t999主页劫持/篡改木马

使用假冒的小马激活工具导致浏览器主页被劫持至t999.cn。此问题由一种注入隐藏进程的老木马引起,它能释放并加载多个驱动,隐藏自身文件,劫持网络并注入DLL模块到指定浏览器和杀软进程中。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

用了假的小马激活,然后就是各种浏览器主页被劫持/篡改到t999.cn
和以前中过招的wmi脚本病毒不一样,这次所有浏览器的快捷方式并没有被改
但是据有的网友用进程监控看到如下
ProcessMonitor可以看到隐藏进程注入
说明了是被注入了隐藏进程,所以也不关注册表的事

Solution:
比较老的木马了,用常见的杀毒软件(开启云查杀或者更新最新的病毒库)都能查杀
我的查出来病毒是c:\windows\system32\drivers\mssafel.sys
看过一些以前的网帖说是mslmedia.sys,看来这个木马也是在与时俱进

该病毒运行后会释放并加载多个驱动,驱动加载后会隐藏自身文件,劫持网络并注入 dll 模块到指定的浏览器和杀软进程,进行浏览器劫持和杀软对抗。
引自:“黑白通吃”的浏览器劫持木马

select count(AUDITED_UNIT) from( SELECT AUDITED_UNIT_IDS, AUDITED_UNIT_NAMES AS AUDITED_UNIT FROM ( SELECT SUBSTRING_INDEX(SUBSTRING_INDEX(f.involved_department_accounts, ',', b.help_topic_id + 1), ',', -1) AS AUDITED_UNIT_IDS, SUBSTRING_INDEX(SUBSTRING_INDEX(f.involved_department_names, ',', b.help_topic_id + 1), ',', -1) AS AUDITED_UNIT_NAMES, f.PROBLEM_ID, f.PLAN_YEAR, f.UNIT_ID, f.PROJECT_SOURCE FROM ( SELECT '1' AS PROJECT_SOURCE, f.involved_department_accounts, f.involved_department_names, f.ID AS PROBLEM_ID, P.PLAN_YEAR :: INTEGER AS PLAN_YEAR, P.unit_id AS UNIT_ID FROM iam_fact_confirmation_problem f JOIN iam_audit_project P ON f.PROJECT_ID = P.ID JOIN iam_help_topic b ON b.help_topic_id < (LENGTH(f.involved_department_names) - LENGTH(REPLACE(f.involved_department_names, ',', '')) + 1) UNION ALL SELECT '2' AS PROJECT_SOURCE, f.involved_department_accounts, f.involved_department_names, f.ID AS PROBLEM_ID, EXTRACT(YEAR FROM to_timestamp(P.creation_time / 1000)) AS PLAN_YEAR, P.unit_id AS UNIT_ID FROM iam_external_problem f JOIN iam_external_project P ON f.PROJECT_ID = P.ID JOIN iam_help_topic b ON b.help_topic_id < (LENGTH(f.involved_department_names) - LENGTH(REPLACE(f.involved_department_names, ',', '')) + 1) ) f WHERE f.PLAN_YEAR >= :startYear AND f.PLAN_YEAR <= :endYear AND f.UNIT_ID IN (:unitIds) ) t GROUP BY AUDITED_UNIT_IDS, AUDITED_UNIT_NAMES ) t999 这个在查询中 报错 ... 174 common frames omitted Caused by: org.postgresql.util.PSQLException: [10.0.116.108:64607/b.hd.com/172.20.97.226:5432] ERROR: syntax error at or near ":" 位置:749 at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2933) at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2655) at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:376) at org.postgresql.jdbc.PgStatement.runQueryExecutor(PgStatement.java:561) at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:538) at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:396) at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:171) at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:127) at com.zaxxer.hikari.pool.ProxyPreparedStatement.executeQuery(ProxyPreparedStatement.java:52) at com.zaxxer.hikari.pool.HikariProxyPreparedStatement.executeQuery(HikariProxyPreparedStatement.java) at org.hibernate.engine.jdbc.internal.ResultSetReturnImpl.extract(ResultSetReturnImpl.java:57) ... 188 common frames omitted
最新发布
06-28
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值