[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\8WhVgFJlDOQ[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\bootstrap[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\script_300_250[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\en[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\jquery-1.5.1[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\jquery[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\min[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\show_ads_impl[2].js
    • %USERPROFILE%\Cookies\biluta@www.msn[1].txt
    • %USERPROFILE%\Cookies\[email protected][2].txt
    • %USERPROFILE%\Cookies\biluta@www.bing[1].txt
    • %USERPROFILE%\Cookies\[email protected][2].txt
    • %USERPROFILE%\Cookies\[email protected][1].txt
    • %USERPROFILE%\Cookies\b[email protected][1].txt
    创建以下文件:
    • %DISKDRIVE%\totalcmd\_Locky_recover_instructions.txt
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\_Locky_recover_instructions.txt
    • %USERPROFILE%\Templates\_Locky_recover_instructions.txt
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\_Locky_recover_instructions.txt
    • %DISKDRIVE%\_Locky_recover_instructions.txt
    • %temporary internet files%\Content.IE5\QH9ZEEV0\_Locky_recover_instructions.txt
    • %temporary internet files%\Content.IE5\LV2JIAKP\_Locky_recover_instructions.txt
    • %temporary internet files%\Content.IE5\5KMEPSXE\_Locky_recover_instructions.txt
    • %temporary internet files%\Content.IE5\A9SFWXZG\_Locky_recover_instructions.txt
    • %USERPROFILE%\Cookies\_Locky_recover_instructions.txt
  • 注册表
    会添加以下注册表项目:
    • [HKEY_CURRENT_USER\Software\Locky] "id" = "74203292F1D3897A" "pubkey" = %hex values% "paytext" = %hex values%
  • HTTP 请求
    • 91.*****.97.170/main.php

将可疑文件/URL 送予我们分析,帮助构建更加安全的网站。

提交您的文件/URL 或者 转到 Avira 疑难解答

为何提交可疑文件?

如果您遇到不在我们数据库中的可疑文件或网站,我们将对其进行分析,确定其是否有害。我们的分析结果将惠及数百万用户,并将纳入下一次病毒数据库更新。如果您已经拥有 Avira,则会获取此更新。尚未拥有 Avira? 请前往 获取

什么是 Avira 疑难解答?

这是我们大力发展的社区,由专业技术人员和兼职专家通力合作,为广大用户解决技术问题。这一 Avira 用户社群是提出问题的绝佳场所。