【求助】VBS_REDLOF.A要怎麼去除....救救我



贊助商連結


linyih
2002-08-26, 08:41 PM
pccillin掃到一隻叫VBS_REDLOF.A的病毒....
但是處理的時候都是到隔離所那邊 殺不掉....
我找過了很多地方都沒有寫要怎麼完全移除...
包括這裡的文章...
有人能提供如何根治這病毒的方法嗎...??
感激不盡......:boldred:

贊助商連結


siliva
2002-08-27, 12:10 AM
親愛的網友:
幫您找了一下解決方法,建議以後若遇到如此情形不妨利用trend & symantec做線上查詢不僅快速且有整體解決之道
trend : http://www.trend.com.tw/vinfo/
symantec:http://search.symantec.com/custom/us/query.html


以下是trend的解決方法請參考:

Launch the Registry Editor. Click Start>Run, type REGEDIT then hit the Enter key.
In the left panel, double click the following:
HKEY_LOCAL_MACHINE>Software>Microsoft>Windows
>CurrentVersion>\Run
In the right panel, look for and then delete this registry entry. %System% is the Windows System directory usually locateed at C:\Windows\System or C:\WinNT\System32:
Kernel32 ?System%\Kernel.dll?

這裡是symantec對此病毒的解決方法
%windir% is a variable. The worm locates the Windows main installation folder (by default this is C:\Windows or C:\Winnt) and copies itself to that location.

The virus makes the following changes to the registry to allow execution of .dll files as script files:
1. It sets the (Default) value of the registry key

HKEY_CLASSES_ROOT\.dll

to

dllfile

2. In the registry key

HKEY_CLASSES_ROOT\.dll

the virus changes the value

Content Type

to

application/x-msdownload

3. In the registry key

HKEY_CLASSES_ROOT\dllFile

the virus changes these values:

DefaultIcon

is changed to

HKEY_CLASSES_ROOT\vxdfile\DefaultIcon

ScriptEngine

is changed to

VBScript

ScriptHostEncode

is changed to

{85131631-480C-11D2-B1F9-00C04F86C324}

4. In the registry key

HKEY_CLASSES_ROOT\dllFile\Shell\Open\Command\

the virus changes the (Default) value to

"%windir%\WScript.exe ""%1"" %*"

or

"%windir%\System32\WScript.exe ""%1"" %*"

5. In the registry key

HKEY_CLASSES_ROOT\dllFile\ShellEx\PropertySheetHandlers\WSHProps

the virus changes the (Default) value to

{60254CA5-953B-11CF-8C96-00AA00B8708C}

The virus searches for files that have the file extensions .html, .htm, .asp, .php, .jsp, and .vbs in all folders and on all drives, and infects those files.

HTML.Redlof.A spreads by adding itself as the default stationery that is used to create email messages:
1. It either copies itself to C:\Program Files\Common Files\Microsoft Shared\Stationery\Blank.htm, or if that file already exists, it appends itself to the file.
2. It then sets Outlook Express to use stationery by default. To do this, it sets the value to 1 in the following registry key:

HKEY_CURRENT_USER\Identities\[Default Use ID]\Software\Microsoft\
Outlook Express\[Outlook Version].0\Mail\Compose Use Stationery

3. Then, if the following values do not exist, they will created with the following values:

In the registry key

HKEY_CURRENT_USER\Identities\[Default Use ID]\Software\Microsoft\
Outlook Express\[Outlook Version].0\Mail

the virus changes the value

Stationery Name

to

C:\Program Files\Common Files\Microsoft Shared\Stationery\blank.htm

In the registry key

HKEY_CURRENT_USER\Identities\[Default Use ID]\Software\Microsoft\
Outlook Express\[Outlook Version].0\Mail\HKEY_CURRENT_USER\Identities\[Default Use ID]\Software\Microsoft\
Outlook Express\[Outlook Version].0\Mail

the virus changes the value

Wide Stationery Name

to

C:\Program Files\Common Files\Microsoft Shared\Stationery\blank.htm

4. In the registry key

HKEY_CURRENT_USER\Software\Microsoft\Office\
9.0\Outlook\Options\Mail

the virus sets the value

EditorPreference

to

131072

5. Next, if the following values do not exist they will be created and set to "blank":

The value:

