{"id":58260,"date":"2018-12-19T09:00:32","date_gmt":"2018-12-19T01:00:32","guid":{"rendered":"https:\/\/blog.trendmicro.com.tw\/?p=58260"},"modified":"2018-12-24T16:44:26","modified_gmt":"2018-12-24T08:44:26","slug":"%e6%9b%be%e6%94%bb%e6%93%8a%e5%85%a8%e7%90%83%e6%9c%80%e5%a4%a7%e7%9f%b3%e6%b2%b9%e5%85%ac%e5%8f%b8shamoon-disttrack-%e7%a3%81%e7%a2%9f%e6%b8%85%e9%99%a4%e7%97%85%e6%af%92%e5%87%ba%e7%8f%be%e4%ba%86","status":"publish","type":"post","link":"https:\/\/blog.trendmicro.com.tw\/?p=58260","title":{"rendered":"\u3010\u8cc7\u5b89\u3011\u66fe\u653b\u64ca\u5168\u7403\u6700\u5927\u77f3\u6cb9\u516c\u53f8Shamoon\/Disttrack \u78c1\u789f\u6e05\u9664\u75c5\u6bd2,\u51fa\u73fe\u4e86\u65b0\u8b8a\u7a2e\uff1a\u4f60\u9700\u8981\u77e5\u9053\u4ec0\u9ebc"},"content":{"rendered":"<blockquote><p>2012\u5e74<a href=\"https:\/\/www.informationsecurity.com.tw\/article\/article_detail.aspx?aid=7012\">\u5168\u7403\u6700\u5927\u77f3\u6cb9\u516c\u53f8\u906d\u99ed 75%\u96fb\u8166\u53d7\u611f\u67d3<\/a>, \u8cc7\u5b89\u5c08\u5bb6\u5206\u6790\uff0c\u9020\u62103\u842c\u90e8\u96fb\u8166\u53d7\u5f71\u97ff\u7684\u5c31\u662fShamoon\u75c5\u6bd2\u30022016\u5e74\u5a92\u9ad4\u5831\u5c0e<a href=\"https:\/\/technews.tw\/2016\/12\/02\/state-sponsored-attack-shaudi-arab\/\">\u6c99\u70cf\u5730\u963f\u62c9\u4f2f\u906d\u5230\u300c\u570b\u5bb6\u7d1a\u300d\u99ed\u5ba2\u653b\u64ca ,<\/a>Shamoon \u60e1\u610f\u7a0b\u5f0f\u51fa\u73fe\u5347\u7d1a\u7248\uff0c\u653b\u64ca\u6c99\u570b\u6578\u500b\u653f\u5e9c\u6a5f\u95dc\u3002\u8fd1\u65e5<u><a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2651&amp;name=20110916\">\u8da8\u52e2\u79d1\u6280<\/a><\/u>\u770b\u5230\u4e86\u60e1\u540d\u662d\u5f70\u7684\u78c1\u789f\u6e05\u9664\u75c5\u6bd2Shamoon\uff08\u53c8\u7a31Disttrack\uff09\u51fa\u73fe\u66f4\u65b0\u7248\u672c\u7684<a href=\"https:\/\/www.axios.com\/infamous-shamoon-malware-re-emerges-14911c5b-11e0-4bea-8549-1dc8a6f93848.html\">\u5831\u5c0e<\/a>\u3002\u540c\u6642\u4e5f\u767c\u73fe\u4e86\u597d\u5e7e\u500b\u6b64\u7248\u672cShamoon \u7684\u6a23\u672c\uff08\u8da8\u52e2\u79d1\u6280\u5075\u6e2c\u70ba<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/threat-encyclopedia\/malware\/TROJAN.WIN32.DISTTRACK.AA\">Trojan.Win32.DISTTRACK.AA<\/a>\u548c Trojan.Win64.DISTTRACK.AA\uff09\u3002\u96d6\u7136\u7121\u6cd5\u78ba\u8a8d\u6b64\u7248\u672c\u7684\u75c5\u6bd2\u662f\u5426\u771f\u7684\u6709\u5728\u5916\u9762\u6563\u64ad\uff0c\u4f46\u6211\u5011\u6b63\u5728\u5206\u6790\u6b64\u75c5\u6bd2\u4f86\u78ba\u8a8d\u5176\u529f\u80fd\uff0c\u56e0\u70ba\u5b83\u6240\u53ef\u80fd\u5e36\u4f86\u7684\u7834\u58de\u6027\u5f71\u97ff\u3002<\/p><\/blockquote>\n<p>\u8da8\u52e2\u79d1\u6280\u7684<a href=\"https:\/\/www.trendmicro.tw\/business\/xgen-security.html\">\u8da8\u52e2\u79d1\u6280XGen&#x2122; \u9632\u8b77<\/a>\u900f\u904e\u4e3b\u52d5\u5f0f\u6280\u8853\uff08\u5982\u884c\u70ba\u5206\u6790\u548c\u9ad8\u4fdd\u771f\u6a5f\u5668\u5b78\u7fd2\uff09\u80fd\u5920\u4fdd\u8b77\u4f7f\u7528\u8005\u548c\u4f01\u696d\u4e0d\u6703\u906d\u53d7\u6b64\u78c1\u789f\u6e05\u9664\u75c5\u6bd2\u5f71\u97ff\u3002\u4ee5\u4e0b\u662f\u4f7f\u7528\u8005\u548c\u4f01\u696d\u95dc\u65bc\u6700\u65b0\u7684Shamoon\u75c5\u6bd2\u6240\u9700\u8981\u77e5\u9053\u7684\u8cc7\u8a0a\uff1a<\/p>\n<figure id=\"attachment_58261\" class=\"thumbnail wp-caption aligncenter\" style=\"width: 810px\"><a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/12\/20180416230512968-613-ul62r9c-800.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-58261 size-full\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/12\/20180416230512968-613-ul62r9c-800.jpg\" alt=\"Shamoon\/Disttrack\u78c1\u789f\u6e05\u9664\u75c5\u6bd2\u51fa\u73fe\u4e86\u65b0\u8b8a\u7a2e\uff1a\u4f60\u9700\u8981\u77e5\u9053\u4ec0\u9ebc\" width=\"800\" height=\"533\" data-wp-pid=\"58261\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/12\/20180416230512968-613-ul62r9c-800.jpg 800w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/12\/20180416230512968-613-ul62r9c-800-300x200.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/12\/20180416230512968-613-ul62r9c-800-768x512.jpg 768w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/12\/20180416230512968-613-ul62r9c-800-30x20.jpg 30w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/12\/20180416230512968-613-ul62r9c-800-600x400.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><figcaption class=\"caption wp-caption-text\">Shamoon\/Disttrack\u78c1\u789f\u6e05\u9664\u75c5\u6bd2\u51fa\u73fe\u4e86\u65b0\u8b8a\u7a2e\uff1a\u4f60\u9700\u8981\u77e5\u9053\u4ec0\u9ebc<\/figcaption><\/figure>\n<p><strong>\u4ec0\u9ebc\u662fShamoon\/Disttrack<\/strong><strong>\uff1f<\/strong><\/p>\n<p>Shamoon\uff08\u6216\u7a31Disttrack\uff09\u8815\u87f2\u662f\u7a2e\u78c1\u789f\u6e05\u9664\u75c5\u6bd2\u3002\u5b83\u6703\u8986\u84cb\u6389\u53d7\u611f\u67d3\u96fb\u8166\u5167\u7684\u6a94\u6848\uff0c\u540c\u6642\u6703\u611f\u67d3\u4e3b\u958b\u6a5f\u7d00\u9304\uff08MBR\uff09\u3002\u5b83\u7684\u7b2c\u4e00\u4ee3\u6703\u8986\u84cb\u6389\u6587\u4ef6\u3001\u5716\u50cf\u3001\u5f71\u7247\u548c\u97f3\u6a02\u6a94\uff0c\u6e05\u9664MBR\u4e26\u63db\u6210\u71c3\u71d2\u65d7\u5e5f\u7684\u5716\u6a94\u3002\u7b2c\u4e8c\u4ee3\u4f7f\u7528\u7684\u662f\u5f35\u6709\u540d\u7684\u96e3\u6c11\u7167\u7247\u3002<\/p>\n<p>\u65b0\u7248\u672c\u7684Shamoon\u4f3c\u4e4e\u5177\u5099\u76f8\u540c\u7684MBR\u6e05\u9664\u529f\u80fd\u3002\u800c<a href=\"https:\/\/www.axios.com\/infamous-shamoon-malware-re-emerges-14911c5b-11e0-4bea-8549-1dc8a6f93848.html\">\u64da\u5831<\/a>\u8ddf\u4e4b\u524d\u522a\u9664\u66ff\u63db\u6a94\u6848\u7684\u7248\u672c\u4e0d\u540c\u7684\u662f\uff0c\u9019\u6b21\u6709\u4e0d\u53ef\u9006\u8f49\u7684\u52a0\u5bc6\u6a94\u6848\u529f\u80fd\u3002\u5b83\u4f3c\u4e4e\u4e5f\u7f3a\u5c11\u4e00\u4e9b\u5143\u4ef6\uff0c\u4f8b\u5982\u7528\u65bc\u7db2\u8def\u6a6b\u5411\u79fb\u52d5\u53ca\u547d\u4ee4\u548c\u63a7\u5236\uff08C&amp;C\uff09\u901a\u8a0a\u7684\u9810\u8a2d\u6191\u8b49\u3002\u6211\u5011\u9084\u5728\u9032\u884c\u5206\u6790\u4e2d\uff0c\u4e00\u65e6\u6709\u66f4\u65b0\u8cc7\u8a0a\u5c31\u80fd\u5920\u52a0\u4ee5\u78ba\u8a8d\u3002<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\u9019\u65b0\u7248\u672c\u7684Shamoon\/Disttrack<\/strong><strong>\u6709\u5be6\u969b\u5728\u5916\u6563\u64ad\u55ce\uff1f<\/strong><\/p>\n<p>\u6839\u64da\u5831\u5c0e\uff0c\u4e00\u500b\u5305\u542b\u6700\u65b0\u7248 Shamoon\u7684\u6a94\u6848\u5f9e\u7fa9\u5927\u5229\u4e0a\u50b3\u5230VirusTotal\u3002\u6211\u5011\u4e26\u6c92\u6709\u767c\u73fe\u4efb\u4f55\u8de1\u8c61\u986f\u793a\u6b64\u7248\u672c\u7684Shamoon\u6709\u5728\u5916\u64f4\u6563\u3002<\/p>\n<p><!--more--><\/p>\n<p><strong>\u9019\u65b0\u7248\u672c\u7684Shamoon\/Disttrack<\/strong><strong>\u5982\u4f55\u904b\u4f5c\uff1f<\/strong><\/p>\n<p>\u6211\u5011\u6700\u521d\u7684\u7814\u7a76\u986f\u793a\u5b83\u8ddf\u4e00\u500b\u820a\u7248\u672cShamoon\u985e\u4f3c\uff0c\u4e0d\u904e\u505a\u4e86\u4e00\u4e9b\u4fee\u6539\u3002\u6bd4\u65b9\u8aaa\u5b83\u5c07\u670d\u52d9\u548c\u6a94\u6848\u540d\u7a31\u5f9e<em>NtertSrv<\/em>\u8b8a\u66f4\u70ba<em>MaintenaceSrv<\/em>\u3002\u6b64\u7248\u672c\u7684Shamoon\u6703\u5f71\u97ff32\u4f4d\u5143\u548c64\u4f4d\u5143\u7684Windows\u7cfb\u7d71\u3002<\/p>\n<p>\u5b83\u9084\u662f\u5177\u5099\u8986\u5beb\u53d7\u611f\u67d3\u7cfb\u7d71\u78c1\u789f\u7684\u80fd\u529b\uff0c\u4e26\u53ef\u80fd\u4f7f\u7528\u4ee5\u4e0b\u6a94\u540d\uff08\u653e\u5165\u7cfb\u7d71\u8cc7\u6599\u593e\u4e26\u4f5c\u70ba%System%\\{\u6e05\u9664\u7a0b\u5f0f\u540d\u7a31}\u57f7\u884c\uff09\uff1a<\/p>\n<ul>\n<li>exe<\/li>\n<li>exe<\/li>\n<li>exe<\/li>\n<li>exe<\/li>\n<li>exe<\/li>\n<li>exe<\/li>\n<li>exe<\/li>\n<li>exe<\/li>\n<li>exe<\/li>\n<li>exe<\/li>\n<li>exe<\/li>\n<li>exe<\/li>\n<li>exe<\/li>\n<li>exe<\/li>\n<li>exe<\/li>\n<li>exe<\/li>\n<li>exe<\/li>\n<li>exe<\/li>\n<li>exe<\/li>\n<\/ul>\n<p>\u6211\u5011\u9084\u8a8d\u70ba\u6b64\u7248\u672cShamoon\u6c92\u6709\u8a2d\u5b9a\u597d\u3002\u6bd4\u65b9\u8aaa\uff0c\u5b83\u5177\u5099\u6aa2\u67e5\u4f7f\u7528\u8005\u5e33\u5bc6\u4f86\u9032\u884c\u7db2\u8def\u6563\u64ad\u7684\u7a0b\u5f0f\u78bc\uff0c\u4f46\u662f\u7f3a\u4e4f\u5217\u8868\u8cc7\u8a0a\u3002\u5b83\u9084\u5177\u5099\u4e86C&amp;C\u901a\u8a0a\u7684\u7a0b\u5f0f\u78bc\uff0c\u4f46\u6c92\u6709C&amp;C\u76f8\u95dc\u8cc7\u8a0a\u3002\u53e6\u4e00\u500b\u7f3a\u5c11\u7684\u5143\u4ef6\u662f\u6240\u4f7f\u7528\u7684\u5716\u6a94\u3002\u5b83\u5177\u5099\u6aa2\u67e5\u8986\u5beb MBR\u6240\u7528\u5716\u6a94\u7684\u7a0b\u5f0f\u78bc\uff0c\u4f46\u7f3a\u5c11\u61c9\u8a72\u5b58\u653e\u5716\u6a94\u7684\u8cc7\u6e90\u201cGRANT\u201d\u3002\u5b83\u9084\u80fd\u5920\u6aa2\u67e5\u5206\u5272\u5340\uff0c\u4f46\u662f\u8a2d\u5b9a\u70ba\u4e0d\u57f7\u884c\u3002\u6839\u64da\u9019\u5e7e\u9ede\uff0c\u6211\u5011\u8a8d\u70ba\u6b64\u7248\u672cShamoon\u7684\u4f5c\u8005\u6b63\u5728\u6e2c\u8a66\u4ed6\u5011\u7684\u60e1\u610f\u8edf\u9ad4\uff0c\u771f\u6b63\u7684\u60e1\u610f\u8edf\u9ad4\u7248\u672c\u61c9\u8a72\u662f\u6703\u5728\u4e4b\u5f8c\u51fa\u73fe\u3002<\/p>\n<p>\u4ee5\u4e0b\u662f\u653b\u64ca\u93c8\u7684\u6982\u89c0:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/shamoon-disttrack-v3-attack-chain.jpg\" width=\"907\" height=\"757\" \/><\/p>\n<h3><strong>Shamoon\/Disttrack<\/strong><strong>\u5982\u4f55\u6563\u64ad\uff1f<\/strong><\/h3>\n<p>Shamoon\u5c07\u81ea\u5df1\u8907\u88fd\u5230\u7cfb\u7d71\u7ba1\u7406\u5171\u7528\u8cc7\u6599\u593e\u4f86\u9032\u884c\u6563\u64ad\u3002Shamoon\u8815\u87f2\u6703\u900f\u904e\u4e0b\u5217\u5171\u7528\u7db2\u8def\u7ba1\u7406\u8cc7\u6599\u593e\u6563\u64ad\uff1aADMIN$\uff0cC$\\WINDOWS\uff0cD$\\WINDOWS\u548cE$\\WINDOWS\u3002<\/p>\n<h3><strong>\u70ba\u4ec0\u9ebc Shamoon\/Disttrack<\/strong><strong>\u503c\u5f97\u6ce8\u610f\uff1f<\/strong><\/h3>\n<p>Shamoon\u66fe\u7d93\u88ab\u7528\u5728\u5c0d\u4e2d\u6771\u77e5\u540d\u7d44\u7e54\u548c\u4f01\u696d\u7684\u91dd\u5c0d\u6027\u653b\u64ca\uff0c\u7279\u5225\u662f\u5728<a