chat.com_ - Trojan-Dropper.Win32.Agent.btt New malicious software was found in this file. It's detection will be included in the next update. Thank you for your help.
>>354シマンテックからの返事 \l■exe Our automation was unable to identify any malicious content in this submission. The file will be stored for further human analysis
Our automation was unable to identify any malicious content in this submission. The file will be stored for further human analysis
a. [IPネットワークアドレス] 211.13.228.0/24 b. [ネットワーク名] RAGNAROK-JP2 f. [組織名] ガンホー・オンライン・エンターテイメント株式会社 m. [管理者連絡窓口] YT6546JP n. [技術連絡担当者] YT6546JP p. [ネームサーバ] ns01.idc.jp p. [ネームサーバ] ns02.idc.jp p. [ネームサーバ] ns03.idc.jp [割当年月日] 2006/05/29 [返却年月日] [最終更新] 2006/08/23 15:44:03(JST)
登録情報、福建アモイ。 IPは福建に隣接した浙江省。 Domain Name:fs18■net Registrant: Zhang san. 121212@1212ssss.com +86.101234567 Zhang san. Fujian provinceXiamen City Xiamen,Tianjin,CHINA 200060 Record created on 2007/9/13
>>622 NOD32 ro.exe - Win32/PSW.Maran.FF trojan qq.exe - probably a variant of Win32/AutoRun.Q worm hx.exe - probably a variant of Win32/Genetik trojan ah.c - a variant of Win32/TrojanDownloader.Ani.Gen trojan
Kaspersky wu.htm : No malicious code was found in this file.(危険コードなし) kiss.htm : Trojan-Downloader.VBS.Psyme.ic dns.htm : Trojan-Downloader.JS.Psyme.lr test.exe : Trojan.Win32.Inject.fy(←次のパターン更新で対応)
Thank you for submitting the samples to us. We have analysed them and developed detection patterns for them. Starting with our next regular update, the following detections will be available:
http://www■lineagecojp■com/rbt1/main■htm http://www■zhangweijp■com/rbt1/main1■htm http://www■zhangweijp■com/rbt1/ie■html -> 404 not found http://www■lineagecojp■com/rbt1/Ms06014■htm http://www■lineagecojp■com/rbt1/test■cur http://www■lineagecojp■com/rbt1/rbt1■exe -> 404 not found