001e0360

in the registry key:

HKEY_CURRENT_USER\Software\Microsoft\Windows Messaging Subsystem\
Profiles\Microsoft Outlook Internet Settings\0a0d020000000000c000000000000046

The value:

001e0360

in the registry key:

HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\
Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet Settings\
0a0d020000000000c000000000000046

The value:

NewStationery

in the registry key:

HKEY_CURRENT_USER\Software\Microsoft\Office\
10.0\Common\MailSettings

6. Finally, in the registry key

HKEY_CURRENT_USER\Software\Microsoft\Office\
10.0\Outlook\Options\Mail\EditorPreference

the virus sets the value

EditorPreference

to

131072






Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":

Turn off and remove unneeded services. By default, many operating systems install auxiliary services that are not critical, such as an FTP server, telnet, and a Web server. These services are avenues of attack. If they are removed, blended threats have less avenues of attack and you have fewer services to maintain through patch updates.
If a blended threat exploits one or more network services, disable, or block access to, those services until a patch is applied.
Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services.
Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.
Configure your email server to block or remove email that contains file attachments that are commonly used to spread viruses, such as .vbs, .bat, .exe, .pif and .scr files.
Isolate infected computers quickly to prevent further compromising your organization. Perform a forensic analysis and restore the computers using trusted media.
Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.


To remove this virus, update the virus definitions, run a full system scan, and delete all files that are detected as HTML.Redlof.A. For details on how to do this, read the following instructions.

To scan with Norton AntiVirus and delete the infected files:

1. Obtain the most recent virus definitions. There are two ways to do this:
Run LiveUpdate, which is the easiest way to obtain virus definitions. These virus definitions have undergone full quality assurance testing by Symantec Security Response and are posted to the LiveUpdate servers one time each week (usually Wednesdays) unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, look at the Virus Definitions (LiveUpdate) line at the top of this write-up.
Download the definitions using the Intelligent Updater. Intelligent Updater virus definitions have undergone full quality assurance testing by Symantec Security Response. They are posted on U.S. business days (Monday through Friday). They must be downloaded from the Symantec Security Response Web site and installed manually. To determine whether definitions for this threat are available by the Intelligent Updater, look at the Virus Definitions (Intelligent Updater) line at the top of this write-up.

Intelligent Updater virus definitions are available here. For detailed instructions on how to download and install the Intelligent Updater virus definitions from the Symantec Security Response Web site, click here.

2. Start Norton AntiVirus (NAV), and make sure that NAV is configured to scan all files.
NAV Consumer products: Read the document How to configure Norton AntiVirus to scan all files.
NAV Enterprise products: Read the document How to verify a Symantec Corporate antivirus product is set to scan All Files.
3. Run a full system scan.
4. Delete all files that are detected as HTML.Redlof.A. Replace deleted files from a clean backup or reinstall them.

linyih
2002-08-27, 01:02 AM
謝謝這位熱心的網友
這個我有看過 也有試過了
不過我引用了trend的方法....
也把它偵測有毒的檔也一一殺掉了..
後來我發現 再重新掃一次的時候
原來的地方還有毒...
要不然就是看不到.....
感覺好像殺不掉似的...
真的是很傷腦筋......
不知道有什麼更好的方法嗎...???
此外...賽門鐵客提供的方法感覺做的很徹底
但是有點看不懂...
因為我也照了做了
不知道是否我英文欠佳
造成我步驟上有缺失....
能有人可以白話一點嗎???
感激不盡......:)
:circle: