Symantec Norton关于PWSteal.Lemir.Gen的描述与杀毒办法

发布者:admin发布时间:2006-08-27浏览次数:164

Symantec Norton关于PWSteal.Lemir.Gen的描述与杀毒办法

(http://www.symantec.com/avcenter/venc/data/pwsteal.lemir.html)
(http://www.symantec.com/avcenter/venc/data/pwsteal.lemir.e.html)

病毒描述:

    PWSteal.Lemir.Gen is a generic detection for a group of Trojan horses that attempts to steal passwords from the "Legend of Mir 2" online game and send them to the author of the Trojan.

    技术说明:

    When PWSteal.Lemir.Gen is executed, it performs the following actions:

1.      Copies itself as %System%\<filename>.

Notes:

       Depending on variants, <filename> will vary.

       %System% is a variable. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).

2.      Depending on the variant, it adds a value:

"<value>"="%System%\<filename>"


to one or both of the registry keys:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices

so that the Trojan runs when you start Windows.

3.      May stop the processes of antivirus and firewall software.

4.      May restart itself, if the process is stopped. This is often done by starting multiple identical processes that restart each other.

5.      Locates and sends the "Legend of Mir 2" password back to the Trojan's author.

    杀毒步骤:

    The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.

    Disable System Restore (Windows Me/XP).
    Update the virus definitions.
    Restart the computer in Safe mode or VGA mode.
    Run a full system scan and delete all the files detected as PWSteal.Lemir.Gen.
    Delete any values that were added to the registry.
    Windows 95/98/Me only: Remove any references to the infected files, which the Trojan added to the Win.ini and System.ini files.
    Clear the Temporary Internet Files folder, if required.

    For specific details on each of these steps, read the following instructions.

    Note: The procedures described in this document are complex and assume that you are familiar with basic Windows and DOS procedures. If you are not, then we suggest that you obtain the services of a qualified computer consultant.

    1. To disable System Restore (Windows Me/XP)
    If you are running Windows Me or Windows XP, we recommend that you temporarily turn off System Restore. Windows Me/XP uses this feature, which is enabled by default, to restore the files on your computer in case they become damaged. If a virus, worm, or Trojan infects a computer, System Restore may back up the virus, worm, or Trojan on the computer.

    Windows prevents outside programs, including antivirus programs, from modifying System Restore. Therefore, antivirus programs or tools cannot remove threats in the System Restore folder. As a result, System Restore has the potential of restoring an infected file on your computer, even after you have cleaned the infected files from all the other locations.

    Also, a virus scan may detect a threat in the System Restore folder even though you have removed the threat.

    Note: When you are completely finished with the removal procedure and are satisfied that the threat has been removed, re-enable System Restore by following the instructions in the aforementioned documents.

    2.To restart the computer in Safe mode or VGA mode,在VGA模式下启用杀毒软件进行扫描杀毒

    3.To delete any values that were added to the registry

    Important: Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, "How to make a backup of the Windows registry," for instructions.

    Click Start > Run.

    Type regedit

    Then click OK.

    Navigate to the key:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

    Refer to the list of the infected files that you created while following the instructions in the previous section. In the right pane, look at the entries in the Name and Data columns.

    If you find an entry that refers to a file detected as infected, select the entry, press Delete, and then click Yes to confirm.

    On Windows 95/98/Me computers, navigate to and select the following key:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices

    Refer to the list of the infected files that you created while following the instructions in the previous section. In the right pane, look at the entries in the Name and Data columns.

    If you find an entry that refers to a file detected as infected, select the entry, press Delete, and then click Yes to confirm.

    Exit the Registry Editor.

    Do one of the following:

    If you are running Windows NT/2000/XP, and the scan did not detect the infected files in the \Temporary Internet Files\Content.IE5 folder, you are done. Restart the computer in Normal mode. For instructions, read the section on returning to Normal mode in the document, "How to start the computer in Safe Mode."

    If you are running Windows NT/2000/XP, and the scan detected the infected files in the \Temporary Internet Files\Content.IE5 folder, skip to section 5.

    If you are running Windows 95/98/Me, proceed with section 4.

    4. Windows 95/98/Me only: To remove references to infected files added to Win.ini and System.ini files

    If you are running Windows 95/98/Me, follow these steps:

    The function you perform depends on your operating system:

    Windows 95/98: Go to step B.

    Windows Me: If you are running Windows Me, the Windows Me file-protection process may have made a backup copy of the Win.ini and System.ini files that you need to edit. If these backup copies exist, they will be in the C:\Windows\Recent folder. Symantec recommends that you delete these files before continuing with the steps in this section. To do this:

    Start Windows Explorer.

    Browse to and select the C:\Windows\Recent folder.

    In the right pane, select the Win.ini file and the System.ini files, and then delete them. Windows will regenerate them.

    Click Start > Run.

    Type the following, and then click OK.

    edit c:\windows\win.ini

    Note: If Windows is installed in a different location, make the appropriate path substitution.

    Important: The following steps instruct you to remove the text from the load= and run= lines of the Win.ini file. If you are using older programs, they may load at startup from one of these lines.

    The Trojan can add lines, such as load=c:\windows\temp\pkg2350.exe or run=hpfsched <blank spaces> msrexe.exe. (In this example, hpfsched is a legitimate program, but msrexe.exe is part of the Trojan.)

    If you are sure that the text contained in these lines is for the programs that you normally use, then we suggest that you do not remove it. If you are not sure, but the text does not refer to the file names you previously noted, then you can prevent the lines from loading by placing a semicolon (;) in the first character position of the line.

    For example:

    ; run=accounts.exe

    In the [windows] section of the file, look for a line that begins with:

    load=

    Position the cursor immediately to the right of the equal (=) sign.

    Press Shift+End to select all the text to the right of the equal sign, and then press Delete.

    Repeat steps E and F for the run= line, which is usually beneath the load= line.

    Click Start > Run.

    Type the following.

    edit c:\windows\system.ini

    and then click OK

    Note: If Windows is installed in a different location, make the appropriate path substitution.

    In the [boot] section, which is usually located near the top of the file, find the line that begins with shell=explorer.exe.

    Position the cursor immediately to the right of explorer.exe.

    Press Shift+End to select all the text to the right of explorer.exe, and then press Delete.

    When you are finished, the line should look like this:

    shell=explorer.exe

    Click File > Exit > Yes (click Yes when you are prompted to save the changes).

    5. To clear the Temporary Internet Files folder, if required

    Restart the computer in Normal mode. For instructions, read the section on returning to Normal mode in the document, "How to start the computer in Safe Mode."

    Log on to the computer using the name that was shown in the path that you wrote down in step 4c.

    For example, if the path was:

    C:\Documents and Setting\Linda\Local Settings\Temporary Internet Files\qrwmqczd.dll

    log on to the computer as Linda.

    Start Internet Explorer.

    Click Tools > Internet Options.

    In the Temporary Internet Files section, click the Delete Files button.

    Check Delete all offline content, and then click OK.