...
首页> 外文期刊>Virus Bulletin >VIRUS ANALYSIS 1 THE WORMPIRE STRIKES BACK
【24h】

VIRUS ANALYSIS 1 THE WORMPIRE STRIKES BACK

机译:病毒分析1蠕虫反击

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

It took less than six months before W32/Welchia (see VB, October 2003, p.10) returned to plague us. The new version has been upgraded to attack different worms and exploit more vulnerabilities. Once again, the author of the worm intended to make a 'good' worm, disregarding the master's warning: 'A Jedi uses the Force for knowledge and defence, never for attack.' When Welchia.B first runs on a machine, it checks for the presence of a mutcx called 'WksPatch_Mutex', and aborts if the mutex already exists, in order to avoid running multiple instances of itself. After creating its mutex, the worm attempts to open a service called 'WksPatch' and query its status. If this service is set to start automatically, then the worm attempts to delete a file called 'svchost.exe' and start the service. Otherwise, the worm copies itself to the '%system%drivers' directory as 'svchost.exe', and creates a service called 'WksPatch', using a random display name.
机译:W32 / Welchia(参见VB,2003年10月,第10页)才花了不到六个月的时间才困扰我们。新版本已经升级,可以攻击各种蠕虫并利用更多漏洞。蠕虫的作者再一次打算制造一种“好”蠕虫,而无视主人的警告:“绝地武士利用部队提供知识和防御力,绝不攻击。”当Welchia.B首次在计算机上运行时,它会检查是否存在称为'WksPatch_Mutex'的互斥体,如果互斥体已经存在,则会中止运行,以避免运行其自身的多个实例。创建其互斥量后,蠕虫会尝试打开名为“ WksPatch”的服务并查询其状态。如果将此服务设置为自动启动,则蠕虫会尝试删除名为“ svchost.exe”的文件并启动该服务。否则,该蠕虫会将自身复制为“ svchost.exe”到“%system%drivers”目录,并使用随机显示名称创建一个名为“ WksPatch”的服务。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号