·çÁ¨¼ÒÇÁÆ®    ÈÞÆó¾÷Á¶È¸    SMS    ÀÚ·á½Ç    VPN   
GLOBAL_MENU
·çÁ¨¼ÒÇÁÆ®
  
  
·çÁ¨¼ÒÇÁÆ® SMS¼¾ÅÍ
¾÷°è ÃÖÀú°¡°Ý ´Ü¹® 9.9¿ø Àå¹® 26¿ø!
´ë·® ¹ß¼Û½Ã °¡°ÝÇùÀÇ °¡´É! Áö±Ý ½ÅûÇϼ¼¿ä
°ÔÀÓ
¸ÖƼ¹Ìµð¾î
À¯Æ¿¸®Æ¼
µ¥½ºÅ©Å¾
ÀÎÅͳÝ
³×Æ®¿öÅ©/¼­¹ö
µå¶óÀ̹ö
¾÷¹«/±³À°
Ŭ¸³¾ÆÆ®/±âŸ
¿¡¹Ä°ÔÀÓ
·çÁ¨¼ÒÇÁÆ® ·çÁ¨VPN
±¹Á¦Ç¥ÁØ PPTP¹æ½Ä Áؼö
KT,LG µà¾ó¹éº»À¸·Î ¾ÈÁ¤¼ºÈ®º¸, 1GB ¼Óµµ
À¯Æ¿¸®Æ¼ > ¹ÙÀÌ·¯½º ¹é½Å
[¾Ë¾àÀü¿ë¹é½Å] 7.7 DDoS Àü¿ë¹é½Å
ÆòÁ¡ 10.0 ¶óÀ̼¾½º ÇÁ¸®¿þ¾î
»ç¿ëÀÚÆòÁ¡   ¿î¿µÃ¼Á¦ 2000,XP,VISTA,
´Ù¿î·Îµå 0 ÆÄÀÏÅ©±â 1.1 MB
Á¦ÀÛ»ç ESTsof µî·ÏÀÏ 2018-07-13 13:40:20
- ÇÁ·Î±×·¥ ¼³¸í

¾Ë¾à¿¡¼­ Á¦°øÇÏ´Â À©µµ¿ì ºÎÆà ¹æÇØ ¾Ç¼ºÄÚµå Àü¿ë¹é½Å(3/17ÀÏ ¾÷µ¥ÀÌÆ®)ÀÔ´Ï´Ù.


Á¦Àۻ缳¸í


¾È³çÇϽʴϱî?
À̽ºÆ®¼ÒÇÁÆ® ¾Ë¾à ±ä±Þ´ëÀÀÆÀÀÔ´Ï´Ù.
ÀÌƲ ÀüºÎÅÍ ½ÃÀÛµÈ 1Â÷ DDoS °ø°Ý¿¡ À̾î, 2Â÷ DDoS °ø°ÝÀÌ ¹ß»ýÇß½À´Ï´Ù.
¾Ë¾à ȨÆäÀÌÁö¿¡¼­´ÂDDoS ¾Ç¼ºÄÚµåÀÇ Á¦°Å¸¦ À§ÇÑ Àü¿ë¹é½ÅÀ» ¹èÆ÷ÇÕ´Ï´Ù.
Àü¿ë¹é½Å¿¡´Â ¾Ç¼ºÄÚµå ÆÐÅÏÀ» ºÐ¼®ÇÏ¿© ŽÁöÇÒ ¼ö ÀÖ´Â ±â´ÉÀÌ Å¾ÀçµÇ¾î ÀÖÀ¸¸ç Ãß°¡·Î ¹ß»ýÇÏ´Â º¯Á¾¿¡ ´ëºñÇϱâ À§ÇÑ ½Å°í ½Ã½ºÅÛÀ» ³»ÀåÇÏ°í ÀÖ½À´Ï´Ù.


±¹°¡ÀûÀ¸·Î ¹®Á¦°¡ µÇ°í ÀÖ´Â DDoS °ø°Ý¿¡ ´ëÀÀÇϱâ À§ÇØ »ç¿ëÀÚ ¿©·¯ºÐµéÀÇ Àû±ØÀûÀÎ ÇùÁ¶¿Í Á¦º¸¸¦ ºÎŹµå¸³´Ï´Ù.
ÀÌ¹Ì ¾Ë¾àÀÌ ¼³Ä¡µÇ¾î ÀÖ´Â PC¿¡¼­´Â ÃֽŠ¾÷µ¥ÀÌÆ® ¹× °Ë»ç¸¦ ÅëÇØ DDoS ¾Ç¼ºÄڵ带 Áø´Ü ¹× Ä¡·á ÇÒ ¼ö ÀÖÀ¸¸ç ½Ç½Ã°£ °¨½Ã¸¦ È°¼ºÈ­ÇÏ¿© ¾Ç¼ºÄÚµåÀÇ ½ÇÇàÀ» ½Ç½Ã°£À¸·Î Â÷´ÜÇÒ ¼ö ÀÖ½À´Ï´Ù.


