http://securityresponse.symantec.com/avcen...gate.ak@mm.html
只要一執行它,它會立刻把所有的.exe檔改成.zmx檔,
並且會把屬性改成系統檔+隱藏檔,
然後再把158K的病毒檔複製成原來的.exe檔名,
Scans all the drives from C to Z. If the drive type is removable, mapped, or fixed, the worm will do the following on all the drives found:
Attempt to rename the extension on all .exe files to .zmx.
Set the attributes to Hidden and System on these files.
Copy itself as the original file name.
而且還會在所有磁碟的根目錄產生AUTORUN.INF 和COMMAND.EXE ,
以及一些奇怪的.RAR檔案,
這個COMMAND.EXE就是病毒檔本身,
你只要點兩下硬碟名稱,
就會自動執行它,
Creates a file named AUTORUN.INF in the root folder of all the drives, except the CD-ROM drives, and copies itself as COMMAND.EXE and setup.RAR into that folder.
Creates a zip file named <filename>.<ext> in the root folder of all the drives, unless the drive letter is A or B.
<filename> will be one of the following:
WORK
setup
Important
bak
letter
pass
and <ext> is one of the following:
RAR
ZIP
This zip file contains a copy of the worm with the file name <filename>.<ext>.
<filename> is one of the following:
WORK
setup
Important
book
email
PassWord
and <ext> is one of the following:
.exe
.com
.pif
.scr
它還會自動用OUTLOOK回信給收件夾裡所有信件的寄件者,
回信的內容我不知道,不過我猜應該也是病毒檔...
Replies to all the incoming messages when they arrive in the mailbox of certain MAPI-compliant email clients, including Microsoft Outlook.
這個病毒當然也會修改登錄檔,把自己常駐在系統裡面,
關也關不掉,
Copies itself as the following:
%Windir%SysTra.exe
%System%ravmond.exe
%System%iexplore.exe
%System%WinHelp.exe
%System%kernel66.dll (With attributes set to Read Only, Hidden, and System.)
Notes:
%Windir% is a variable: The worm locates the Windows installation folder (by default, this is C:Windows or C:Winnt) and copies itself to that location.
%System% is a variable: The worm locates the System folder and copies itself to that location. By default, this is C:WinntSystem32 (Windows NT/2000), or C:WindowsSystem32 (Windows XP).
Creates the following files:
%System%ODBC16.dll
%System%msjdbc11.dll
%System%MSSIGN30.DLL
%System%LMMIB20.DLL
Note: These files are all the same; they are backdoor components of the worm and each 53,760 bytes in size.
Adds the values:
"Program in Windows"="%system%iexplore.exe"
"Protected Storage"="RUNDLL32.exe MSSIGN30.DLL ondll_reg"
"VFW Encoder/Decoder Settings"="RUNDLL32.exe MSSIGN30.DLL ondll_reg"
"WinHelp"="%system%WinHelp.exe"
to the registry key:
HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun
so that the worm runs when you start Windows.
Adds the value:
"SystemTra"="%Windir%SysTra.exe"
to the registry key:
HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersion
RunServices
so that the worm runs as a service when you start Windows 95/98/Me.
Adds the value:
"run"="RAVMOND.exe"
to the registry key:
HKEY_CURRENT_USERSoftwareMicrosoftWindows NTCurrentVersionWindows
so that the worm runs when you start Windows NT/2000/XP.
May create the subkey:
HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionZMXLIB1
Inserts the following line in the [Windows] section of Win.ini file:
run=ravmond.exe
Injects a process-watching routine as a thread into either Explorer.exe or Taskmgr.exe. This remote thread will launch %System%Iexplore.exe if the worm process is stopped.
這病毒厲害的地方是,
它會關掉下面所有防毒軟體的自動防護弁遄A
Terminates all the processes that contain any of the following strings:
KV
KAV
Duba
NAV
kill
RavMon.exe
Rfw.exe
Gate
McAfee
Symantec
SkyNet
rising