微軟於2010/7/16公佈了一項新的0-day弱點
目前已有病毒利用該弱點透過USB裝置散播
此病毒不 再使用autorun.inf自動執行的方式感染電腦
而是製作一個.lnk類型檔案指向病毒檔案 利用該弱點在系統中執行
因此關閉自動播放功能的電腦仍有中毒的可能性
相關文章及解決方案:
- Ivanlef0u's Blog CVE-2010-2568 shorcut Lnk + PoC (Google translated to English)
- Exploitdb Microsoft Windows Automatic LNK Shortcut File Code Execution (PoC by Ivanf0u)
- Microsoft Security Advisory (2286198) Vulnerability in Windows Shell Could Allow Remote Code Execution
- Brian Krebs Experts Warn of New Windows Shortcut Flaw
- InReverse About TmpHider/Stuxnet #1 by swirl
- Wilders Security Forums - Rootkit.TmpHider
- Microsoft Malware Protection Center - The Stuxnet Sting
- Microsoft Malware Protection Center - WinNT/Stuxnet.A
- Threatexpert - Win32/Stuxnet.A
- ESET (Windows) Shellshocked, Or Why Win32/Stuxnet Sux… by David Harley (with special thanks to Juraj Malcho, Aleksander Matrosov and their colleagues)
- Aleksander Matrosov http://twitpic.com/24z86b "Rootkit.TmpHider is signed with signature of Realtek Corp" http://bit.ly/a1BHaZ" /via @_MDL_
- Sophos Windows shortcut vulnerability with rootkit - detailed video demo
- Mitigating .LNK Exploitation With Ariad — Didier Stevens
- Windows zero-day attack works on all Windows systems by Chester Wisniewski
Sandbox分析:
http://www.threatexpert.com/report.aspx?md5=74ddc49a7c121a61b8d06c03f92d0c13
Virustotal:
016169ebebf1cec2aad6c7f0d0ee9026 received on 2010.07.16 11:55:58 (UTC)
http://www.virustotal.com/analisis/743e16b3ef4d39fc11c5e8ec890dcd29f034a6eca51be4f7fca6e23e60dbd7a1-1279281358
Result: 25/41 (60.98%)
a-squared 5.0.0.31 2010.07.16 Trojan-Dropper.Win32.Stuxnet!IK
AhnLab-V3 2010.07.16.00 2010.07.15 Dropper/Win32.Stuxnet
AntiVir 8.2.4.12 2010.07.16 TR/Drop.Stuxnet.D
Avast 4.8.1351.0 2010.07.16 Win32:Trojan-gen
Avast5 5.0.332.0 2010.07.16 Win32:Trojan-gen
AVG 9.0.0.836 2010.07.16 SHeur3.XLI
BitDefender 7.2 2010.07.16 Win32.Worm.Stuxnet.A
Comodo 5446 2010.07.16 TrojWare.Win32.Rootkit.Stuxnet.a
DrWeb 5.0.2.03300 2010.07.16 Trojan.Stuxnet.1
F-Secure 9.0.15370.0 2010.07.16 Trojan.Agent.AQCK
GData 21 2010.07.16 Win32.Worm.Stuxnet.A
Ikarus T3.1.1.84.0 2010.07.16 Trojan-Dropper.Win32.Stuxnet
Kaspersky 7.0.0.125 2010.07.16 Trojan-Dropper.Win32.Stuxnet.d
McAfee 5.400.0.1158 2010.07.16 Stuxnet
McAfee-GW-Edition 2010.1 2010.07.16 Heuristic.LooksLike.Win32.NewMalware.B
Microsoft 1.6004 2010.07.16 TrojanDropper:Win32/Stuxnet.A
NOD32 5283 2010.07.16 Win32/Stuxnet.A
nProtect 2010-07-16.01 2010.07.16 Trojan.Agent.AQCK
PCTools 7.0.3.5 2010.07.16 Rootkit.Stuxnet
Prevx 3.0 2010.07.16 Medium Risk Malware
Sophos 4.55.0 2010.07.16 Troj/Stuxnet-A
Sunbelt 6591 2010.07.16 Trojan.Win32.Generic!BT
Symantec 20101.1.1.7 2010.07.16 Trojan.Gen
VBA32 3.12.12.6 2010.07.16 Trojan-Spy.0485
VirusBuster 5.0.27.0 2010.07.16 Trojan.DR.Stuxnet.C
Additional information
File size: 517632 bytes
MD5 : 74ddc49a7c121a61b8d06c03f92d0c13
微軟0-day弱點詳細資訊請參考下列網頁
http://www.microsoft.com/technet/security/advisory/2286198.mspx
參考網頁:
http://threatinfo.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_STUXNET.A&Vsect=T
http://contagiodump.blogspot.com/2010/07/cve-2010-2568-lnk-vunerability-stuxnet.html
參考網頁:
http://threatinfo.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_STUXNET.A&Vsect=T
http://contagiodump.blogspot.com/2010/07/cve-2010-2568-lnk-vunerability-stuxnet.html
0 意見: