Avira 病毒搜索

TR/Crypt.ZPACK.230027

  • 名称
    TR/Crypt.ZPACK.230027
  • 发现日期
    2016年2月26日
  • 类型
    Malware
  • 影响
     
  • 报告的感染
     
  • 操作系统
    Windows
  • VDF 版本
    7.12.61.228 (2016-02-24 15:42)

术语“TR”指的是能够窥探数据、侵犯您的隐私或对系统进行不需要的修改的特洛伊木马。

此文件可由恶意用户或恶意软件用来降低安全设置级别。

操作系统:Microsoft Windows。

  • VDF
    7.12.61.228 (2016-02-24 15:42)
  • 别名
    Avast: Win32:Malware-gen
    Dr. Web: Trojan.Encoder.3976
    Microsoft: Ransom:Win32/Locky.A
    G Data: Trojan.GenericKD.3065228
    Kaspersky Lab: Trojan-Ransom.Win32.Locky.ay
    Bitdefender: Trojan.GenericKD.3065228
    ESET: Win32/Filecoder.Locky.A trojan
  • 文件
    创建以下自身的副本:
    • %TEMPDIR%\svchost.exe
    创建以下文件:
    • %TEMPDIR%\sys1.tmp
    • %DISKDRIVE%\totalcmd\_Locky_recover_instructions.txt
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\_Locky_recover_instructions.txt
    • %USERPROFILE%\Templates\_Locky_recover_instructions.txt
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\_Locky_recover_instructions.txt
    • %temporary internet files%\Content.IE5\LV2JIAKP\_Locky_recover_instructions.txt
    • %DISKDRIVE%\_Locky_recover_instructions.txt
    • %temporary internet files%\Content.IE5\5KMEPSXE\_Locky_recover_instructions.txt
    • %temporary internet files%\Content.IE5\QH9ZEEV0\_Locky_recover_instructions.txt
    • %temporary internet files%\Content.IE5\A9SFWXZG\_Locky_recover_instructions.txt
    • %USERPROFILE%\Cookies\_Locky_recover_instructions.txt
    • %DISKDRIVE%\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\_Locky_recover_instructions.txt
    重命名以下文件:
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\excel4.xls
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\excel.xls
    • %USERPROFILE%\Templates\winword2.doc
    • %USERPROFILE%\Templates\winword.doc
    • %USERPROFILE%\Templates\powerpnt.ppt
    • %USERPROFILE%\Templates\excel4.xls
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\winword2.doc
    • %USERPROFILE%\Templates\excel.xls
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\winword.doc
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\powerpnt.ppt
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\eula.1035.rtf
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\eula.1036.rtf
    • %USERPROFILE%\Templates\quattro.wb2
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\eula.1037.rtf
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\quattro.wb2
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\eula.1038.rtf
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\eula.1053.rtf
    • %temporary internet files%\Content.IE5\LV2JIAKP\anatm[1].js
    • %DISKDRIVE%\AUTOEXEC.BAT
    • %temporary internet files%\Content.IE5\LV2JIAKP\dd_belatedpng[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\deliver[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\download[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\ec22e9952c2296e3b17de63cd1bea1f2[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\fZnvW9PtDSQ[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\jquery-1.4.2.min[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\ga[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\min[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\render_ads[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\script_300_250[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\script_300_250[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\8WhVgFJlDOQ[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\abg[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\adframe[2].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\Q9HNXVQDZNM[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\select[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\sf.dwnld[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\modernizr.custom.90514[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\dapmsn[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\deliver[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\en[1].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\3eh[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\jquery-1.5.1[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\jquery[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\4a0253de6eac448d8f2c39c53f8926[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\min[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\show_ads_impl[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\beacon[1].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\bootstrap[2].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\A524879_300_250[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\jquery.outerhtml[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\show_ads[2].js
