Английская Википедия:ExploreZip

Материал из Онлайн справочника
Версия от 18:10, 5 марта 2024; EducationBot (обсуждение | вклад) (Новая страница: «{{Английская Википедия/Панель перехода}} {{Short description|Computer worm}} '''ExploreZip''' (also known as '''I-Worm.ZippedFiles'''<ref name=":0">{{Cite web|url=http://www.symantec.com/security_response/writeup.jsp?docid=2000-121514-1418-99|last=|first=|date=May 1, 2007|title=Worm.ExploreZip|url-status=|archive-url=https://web.archive.org/web/20160205185611/http://www.symantec.com/security_response/writeup.jsp?docid=2000-12...»)
(разн.) ← Предыдущая версия | Текущая версия (разн.) | Следующая версия → (разн.)
Перейти к навигацииПерейти к поиску

Шаблон:Short description ExploreZip (also known as I-Worm.ZippedFiles[1]) is a destructive computer worm that attacks machines running Microsoft Windows. It was first discovered in Israel on June 6, 1999.[2] The worm contains a malicious payload, and utilizes Microsoft Outlook, Outlook Express, or Exchange to mail itself out by replying to unread messages in the user's inbox. The worm also searches mapped drives and networked computers for Windows installations. If found, it copies itself to the Windows folder of the remote computer and then modifies the Win.ini file of the infected computer. On January 8, 2003, Symantec discovered a packed variant of this threat which exhibits the same characteristics.[1]

Distribution

The worm is distributed in the form of an e-mail with the words:

Hi !

I have received your email and I shall send you a reply ASAP.

Till then, take a look at the attached zipped docs.

bye[3]

Payload

The message includes an attachment with the name ZIPPED_FILES.EXE.[3] If opened, a dialog box appears in Windows resembling the one normally appearing when opening a corrupted Zip archive, while the worm copies itself onto the machine's hard drive. It also modifies the WIN.INI file (Windows 9x) or the Windows Registry (Windows NT) so that it re-executes on reboot.

The worm looks for a copy of Microsoft Outlook to mail itself to all other people in the user's address book. It then destroys Microsoft Office documents, C, C++, and assembly language source files[3] on the user's hard drive by overwriting them with zero-byte files.

References

Шаблон:Reflist

External links

Шаблон:Malware-stub