1. Este site usa cookies. Ao continuar a usar este site está a concordar com o nosso uso de cookies. Saber Mais.

Praga

Discussão em 'Dúvidas e Suporte—Internet, Redes, Segurança' iniciada por rik007, 3 de Maio de 2008. (Respostas: 2; Visualizações: 515)

  1. rik007

    rik007 Power Member

    Ola a todo eu tenho o kasperky anti-hacker e o panda internet security e de 1min em 1min ta sempre a aparecer no anti-hacker "an lovesan attack was detect on your machine" e no panda so a parece as vezes (e ao mesmo tempo que o anti-hacker) .
    Esto farto quando é que aquele "fi...d.p." me larga a alguma maneira de resolver isso.
    ja tive haver na net e diz que é um trojan tirei isto de um site:
    ------------------------------------------
    Aliases Net-Worm.Win32.Lovesan.a (Kaspersky Lab) is also known as: Worm.Win32.Lovesan.a (Kaspersky Lab), W32/Blaster.worm.a (McAfee), W32.Blaster.Worm (Symantec), Win32.HLLW.LoveSan.based (Doctor Web), W32/Blaster-A (Sophos), Win32/Msblast.A (RAV), WORM_MSBLAST.A (Trend Micro), Worm/Lovsan.A (H+BEDV), W32/Msblast.A (FRISK), Win32:Blaster (ALWIL), Worm/Lovsan.A (Grisoft), Worm.Lovesan.A (SOFTWIN), Worm.Blaster.A (ClamAV), W32/Blaster (Panda), Win32/Lovsan.A (Eset) Description added Aug 12 2003 Behavior Internet Worm Technical details Lovesan is an Internet Worm which exploits the DCOM RPC vulnerability in Microsoft Windows described in MS Security Bulletin MS03-026. Lovesan is written in C using the LCC compiler. The worm is a Windows PE EXE file about 6KB (compressed via UPX - 11KB when decompressed).
    Lovesan downloads and attempts to run a file named msblast.exe.
    The text is as follows:
    I just want to say LOVE YOU SAN!!
    billy gates why do you make this possible? Stop making money and fix your software!!​
    Symptoms of Infection:
    • MSBLAST.Exe in the Windows system32 folder.
    • Error message: RPC service failure. This causes the system to reboot.
    How the Worm Spreads
    Lovesan registers itself in the autorun key when the system reboots and launches itself every time the computer reboots in the future:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
    windows auto update="msblast.exe"​
    The worm then scans IP addresses, attempting to connect to 20 random IP addresses and infect any vulnerable machines. Lovesan sleeps for 1.8 seconds and scans the next 20 IP addresses. Lovesan scans IP addresses following one of the patterns below:
    1. In 3 out of 5 cases Lovesan selects random base IP addresses (A.B.C.D) where D is equal to 0, while A, B and C are random numbers between 0 and 255.
    2. In the remaining 2 out of 5 cases Lovesan scans the subnet and gets the local IP address of the infected machine, extracts values A and B from it and sets D to 0. Then the worm extracts the C value. If C is less than or equal to 20, then Lovesan does not modify C. Thus, if the local IP address is 207.46.14.1 the worm will scan IP addresses starting from 207.46.14.0
      If C is greater than 20, than Lovesan selects a random value between C and C-19. Thus, if the IP address of the infected machine is 207.46.134.191 the worm will scan IP addresses 207.46.{115-134}.0
    The worm sends a buffer-overrun request to vulnerable machines via TCP port 135. The newly infected machine then initiates the command shell on TCP port 4444. Lovesan runs the thread that opens the connection on port 4444 and waits for FTP 'get' request from the victim machine. The worm then forces the victim machine to sends the 'FTP get' request. Thus the victim machine downloads the worm from the infected machine and runs it. The victim machine is now also infected.


    Other Information
    Once a computer is infected the system sends an error message about RPC service failure and may reboot the machine.
    As of August 16, 2003 Lovesan will launch DDoS attacks on the Windowsupdate.com server.
    ---------------------------------------------------



    como resolver
     
    Última edição: 3 de Maio de 2008
  2. DarkButterfly

    DarkButterfly Power Member

    Sim, faz a análise com o Hijackthis. No entanto,se conseguires por ti, elimina isto:

    - msblast.exe
    - \msblast_unpacked.exe

    e elimina estes valores do registo:

    windows auto update

    E faz verificação anti-spyware. Tens aplicações gratuitas e excelentes. Caso ainda não tenhas: Spybot Search and Destroy, SUPERAntiSpyware.
     

Partilhar esta Página