href=\"https:\/\/www.reuters.com\/article\/us-saudi-cyber-idUSKBN1571ZR\">\u6c99\u70cf\u5730\u963f\u62c9\u4f2f<\/a>\u3002\u800c\u4e14\u53e6\u5916\u503c\u5f97\u6ce8\u610f\u7684\u662f\uff0c<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/the-middle-eastern-and-north-african-underground-where-culture-and-cybercrime-meet\">\u4e2d\u6771\u53ca\u5317\u975e\u5730\u4e0b\u4e16\u754c<\/a>\u7684\u99ed\u5ba2\u548c\u6210\u54e1\u4e5f\u90fd\u5728\u8a0e\u8ad6Shamoon\u3002\u5b83\u56e0\u70ba\u4f7f\u7528\u653f\u6cbb\u610f\u5473\u7684\u5716\u7247\u8986\u84cb\u6389\u53d7\u611f\u67d3\u7cfb\u7d71\u7684MBR\u800c\u77e5\u540d\u3002<\/p>\n<p>Shamoon\u80fd\u5920\u8b93\u9023\u5230\u76ee\u6a19\u7d44\u7e54\u7db2\u57df\u7684\u7aef\u9ede\u548c\u4f3a\u670d\u5668\u7121\u6cd5\u958b\u6a5f\u3002\u7576Shamoon\u57282016\u5e7412\u6708\u518d\u5ea6\u51fa\u73fe\u6642\uff0c\u5b83\u5728\u7a0b\u5f0f\u4e2d\u52a0\u5165\u908f\u8f2f\u70b8\u5f48\u4f86\u7e5e\u904e\u6c99\u7bb1\u5075\u6e2c\u3002\u6703\u5728\u6307\u5b9a\u7684\u65e5\u671f\u548c\u6642\u9593\u555f\u52d5\u4e26\u690d\u5165\u5143\u4ef6\u3002<\/p>\n<p>\u5916\u90e8\u65b0\u805e\u6307\u51fa\uff0c\u65b0\u7248Shamoon\u4f3c\u4e4e\u5177\u6709\u76f8\u540c\u7684\u529f\u80fd\u3002\u5b83\u88ab\u8a2d\u5b9a\u57282017\u5e7412\u67087\u65e5\u665a\u4e0a11\u664251\u5206\u555f\u52d5\uff0c\u53ef\u80fd\u662f\u7a2e\u7acb\u5373\u57f7\u884c\u60e1\u610f\u8edf\u9ad4\u7684\u65b9\u5f0f\u3002<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Shamoon\/Disttrack<\/strong><strong>\u7684\u4e09\u500b\u7248\u672c\u6709\u4f55\u4e0d\u540c\uff1f<\/strong><\/h3>\n<p>\u4ee5\u4e0b\u662f\u4e09\u500b\u7248\u672c\u7684 Shamoon\u5728\u884c\u70ba\u65b9\u9762\u7684\u4e0d\u540c\u4e4b\u8655\uff1a<\/p>\n<table  class=\" table table-hover\" width=\"0\">\n<tbody>\n<tr>\n<td width=\"76\"><strong>\u884c\u70ba<\/strong><\/td>\n<td width=\"151\"><strong>\u7248\u672c<\/strong><strong> 1 * (2012<\/strong><strong>\u5e74<\/strong><strong>)<\/strong><\/td>\n<td width=\"180\"><strong>\u7248\u672c<\/strong><strong> 2 (2016)<\/strong><\/td>\n<td colspan=\"3\" width=\"213\"><strong>\u7248\u672c<\/strong><strong> 3 * (2018)<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"76\"><strong>\u7522\u751f\u5305\u542b\u5c07\u8986\u5beb\u6a94\u6848\u6a94\u8def\u5f91\u7684\u65e5\u8a8c\u6a94<\/strong><\/td>\n<td width=\"151\">f1.inf\uff0cf2.inf\uff0cnet{4\u96a8\u6a5f\u5b57\u5143}<\/td>\n<td