    • %USERPROFILE%\Cookies\[email protected][1].txt
    • %DISKDRIVE%\eula.3082.txt
    • %DISKDRIVE%\totalcmd\HISTORY.TXT
    • %DISKDRIVE%\totalcmd\KEYBOARD.TXT
    • %DISKDRIVE%\totalcmd\SIZE!.TXT
    • %DISKDRIVE%\eula.1040.txt
    • %DISKDRIVE%\eula.1028.txt
    • %USERPROFILE%\Cookies\[email protected][1].txt
    • %USERPROFILE%\Cookies\[email protected][2].txt
    • %USERPROFILE%\Cookies\[email protected][2].txt
    • %USERPROFILE%\Cookies\[email protected][1].txt
    • %USERPROFILE%\Cookies\[email protected][1].txt
    • %USERPROFILE%\Cookies\biluta@download.mozilla[1].txt
    • %USERPROFILE%\Cookies\[email protected][2].txt
    • %USERPROFILE%\Cookies\[email protected][3].txt
    • %USERPROFILE%\Cookies\[email protected][2].txt
    • %DISKDRIVE%\eula.1031.txt
    • %USERPROFILE%\Cookies\[email protected][2].txt
    • %USERPROFILE%\Cookies\[email protected][1].txt
    • %USERPROFILE%\Cookies\[email protected][2].txt
    • %USERPROFILE%\Cookies\[email protected][2].txt
    • %USERPROFILE%\Cookies\[email protected][1].txt
    • %USERPROFILE%\Cookies\biluta@www.bing[1].txt
    • %USERPROFILE%\Cookies\biluta@www.mozilla[1].txt
    • %USERPROFILE%\Cookies\biluta@www.msn[1].txt
    • %DISKDRIVE%\eula.1033.txt
    • %DISKDRIVE%\eula.1036.txt
    • %DISKDRIVE%\eula.1041.txt
    • %DISKDRIVE%\eula.1042.txt
    • %DISKDRIVE%\eula.2052.txt
    • %temporary internet files%\Content.IE5\QH9ZEEV0\7B238A5D521327A0938532F7CDA6C9[1].jpg
    • %temporary internet files%\Content.IE5\QH9ZEEV0\149691A9C9D2C7D9927BA58028A815[1].jpg
    • %DISKDRIVE%\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg
    • %DISKDRIVE%\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Sunset.jpg
    • %DISKDRIVE%\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Water lilies.jpg
    • %DISKDRIVE%\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Winter.jpg
    • %temporary internet files%\Content.IE5\5KMEPSXE\C93EA9A9E4F1CDA962C3152201E7[1].jpg
    • %temporary internet files%\Content.IE5\LV2JIAKP\ThumbnailServer2[1].jpg
    • %temporary internet files%\Content.IE5\5KMEPSXE\6DED96A3ADF7932AF8D433F6302012[1].jpg
    • %temporary internet files%\Content.IE5\5KMEPSXE\77E5EB6D8A6334F15DAD30304E15AC[1].jpg
    • %temporary internet files%\Content.IE5\5KMEPSXE\90DFA3A7C9CA9E8AE0869AA3D58D[1].jpg
    • %temporary internet files%\Content.IE5\5KMEPSXE\background-mosaic[1].jpg
    • %temporary internet files%\Content.IE5\5KMEPSXE\BING_websearch_2[1].jpg
    • %temporary internet files%\Content.IE5\5KMEPSXE\bottom[1].jpg
    更改以下文件:
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\excel4.xls
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\excel.xls
    • %USERPROFILE%\Templates\winword2.doc
    • %USERPROFILE%\Templates\winword.doc
    • %USERPROFILE%\Templates\powerpnt.ppt
    • %USERPROFILE%\Templates\excel4.xls
    • %USERPROFILE%\Templates\excel.xls
    • %USERPROFILE%\Templates\quattro.wb2
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\eula.1037.rtf
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\quattro.wb2
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\eula.1038.rtf
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\eula.1053.rtf
    • %temporary internet files%\Content.IE5\LV2JIAKP\anatm[1].js
    • %DISKDRIVE%\AUTOEXEC.BAT
    • %temporary internet files%\Content.IE5\LV2JIAKP\dd_belatedpng[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\deliver[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\download[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\ec22e9952c2296e3b17de63cd1bea1f2[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\fZnvW9PtDSQ[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\jquery-1.4.2.min[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\ga[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\min[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\render_ads[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\script_300_250[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\script_300_250[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\8WhVgFJlDOQ[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\abg[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\adframe[2].