¾Ë¾àÀÌ ¼³Ä¡µÇ¾î ÀÖÁö ¾ÊÀº »ç¿ëÀÚ´Â ¾Æ·¡ ¸µÅ©¸¦ Ŭ¸¯ÇÏ¿© ¾Ë¾àÀ» ¼³Ä¡ÇÏ°í DDoS ¾Ç¼ºÄڵ带 Â÷´Ü/Ä¡·áÇÕ´Ï´Ù.


[ºÐ¼®Á¤º¸] 


2009³â 7¿ù ÃÊ ¾Ë¾à °í°´½Å°í·Î ÃÖÃÊ Á¢¼ö µÇ¾úÀ¸¸ç,
(ŽÁö¸í: Generic.Mydoom.D82BAA29, ÆÄÀϸí: C:\\WINDOWS\\system32\\msiexec1.exe)
Mydoom°ú °ü·ÃÀÌ ±íÀ¸¸ç Æ®·»µå¸¶ÀÌÅ©·ÎÀÇ °æ¿ì À̹ø ¾Ç¼ºÄڵ带 Mydoom À¸·Î ŽÁöÇÏ°í ÀÖ½À´Ï´Ù. ŽÁö¸í : WORM_MYDOOM.EA
MydoomÀÇ Æ¯Â¡Àº ±âº»ÀûÀ¸·Î IRCº¿ÀÌ°í DoS°ø°ÝÀÌ °¡´ÉÇÕ´Ï´Ù.
¶Ç À̸ÞÀÏ, °øÀ¯ Æú´õ, À©µµ¿ì Ãë¾àÁ¡, P2P¸¦ ÀÌ¿ëÇÏ¿© ÀüÆĸ¦ ½ÃµµÇÕ´Ï´Ù.
ƯÀÌÁ¡Àº Mydoom¿¡¼­ ¾²¿´´ø ¹®ÀÚ¿­ ¾Ïȣȭ ¹æ½ÄÀÌ µ¿ÀÏÇÏ°Ô »ç¿ëµÇ¾ú½À´Ï´Ù.


°ø°Ý ¸®½ºÆ®´Â ¾Æ·¡¿Í °°½À´Ï´Ù.
 
www.president.go.kr
www.whitehouse.gov
www.mnd.go.kr
www.faa.gov
www.mofat.go.kr
www.dhs.gov
www.assembly.go.kr
www.state.gov
www.usfk.mil
www.voanews.com
blog.naver.com
www.defenselink.mil
mail.naver.com
www.nyse.com
banking.nonghyup.com
www.nasdaq.com
ezbank.shinhan.com
finance.yahoo.com
ebank.keb.co.kr
www.usauctionslive.com
www.hannara.or.kr
www.usbank.com
www.chosun.com
www.washingtonpost.com
www.auction.co.kr
www.ustreas.gov
www.mnd.go.kr
www.dot.gov
www.ncsc.go.kr
www.ftc.gov
mail.daum.net


www.nsa.gov
mail.paran.com
www.usps.gov
www.ibk.co.kr
www.yahoo.com
www.hanabank.com
 travel.state.gov
www.wooribank.com
www.site-by-site.com
www.altools.co.kr
www.marketwatch.com
www.ahnlab.com
www.amazon.com
www.egov.go.kr
www.kbstar.com