width=\"180\">netimm173.pnf\uff0cusbvideo324.pnf<\/td>\n<td width=\"196\"><em>%Windows%\\inf\\averbh_noav.pnf or %Windows%\\inf\\mdmnis5tQ1.pnf<\/em>\uff08\u53ea\u5305\u542b\u52a0\u5bc6\u6a94\u6848\u6578\u91cf\uff09<\/td>\n<td colspan=\"2\" width=\"17\"><\/td>\n<\/tr>\n<tr>\n<td width=\"76\"><strong>\u6e05\u9664<\/strong><strong>MBR<\/strong><\/td>\n<td width=\"151\">\u75280x30000\u4f4d\u5143\u8986\u5bebMBR\u548c\u5206\u5272\u5340\uff08\u4f7f\u7528\u640d\u58de\u7684\u5716\u6a94\uff09<\/td>\n<td width=\"180\">\u75280x4e00\u4f4d\u5143\u8986\u5bebMBR\u548c\u5206\u5272\u5340\uff08\u4f7f\u7528\u96e3\u6c11\u5716\u7247\uff09<\/td>\n<td colspan=\"3\" width=\"213\">\u009f\u00a0\u00a0 \u8986\u5bebMBR\u7684\u7b2c\u4e00\u500b\u78c1\u5340\uff08200\u4f4d\u5143\uff0c\u4f7f\u7528\u96a8\u6a5f\u8cc7\u6599\uff09<\/p>\n<p>\u009f\u00a0\u00a0 \u6703\u6aa2\u67e5\u5206\u5272\u5340\uff0c\u4f46\u8a2d\u5b9a\u70ba\u4e0d\u57f7\u884c<\/p>\n<p>\u009f\u00a0\u00a0 \u5177\u5099\u6aa2\u67e5\u5716\u6a94\u7684\u7a0b\u5f0f\u78bc\uff0c \u4f46\u7f3a\u5c11\u4e86\u6a19\u8a18\u70ba\u201cgrant\u201d \u7684\u8cc7\u6e90<\/td>\n<\/tr>\n<tr>\n<td width=\"76\"><strong>\u89f8\u767c\u6642\u9593<\/strong><\/td>\n<td width=\"151\">SetSystemTime\uff082012\u5e748\u6708\uff09 \u2013 \u5c07\u65e5\u671f\u8a2d\u70ba\u6b64\u65e5\u671f<\/td>\n<td width=\"180\">CheckSystemTime\uff082016\u5e7411\u670817\u65e5\u81f32016\u5e7412\u670831\u65e5\u958b\u59cb\uff09 \u2013 \u4f5c\u70ba\u89f8\u767c\u9ede\u800c\u4e0d\u662f\u5f37\u5236<\/td>\n<td colspan=\"3\" width=\"213\">SetSystemTime\uff082012\u5e748\u6708\uff09 \u2013 \u5c07\u65e5\u671f\u8a2d\u70ba\u6b64\u65e5\u671f<\/td>\n<\/tr>\n<tr>\n<td width=\"76\"><strong>\u5b89\u88dd\u3001\u8907\u88fd\u81ea\u8eab\u548c\u81ea\u52d5\u555f\u52d5<\/strong><\/td>\n<td width=\"151\">\u670d\u52d9\u540d\u7a31\uff1atrksvr<br \/>\n\u986f\u793a\u540d\u7a31\uff1aDistributed Link Tracking Server<br \/>\n\u5716\u6a94\u8def\u5f91\uff1a<em>%System%\\trksvr.exe<\/em><\/td>\n<td width=\"180\">\u670d\u52d9\u540d\u7a31\uff1aNtsSvr<br \/>\n\u986f\u793a\u540d\u7a31\uff1aMicrosoft Network Realtime Inspection Service<br \/>\n\u5716\u6a94\u8def\u5f91\uff1a\u009f\u00a0\u00a0 <em>%System%\\ntssrvr32.exe<\/em>\u009f\u00a0\u00a0 <em>%System%\\ntssrvr64.exe<\/em><\/td>\n<td colspan=\"3\" width=\"213\">\u670d\u52d9\u540d\u7a31\uff1aMaintenaceSvr<\/p>\n<p>\u986f\u793a\u540d\u7a31\uff1aMaintenace Host Service Image<br \/>\n\u5716\u50cf\u8def\u5f91\uff1a<\/p>\n<p>\u009f\u00a0\u00a0 <em>%System%\\MaintenaceSvr32.exe LocalService<\/em><\/p>\n<p>\u009f\u00a0\u00a0 <em>%System%\\MaintenaceSvr64.exe LocalService<\/em><\/td>\n<\/tr>\n<tr>\n<td width=\"76\"><strong>\u690d\u5165\u8def\u5f91\u3001\u6a94\u6848\u540d\u7a31\u548c\u50b3\u64ad\u90fd\u76f8\u540c<\/strong><\/td>\n<td colspan=\"4\" width=\"541\">%System%\\{\u96a8\u6a5f\u6a94\u540d}.exe\uff08\u6e05\u9664\u7a0b\u5f0f\uff09<\/p>\n<p>%System%\\netinit.exe\uff08\u7248\u672c1\u548c 2\uff09\uff0c%System%\\{\u96a8\u6a5f\u6a94\u540d}.exe\uff08\u7248\u672c3\uff09 \u2013 \u7db2\u8def<\/p>\n<p>%System%\\Drivers\\drdisk.sys, %Windows%\\hdv_725x.sys\uff08\u7248\u672c3\uff09<\/p>\n<p>&nbsp;<\/p>\n<p>This worm drops copies of itself in the following shared folders:<\/p>\n<p>\\\\{IP address}\\ADMIN$\\system32\\{\u96a8\u6a5f\u6a94\u540d}.exe<\/p>\n<p>\\\\{IP address}\\C$\\WINDOWS\\system32\\{\u96a8\u6a5f\u6a94\u540d}.exe<\/p>\n<p>\\\\{IP address}\\D$\\WINDOWS\\system32\\{\u96a8\u6a5f\u6a94\u540d}.exe<\/p>\n<p>\\\\{IP address}\\E$\\WINDOWS\\system32\\{\u96a8\u6a5f\u6a94\u540d}.exe<\/td>\n<td width=\"3\"><\/td>\n<\/tr>\n<tr>\n<td width=\"76\"><\/td>\n<td width=\"151\"><\/td>\n<td width=\"180\"><\/td>\n<td width=\"196\"><\/td>\n<td width=\"14\"><\/td>\n<td width=\"3\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><em>Shamoon<\/em><em>\u7684\u7b2c\u4e00\u500b\u548c\u7b2c\u4e09\u500b\u7248\u672c\u5c07SetSystemTime<\/em><em>\u8a2d\u5b9a\u8a2d\u70ba2012<\/em><em>\u5e748<\/em><em>\u6708\u4f86\u8b93%Windows%\\hdv_725x.sys<\/em><em>\u57f7\u884c<\/em>\u3002<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>\u8a72\u5982\u4f55\u62b5\u79a6 <\/strong><\/h3>\n<h3><strong>\uff1f<\/strong><\/h3>\n<p>\u5efa\u8b70\u4f7f\u7528\u8005\uff08\u7279\u5225\u662f\u4f01\u696d\uff09\u8981\u52a0\u5f37\u7e31\u6df1\u9632\u79a6\u4f86\u9632\u8b77\u7db2\u8def\u908a\u754c\uff0c\u5305\u62ec\u4e86\u4ee5\u4e0b\u63aa\u65bd\uff1a<\/p>\n<ul>\n<li><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/virtual-patching-patch-those-vulnerabilities-before-they-can-be-exploited\">\u4fee\u88dc<\/a>\u548c\u66f4\u65b0\u7cfb\u7d71\u4ee5<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/patching-problems-and-how-to-solve-them\">\u9632\u6b62<\/a>\u906d\u53d7\u6f0f\u6d1e\u653b\u64ca\u3002<\/li>\n<li><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/virtualization-and-cloud\/best-practices-backing-up-data\">\u5b9a\u671f\u5099\u4efd<\/a>\u91cd\u8981\u8cc7\u6599\u4ee5\u6e1b\u8f