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\Q9HNXVQDZNM[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\select[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\sf.dwnld[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\modernizr.custom.90514[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\dapmsn[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\deliver[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\en[1].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\3eh[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\jquery-1.5.1[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\jquery[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\4a0253de6eac448d8f2c39c53f8926[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\min[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\show_ads_impl[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\beacon[1].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\bootstrap[2].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\A524879_300_250[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\jquery.outerhtml[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\show_ads[2].js
    • %USERPROFILE%\Cookies\[email protected][1].txt
    • %DISKDRIVE%\eula.3082.txt
    • %DISKDRIVE%\totalcmd\HISTORY.TXT
    • %DISKDRIVE%\totalcmd\KEYBOARD.TXT
    • %DISKDRIVE%\totalcmd\SIZE!.TXT
    • %DISKDRIVE%\eula.1040.txt
    • %DISKDRIVE%\eula.1028.txt
    • %USERPROFILE%\Cookies\[email protected][1].txt
    • %USERPROFILE%\Cookies\[email protected][2].txt
    • %USERPROFILE%\Cookies\[email protected][2].txt
    • %USERPROFILE%\Cookies\[email protected][1].txt
    • %USERPROFILE%\Cookies\[email protected][1].txt
    • %USERPROFILE%\Cookies\biluta@download.mozilla[1].txt
    • %USERPROFILE%\Cookies\[email protected][2].txt
    • %USERPROFILE%\Cookies\[email protected][3].txt
    • %USERPROFILE%\Cookies\[email protected][2].txt
    • %DISKDRIVE%\eula.1031.txt
    • %USERPROFILE%\Cookies\[email protected][2].txt
    • %USERPROFILE%\Cookies\[email protected][1].txt
    • %USERPROFILE%\Cookies\[email protected][2].txt
    • %USERPROFILE%\Cookies\[email protected][2].txt
    • %USERPROFILE%\Cookies\[email protected][1].txt
    • %USERPROFILE%\Cookies\biluta@www.bing[1].txt
    • %USERPROFILE%\Cookies\biluta@www.mozilla[1].txt
    • %USERPROFILE%\Cookies\biluta@www.msn[1].txt
    • %DISKDRIVE%\eula.1033.txt
    • %DISKDRIVE%\eula.1036.txt
    • %DISKDRIVE%\eula.1041.txt
    • %DISKDRIVE%\eula.1042.txt
    • %DISKDRIVE%\eula.2052.txt
    • %temporary internet files%\Content.IE5\QH9ZEEV0\7B238A5D521327A0938532F7CDA6C9[1].jpg
    • %temporary internet files%\Content.IE5\QH9ZEEV0\149691A9C9D2C7D9927BA58028A815[1].jpg
    • %DISKDRIVE%\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg
    • %DISKDRIVE%\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Sunset.jpg
    • %DISKDRIVE%\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Water lilies.jpg
    • %DISKDRIVE%\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Winter.jpg
    • %temporary internet files%\Content.IE5\5KMEPSXE\C93EA9A9E4F1CDA962C3152201E7[1].jpg
    • %temporary internet files%\Content.IE5\LV2JIAKP\ThumbnailServer2[1].jpg
    • %temporary internet files%\Content.IE5\5KMEPSXE\6DED96A3ADF7932AF8D433F6302012[1].jpg
    • %temporary internet files%\Content.IE5\5KMEPSXE\77E5EB6D8A6334F15DAD30304E15AC[1].jpg
    • %temporary internet files%\Content.IE5\5KMEPSXE\90DFA3A7C9CA9E8AE0869AA3D58D[1].jpg
    • %temporary internet files%\Content.IE5\5KMEPSXE\background-mosaic[1].jpg
    • %temporary internet files%\Content.IE5\5KMEPSXE\BING_websearch_2[1].jpg
  • 注册表
    会添加以下注册表项目:
    • [HKEY_CURRENT_USER\Software\Locky] "id" = "74203292F1D3897A" "pubkey" = %hex values% "paytext" = %hex values%
    • [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run] "Locky" = "%TEMPDIR%\svchost.exe"
  • HTTP 请求
    • 185.*****.11.239/main.php

将可疑文件/URL 送予我们分析,帮助构建更加安全的网站。

提交您的文件/URL 或者 转到 Avira 疑难解答

为何提交可疑文件?

如果您遇到不在我们数据库中的可疑文件或网站,我们将对其进行分析,确定其是否有害。我们的分析结果将惠及数百万用户,并将纳入下一次病毒数据库更新。如果您已经拥有 Avira,则会获取此更新。尚未拥有 Avira? 请前往 获取

什么是 Avira 疑难解答?

这是我们大力发展的社区,由专业技术人员和兼职专家通力合作,为广大用户解决技术问题。这一 Avira 用户社群是提出问题的绝佳场所。