msiexec(¼ýÀÚ).exe (main dropper)
300kbÀÌ»ó°ú 300kbÀÌÇÏÀÇ ¾Ç¼ºÄÚµå´Â ¼­·Î ´Ù¸¥ ¾Ç¼ºÄڵ带 ¼³Ä¡ÇÏ°í
ÀÚ½ÅÀ» »èÁ¦ ÇÏ¿© ÈçÀûÀ» Áö¿ó´Ï´Ù..
300kbÀÌ»óÀÎ exeÆÄÀÏÀÌ ¼³Ä¡ÇÏ´Â ÆÄÀÏÀº ¸ÞÀÎ ¸ðµâ·Î °ø°Ý ¸ðµâ°ú ¿©·¯ ÆÄÀÏÀ» ¼³Ä¡ÇÕ´Ï´Ù.
µû¶ó¼­ °ø°ÝÇÏ´Â ¸ÞÀÎ ¸ðµâ(dll)ÆÄÀϸ¸ ¼³Ä¡ µÇ¾î ÀÖ´Ù¸é 40kbÀÌÇÏ ÆÄÀϸ¸ ¹èÆ÷Çϸ鼭
°ø°Ý ¸®½ºÆ®¸¦ ½±°Ô ¹Ù²Ü ¼ö ÀÖ½À´Ï´Ù.
(¹Ý´ë·Î °ø°Ý ¹ÞÀ» °÷¿¡¼­ urlÀ» ¹Ù²Û´Ù¸é ¸·À» ¼ö ÀÖ½À´Ï´Ù.)


