Kebetulan sekali lg bahas av..

 

Minggu lalu saya instal ANSAV di pc.. 

Iseng2 saya mau merubah tanggal / jam dobel klik di pojok kanan bawah, tiba2 
muncul mssg THREAD FOUND.

 

Nama thread nya- Honey.romantic 

Object location: c:\windows\system32\rundl32.exe

 

Link: 
*ttp://s520.photobucket.com/albums/w325/uskasin/?action=view&current=av.jpg

(tanda bintang diganti “H”…)

 

1.      File tersebut tidak bisa di-delete oleh ANSAV.
2.      Ketika mencari file tersebut di lokasinya, saya tidak menemukan file 
rundl32.exe tersebut…
3.      Selain ANSAV, saya menggunakan av NOD32 versi ESSET v.4 – namun NOD 
tidak menemukan thread tersebut…kenapa yah ?
4.      So, posisi nya saya tidak bisa edit tanggal.
5.      kemudian saya un-instal ANSAV diganti dgn PCMAV… hasilnya thread 
tersebut tidak ditemukan & saya bisa edit settingan tanggal / jam.

 

Kenapa bs gt yah ?

Kenapa thread tersebut hanya di detect oleh ANSAV sebagai thread…

 


                        
                 
        
                         
 


Uskasin

PT. BORAL PIPE & PRECAST INDONESIA

GRAHA MOBISEL 3RD Fl

Jl. Buncit Raya no. 139

Jakarta Selatan

www.boral.au

 

   _____  

From: [email protected] [mailto:[email protected]] On Behalf Of 
Aay Cosmas
Sent: Monday, 16 November 2009 9:11 AM
To: [email protected]
Subject: Re: [BinusNet] (unknown)

 

  

Yanto Chiang, terima kasih atas infonya.

Akhirnya saya pake smadav.

Tapi anehnya setelah saya pake smadav, software excel & vypress tidak bisa 
dipake.

Ok. Tq.

--- On Wed, 11/11/09, yanto chiang <HYPERLINK 
"mailto:yanto_chiang%40yahoo.com"[email protected]> wrote:

From: yanto chiang <HYPERLINK 
"mailto:yanto_chiang%40yahoo.com"[email protected]>
Subject: Re: [BinusNet] (unknown)
To: HYPERLINK "mailto:binusnet%40yahoogroups.com"[email protected]
Date: Wednesday, November 11, 2009, 1:15 PM

 

HI Aay,

Berdasarkan referensi dari avast antivirus bahwa webpage ini telah terinfeksi 
oleh HTML:i-frame yang dimana script pada webpage HTML telah di injeksi oleh 
perintah, salah satu contohnya adalah sebagai berikut :

2.1 - Web page infection

Among the new features is the ability to infect Web pages on the

local machine. Whenever the file infector has an access to a file on

the hard drive, it checks whether the files is EXE, SCR, HTM, PHP, or

ASP, and then acts accordingly. For the PE files, the code discussed

above is used for the infection. For HTML pages, the virus actually

injects an iframe at the very end of the page:

NOTE: Just before the actual iframe code, we can see a string used

in the virus. This isn't added to Web pages, but to the host file.

Since the machine is already infected, the virus author doesn't want

the machine to be infected again, and therefore blocks access to the

malicious page with the host file modification.

(Source : HYPERLINK "http://securitylabs"http://securitylabs .websense. 
com/content/ Blogs/3300. aspx)

Sedangkan hasil scan kami menemukan :

Source code of submitted URL:

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional/ /EN">

<html>

<head>

<title>Send big files the easy way. Files too large for email attachments? No 
problem!</title>

<script language="JavaScrip t1.1" type="text/javascri pt">

<!--

location.replace( "HYPERLINK "http://hisoftdream."http://hisoftdream. com");

//-->

</script>

<noscript>

</noscript>

</head>

<body>

Click here to download file

</body>

</html>

Source : HYPERLINK "http://jutaky."http://jutaky. no-ip.org/ index.php? 
option=com_ content&task= view&id=19& Itemid=32

HTML:iFrame sendiri adalah sejini trojan yang dimana hacker melakukan injeksi 
baik melalui Webpage ataupun Email, dimana pada saat korban melakukan atau klik 
website tersebut, secara otomatis file injeksi itu akan terinstall di dalam 
PC/Notebook korban.

Jadi mohon untuk tetap berhati hati dalam melakukan aktifitas dalam dunia 
internet.

Proteksi diri Anda dengan tool antivirus ataupun anti rootkit ataupun anti 
malware yang benar benar bisa dihandalkan.

Jenis jenis i frame dapat dibaca di: HYPERLINK 
"http://www.avast."http://www.avast. com/eng/search. php?searchFor= iframe&fnc= 
search〈=ENG&x=0&y=0

Thanks and Regards,

Yanto

____________ _________ _________ __

From: Aay Cosmas <aay_intermilan@ yahoo.com>

To: binus...@yahoogroup s.com

Sent: Tuesday, November 10, 2009 10:33:51

Subject: Re: [BinusNet] (unknown)

apakah ini virus ?

kalo yg sudah terlanjur klik link-nya gimana ya ?

Cara mengatasi virus ini gimana ya ?

Thanks

--- On Mon, 11/9/09, HILARIUS JANUARFIAN <hillbi...@yahoo. com> wrote:

From: HILARIUS JANUARFIAN <hillbi...@yahoo. com>

Subject: [BinusNet] (unknown)

To: to=val_hendri@ yahoo.com, thomas_...@yahoo. com, aidah...@yahoo. com, 
bpkm_...@yahoogroup s.com, ka...@realta. net, beloved_niken@ yahoo.com, 
tunj...@ftr. co.id, andr...@sentral- sistem.com, Ita_godilove@ yahoo.com, 
TemuKeluarga@ yahoogroups. com, binus...@yahoogroup s.com

Date: Monday, November 9, 2009, 11:17 AM

HYPERLINK "http://taquarigas."http://taquarigas. com.br/swCgi9csY 4.html

[Non-text portions of this message have been removed]

New Email addresses available on Yahoo!

Get the Email name you&#39;ve always wanted on the new @ymail and @rocketmail. 

Hurry before someone else does!

HYPERLINK "http://mail."http://mail. promotions. yahoo.com/ newdomains/ aa/

[Non-text portions of this message have been removed]

[Non-text portions of this message have been removed]




Internal Virus Database is out-of-date.
Checked by AVG.
Version: 7.5.560 / Virus Database: 270.5.12/1599 - Release Date: 7/08/2008 8:49 
PM



Internal Virus Database is out-of-date.
Checked by AVG. 
Version: 7.5.560 / Virus Database: 270.5.12/1599 - Release Date: 7/08/2008 8:49 
PM
 
    


[Non-text portions of this message have been removed]

Kirim email ke