15\u640d\u5bb3\u3002<\/li>\n<li>\u5f37\u5236\u57f7\u884c\u6700\u4f4e\u6b0a\u9650\u539f\u5247\uff1a\u505c\u7528\u904e\u6642\u7684\u5916\u639b\u7a0b\u5f0f\u6216\u5143\u4ef6\uff1b\u63a1\u7528\u6c99\u7bb1\u5206\u6790\u3001\u8cc7\u6599\u5206\u985e\u548c\u7db2\u8def\u5206\u6bb5\uff0c\u9032\u4e00\u6b65\u6e1b\u5c11Shamoon\u9032\u884c\u78c1\u789f\u6e05\u9664\u548c\u6a94\u6848\u8986\u5beb\u7684\u6a5f\u6703\u3002<\/li>\n<li>\u63a1\u7528\u591a\u5c64\u6b21\u5b89\u5168\u9632\u8b77\u6a5f\u5236\uff0c\u5982<a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps\/endpoint.html\">\u61c9\u7528\u7a0b\u5f0f\u63a7\u5236<\/a>\u80fd\u5920\u9632\u6b62\u4e0d\u9700\u8981\u6216\u53ef\u7591\u7684\u7a0b\u5f0f\u57f7\u884c\uff0c\u9084\u6709\u884c\u70ba\u76e3\u63a7\u53ef\u4ee5\u963b\u6b62\u7570\u5e38\u7684\u7cfb\u7d71\u4fee\u6539\u3002<\/li>\n<li>\u90e8\u7f72<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/security-technology\/best-practices-deploying-an-effective-firewall\">\u9632\u706b\u7246<\/a>\u53ca<a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/network\/intrusion-prevention.html\">\u5165\u4fb5\u9632\u79a6\u5075\u6e2c\u7cfb\u7d71<\/a>\u4f86\u4e3b\u52d5\u76e3\u8996\u5167\u7db2\u662f\u5426\u51fa\u73fe\u6a6b\u5411\u79fb\u52d5\u6216\u60e1\u610f\u6d41\u91cf\u7684\u8de1\u8c61\u3002<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>@\u539f\u6587\u51fa\u8655\uff1a<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/new-version-of-disk-wiping-shamoon-disttrack-spotted-what-you-need-to-know\">New Version of Disk-Wiping Shamoon\/Disttrack Spotted: What You Need to Know<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>2012\u5e74\u5168\u7403\u6700\u5927\u77f3\u6cb9\u516c\u53f8\u906d\u99ed 75%\u96fb\u8166\u53d7\u611f\u67d3, \u8cc7\u5b89\u5c08\u5bb6\u5206\u6790\uff0c\u9020\u62103\u842c\u90e8\u96fb\u8166\u53d7\u5f71\u97ff\u7684\u5c31\u662fShamoon\u75c5\u6bd2 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[3347,4126],"tags":[4129,4128,4127,4130,3865,1283],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/58260"}],"collection":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=58260"}],"version-history":[{"count":0,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/58260\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=58260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=58260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=58260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}