¼³Ä¡ ÆÄÀÏ ¸ñ·ÏÀº ¾Æ·¡¿Í °°½À´Ï´Ù.
%SYSTEM%Æú´õ
wmiconf.dll (¾Ç¼º, ¸ÞÀθðµâ perfvwr.dll, ntscfg.dll,)
wmcfg.exe (¾Ç¼º, dropper)
Á¤»ó, Winpcap ¸ðµâ(wpcap.dll, packet.dll, wanpacket.dll npf.sys, npptools.dll)
pxdrv.nls (¾ÏȣȭµÈ µ¥ÀÌÅÍ ÆÄÀÏ)
¼³Ä¡ÇÑ wmiconf.dllÀº ºÎÆÃÇÒ ¶§¸¶´Ù ½ÇÇàµÇ°Ô Çϱâ À§ÇØ È£½ºÆ®¼­ºñ½º¿¡ Ãß°¡½Ãŵ´Ï´Ù.
HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\SvcHost
wmiconf
pxdrv.nls ÆÄÀÏÀº »ý¼ºÀ» ½ÃµµÇÏÁö¸¸
213.33.116.41(53), 216.199.83.203(80), 213.23.243.210(443), 190.24.154.148 (443) 81.196.2.239 (443) 200.133.201.135 (443) (¿Ü ´Ù¼ö) ¿¡ Á¢¼Ó¿¡ ¼º°øÇØ¾ß ÇÕ´Ï´Ù.
ÇöÀç´Â ¸ðµÎ Á¢¼Ó ºÒ°¡´ÉÇÑ »óÅÂÀ̸ç, Á¢¼ÓÇϸé ÆÄÀÏÀÌ »ý¼ºµË´Ï´Ù.
¸ÞÀÎ µå·ÎÆÛ(300kbÀÌ»ó)ÀÇ °æ¿ì Á¢¼Ó ÇÒ ip¿Í port°¡ ÀúÀåµÇ¾î ÀÖÀ¸¸ç
(213.33.116.41:53, 216.199.83.203:80, 213.23.243.210:443)
À§´Â º¿¸¶½ºÅÍÀÇ IP·Î ÃßÁ¤ÀÌ µË´Ï´Ù.
Á¢¼Ó½Ã ½ÃµµÇÏ´Â ÆÐŶÀÇ ³»¿ëÀº
!(0x21)¿Í
HTTP/1.1 GET /china/dns? ÀÔ´Ï´Ù.
ÁÖ°í ¹Þ´Â ÆÐŶÀº XOR(0xCC)·Î ¾ÏȣȭÇÕ´Ï´Ù.
(±âÁ¸¿¡ ¼öÁýµÈ pxdrv.nlsÆÄÀÏÀÇ °æ¿ì ¶Ç ´Ù¸¥ ¾Ïȣȭ·Î µÇ¾î ÀÖÀ¸¸ç
¸¶½ºÅÍ·Î ÃßÁ¤µÇ´Â IP°¡ ÀúÀåµÇ¾î ÀÖ°í ´Ù¿î ¹ÞÀ» ¶§¸¶´Ù ´Ù¸¥ ¸ñ·ÏÀ» °¡Áú ¼öµµ ÀÖ½À´Ï´Ù.)
»ý¼ºÇÑ wmcfg.exe¸¦ ½ÇÇàÇÏ°í »ý¼ºÇÑ È£½ºÆ®¼­ºñ½º¸¦ ½ÇÇàÇÕ´Ï´Ù.
¶Ç ssdpapi.dll, Ntmpsvc.dll, Netlgmr.dll, Perfb093.dat, Sysvmd.dll, Regscm.dll, maus.dl ÆÄÀÏÀÌ ÀÖ´ÂÁö üũÇÏ¿© »èÁ¦ ÇÕ´Ï´Ù. (¸ðµÎ ³×Æ®¿öÅ© ¸ð´ÏÅ͸µ °ü·Ã ÆÄÀÏÀ̸ç ÀÖÀ¸¸é ¸ðµÎ »èÁ¦)
wmcfg.exe (dropper)
»ý¼ºµÇ¾î ¼³Ä¡µÈ wmcfg.exe´Â 4°³ÀÇ ¸®¼Ò½º¸¦ °¡Áö°í ÀÖÀ¸¸ç, ¸ðµÎ °¢°¢ÀÇ ÆÄÀÏ·Î »ý¼ºµË´Ï´Ù.
%SYSTEM%Æú´õ¿¡
mstimer.dll
(¾Ç¼ºÄÚµå ´Ù¿î·Î´õ, spam-mailer)
wversion.exe
(µÎ °¡Áö Á¾·ù·Î ¿¹Àü ¹öÀüÀº mstimer.dll ¼­ºñ½º¸¦ »èÁ¦ÇÏ°í, ÃֽŠ¹öÀüÀº ¾Ç¼ºÄÚµå Çϵåµð½ºÅ© Æı«)
%SYSTEM%\\configÆú´õ¿¡
SERVICES
(¾ÏȣȭµÈ µ¥ÀÌÅÍ ÆÄÀÏ, ´Ù¿î·Îµå ÇÒ ÁÖ¼Ò¸¦ ´ã°í ÀÖÀ½, mstimer.dll¿¡¼­ »ç¿ëµÊ)
SERVICES.LOG
(¾ÏȣȭµÈ µ¥ÀÌÅÍ ÆÄÀÏ, »óµ¿, mstimer.dll¿¡¼­ »ç¿ëµÊ)
uregvs.nls (Data File)
nlsÆÄÀÏ¿¡´Â °ø°ÝÇÒ ½Ã°£°ú °ø°ÝÇÒ ¸®½ºÆ®°¡ ÀúÀåµÇ¾î ÀÖÀ¸¸ç, °ø°ÝÇÏ´Â DLL ºÒ·¯¿Í »ç¿ëÇÕ´Ï´Ù.
perfvwr.dll, wmiconf.dll, ntscfg.dll(¸ÞÀÎ °ø°Ý ¸ðµâ)
½ÇÁ¦ ¾Ç¼ºÇàÀ§¸¦ ÇÏ´Â DLLÆÄÀÏÀº nlsÆÄÀÏ¿¡¼­ °ø°ÝÇÒ ½Ã°£°ú url ºÒ·¯¿Í °ø°ÝÇÕ´Ï´Ù.
°ø°Ý½Ã°£Àº GetLocalTime À¸·Î ¾òÀº ½Ã°£À» SystemTimeToVariantTime À¸·Î ½Ç¼ö(float) ÇüÀ¸·Î º¯È¯ÇØ ÀúÀåÇÑ °ÍÀ» »ç¿ëÇÏ°í °ø°Ý ±â°£Àº 2009-07-08 18:00:00ºÎÅÍ 2009-07-09 18:00:00±îÁö¿Í °°Àº Çü½ÄÀ¸·Î 24½Ã°£ µ¿¾È ÁøÇà µË´Ï´Ù.
°ø°Ý¹æ¹ýÀº CCAttack(Cache-Control Attack)À¸·Î Ÿ°Ù¿¡ ¼ö¸¹Àº Á»ºñPC·Î ÇÏ¿©±Ý User-Agent¸¦ Àü¼ÛÇÏ¿© À¥ ¼­¹ö¸¦ ¸¶ºñ½Ãŵ´Ï´Ù.
¶Ç À©µµ¿ì ±âº» ¹æÈ­º®±â´ÉÀ» »ç¿ëÇÏÁö ¾Ê°Ô ÇÕ´Ï´Ù.
MSTIMER.DLL(Trojan horse)
mstimer.dllÀº ´Ù¿î·Îµå ¹× ´Ù¿î·Îµå ¹ÞÀº ÆÄÀÏÀ» ½ÇÇàÇϸç
°¨¿°ÀÚ PCÀÇ ÆÄÀÏÀ» Á¶»çÇÏ¿© E-mailÁÖ¼Ò¸¦ ÃßÃâÇÏ¿© ½ºÆÔÀ» Àü¼ÛÇÕ´Ï´Ù.
´Ù¿î·Îµå ÇÏ´Â ÁÖ¼Ò´Â ¸ðµÎ ¾Ïȣȭ µÇ¾î ÀÖÀ¸¸ç ÃÑ 8°³ÀÇ ÁÖ¼Ò°¡ ÀÖ½À´Ï´Ù.
7¿ù 10ÀÏ ¿ÀÀü 3½Ã 47ºÐ ÇöÀç 8°³Áß 3°³°¡ ´Ù¿î·Îµå°¡ µÇ¸ç ¸ðµÎ °°Àº ÆÄÀÏÀÔ´Ï´Ù.
hxxp://200.6.218.194/flash.gif (O)
hxxp://75.151.32.182/flash.gif (O)
hxxp://202.14.70.116/flash.gif (O)
hxxp://92.63.2.118/flash.gif (X)
hxxp://163.19.209.22/flash.gif (X)
hxxp://201.116.58.131/xampp/img/flash.gif (X)
hxxp://newrozfm.com/img/glyph/flash.gif (X)
hxxp://122.155.5.196/shop/images/flash.gif (X)
´Ù¿îµÈ ÆÄÀÏÀº JPG¿Í RARÆÄÀÏÀÇ Çì´õ°¡ ¾ûÄÑ ÀÖÀ¸¸ç ´Ù¿î·Î´õ´Â ÀÌ ÇÊ¿ä ¾ø´Â ºÎºÐÀ» Á¦°ÅÇÏ¿© ½ÇÇàÆÄÀÏ(exe)ÇüÅ·ΠÀúÀåÇÕ´Ï´Ù.
¶Ç ÀÎÅÍ³Ý Àӽà Æú´õ¿¡¼­ À̸ÞÀÏ ÁÖ¼Ò ¼öÁýÀ» À§ÇØ ¾Æ·¡ÀÇ È®ÀåÀÚ¸¦ ´ë»óÀ¸·Î @(0x40)¿Í .(0x2E)ÀÌ ºÙÀº ¹®ÀÚ¿­À» ¼öÁýÇÕ´Ï´Ù.
(htmb, shtµî ÀϹÝÀûÀÎ È®ÀåÀÚ°¡ ¸ÂÁö ¾ÊÁö¸¸ ¾Õ3¹®ÀÚ¸¸ ºñ±³ÇÔ)
¼öÁýµÈ À̸ÞÀÏ¿¡ ½ºÆÔ¸ÞÀÏÀ» ¹ß¼ÛÇÕ´Ï´Ù.
´Ù¿î·Îµå ¹ÞÀº wversion.exe¸¦ ½ÇÇà ½ÃÅ°´Â Á¶°ÇÀº
win.ini¿¡ ÀÖ´Â LastName°ú ÇöÀç½Ã°£À» ºñ±³ÇÏ¿© wversion.exe¸¦ ½ÇÇàÇÕ´Ï´Ù.
Wversion.exe (µð½ºÅ© Æı«)
PhsycalWriteÇÔ¼ö¸¦ 26¹ø È£ÃâÇÕ´Ï´Ù.
PhysicalDrvNum º¯¼ö´Â ÇÔ¼ö ³»ºÎ¿¡¼­ \\\\.\\PHYSICALDRIVE[¹øÈ£] ¿¡ »ç¿ëÇÏ´Â ¹øÈ£ÀÔ´Ï´Ù.
512 byteÀÇ ¹öÆÛ¸¦ »ý¼ºÇÏ°í 0x55·Î ¸ðµÎ ÃʱâÈ­ ÇÏ°í. Memory of the Independence Day ¹®ÀÚ¿­À» º¹»çÇÕ´Ï´Ù.
(\\\\.\\vwin32 ¸¦ ¿­·Á°í ½ÃµµÇÕ´Ï´Ù.
ÆÄÀÏ ¿­±â°¡ ½ÇÆÐÇÒ °æ¿ì, \\\\.\\PHYSICALDRIVE[¹øÈ£] ¸¦ ¿­¾î¼­ ¹öÆÛ¿¡ ÀÖ´Â °ªÀ» 512 byte¸¸Å­ º¹»çÇÏ¿© µð½ºÅ© µå¶óÀ̺êÀÇ MBRÀ» ¸ðµÎ Æı«ÇÕ´Ï´Ù.
(\\\\.\\PHYSICALDRIVE[¹øÈ£]´Â ¹°¸® Çϵåµð½ºÅ©¸¦ ÀǹÌ)


ÀÌ ÇÁ·Î±×·¥Àº ÇÁ¸®¿þ¾îÀÔ´Ï´Ù.

- ½ºÅ©¸°¼¦