查看: 2152|回复: 12
收起左侧

[病毒样本] 银狐1x

[复制链接]
xiaozhu009
发表于 2025-7-11 10:09:21 | 显示全部楼层 |阅读模式
tony099
发表于 2025-7-11 10:21:39 | 显示全部楼层
本帖最后由 tony099 于 2025-7-11 10:28 编辑

op 为clean  已经申请重新分析
Kaspersky Threat Intelligence Portal — Report — 8867EE0EBD2420479D88F9A39B3A3188F6EC7997E52244B3...
ulyanov2233
发表于 2025-7-11 10:27:12 | 显示全部楼层
是不是同一个东西换壳,每次hmpa的拦截点都一样
Mitigation   HeapHeapProtect
Timestamp    2025-07-11T02:24:29

Platform     10.0.22631/x64 v2019 06_a5%
PID          10400
Feature      00FD2F70000001A2
Application  C:\Users\Lenovo\Downloads\20250711银狐1x\bii.968128004.exe
Created      2025-07-11T02:11:35
Description  OutlookAttachView 3.54

Callee Type  ProtectVirtualMemory
             0x0000000000950000 (39429 bytes)

Shellcode (HHP) (0x00009A05 bytes : start at 0000000000950000)
Target address info: (anonymous)
Owner of CALLER: (anonymous; allocated by 0000000140002A55, bii.968128004.exe)

OwnerModule
Name         bii.968128004.exe
Path         C:\Users\Lenovo\Downloads\20250711银狐1x\bii.968128004.exe
Thumbprint   f7aa8048650d5a83c724db5dfeb169c9d96466414c20508242b00d960cb37231
SHA-256      8867ee0ebd2420479d88f9a39b3a3188f6ec7997e52244b38442d33d34848d57
SHA-1        d35b6035587327c14fde989a41ad6101895fa028
MD5          1c1d949667f8defee6608a6b814d0307

Current process is not signed
OwnerModule is not signed

00000000007BB7B5  ff9424a0000000           CALL         QWORD [RSP+0xa0]
00000000007BB7BC  85c0                     TEST         EAX, EAX
00000000007BB7BE  753c                     JNZ          0x7bb7fc
00000000007BB7C0  c744243000000000         MOV          DWORD [RSP+0x30], 0x0
00000000007BB7C8  eb0a                     JMP          0x7bb7d4
00000000007BB7CA  8b442430                 MOV          EAX, [RSP+0x30]
00000000007BB7CE  ffc0                     INC          EAX
00000000007BB7D0  89442430                 MOV          [RSP+0x30], EAX
00000000007BB7D4  837c243064               CMP          DWORD [RSP+0x30], 0x64
00000000007BB7D9  7d1f                     JGE          0x7bb7fa
00000000007BB7DB  4863442430               MOVSXD       RAX, DWORD [RSP+0x30]
00000000007BB7E0  41b800800000             MOV          R8D, 0x8000
00000000007BB7E6  33d2                     XOR          EDX, EDX
00000000007BB7E8  488b8cc4b0000000         MOV          RCX, [RSP+RAX*8+0xb0]

----- SNIP HERE -----
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
----- END SNIP -----

Stack Trace
#  Address          Module                   Location
-- ---------------- ------------------------ ----------------------------------------
1  00007FFB4A847376 KernelBase.dll           VirtualProtect +0x36

2  00000000007BB7BC (anonymous; bii.968128004.exe)
                    85c0                     TEST         EAX, EAX
                    753c                     JNZ          0x7bb7fc
                    c744243000000000         MOV          DWORD [RSP+0x30], 0x0
                    eb0a                     JMP          0x7bb7d4

3  0000000000009A05 (unknown)               

Loaded Modules (29)
-----------------------------------------------------------------------------
0000000140000000-0000000144FCC000 bii.968128004.exe (NirSoft),
                                  version: 3.54
00007FFB4D0D0000-00007FFB4D2E7000 ntdll.dll (Microsoft Corporation),
                                  version: 10.0.22621.5624 (WinBuild.160101.0800)
00007FFAF4B50000-00007FFAF4C89000 hmpalert.dll (Sophos B.V.),
                                  version: 3.20.2.2019
00007FFB4BCC0000-00007FFB4BD84000 KERNEL32.dll (Microsoft Corporation),
                                  version: 10.0.22621.5415 (WinBuild.160101.0800)
00007FFB4A7E0000-00007FFB4ABB2000 KERNELBASE.dll (Microsoft Corporation),
                                  version: 10.0.22621.5547 (WinBuild.160101.0800)
00007FFB0B170000-00007FFB0B24B000 bdhkm64.dll (BitDefender S.R.L. Bucha),
                                  version: 1.11.236.0 #0x3d65324
00007FFB00350000-00007FFB00519000 atcuf64.dll (Bitdefender S.R.L. Bucha),
                                  version: 1.75.422.0 #0x1fcf7d72c
00007FFB44BD0000-00007FFB44C67000 apphelp.dll (Microsoft Corporation),
                                  version: 10.0.22621.5547 (WinBuild.160101.0800)
00007FFB4B820000-00007FFB4B9D1000 USER32.dll (Microsoft Corporation),
                                  version: 10.0.22621.5415 (WinBuild.160101.0800)
00007FFB4ABC0000-00007FFB4ABE6000 win32u.dll (Microsoft Corporation),
                                  version: 10.0.22621.5624 (WinBuild.160101.0800)
00007FFB4CEA0000-00007FFB4CEC9000 GDI32.dll (Microsoft Corporation),
                                  version: 10.0.22621.5185 (WinBuild.160101.0800)
00007FFB4A360000-00007FFB4A483000 gdi32full.dll (Microsoft Corporation),
                                  version: 10.0.22621.5624 (WinBuild.160101.0800)
00007FFB4A1C0000-00007FFB4A25A000 msvcp_win.dll (Microsoft Corporation),
                                  version: 10.0.22621.3374 (WinBuild.160101.0800)
00007FFB4A550000-00007FFB4A661000 ucrtbase.dll (Microsoft Corporation),
                                  version: 10.0.22621.3593 (WinBuild.160101.0800)
00007FFB4B290000-00007FFB4B395000 comdlg32.dll (Microsoft Corporation),
                                  version: 10.0.22621.5547 (WinBuild.160101.0800)
00007FFB4BE70000-00007FFB4C203000 combase.dll (Microsoft Corporation),
                                  version: 10.0.22621.5624 (WinBuild.160101.0800)
00007FFB4B0B0000-00007FFB4B1C4000 RPCRT4.dll (Microsoft Corporation),
                                  version: 10.0.22621.5413 (WinBuild.160101.0800)
00007FFB4C2F0000-00007FFB4C3FC000 shcore.dll (Microsoft Corporation),
                                  version: 10.0.22621.5547 (WinBuild.160101.0800)
00007FFB4BD90000-00007FFB4BDF9000 SHLWAPI.dll (Microsoft Corporation),
                                  version: 10.0.22621.5547 (WinBuild.160101.0800)
00007FFB4BB50000-00007FFB4BBF7000 msvcrt.dll (Microsoft Corporation),
                                  version: 7.0.22621.2506 (WinBuild.160101.0800)
00007FFB4C5F0000-00007FFB4CE92000 SHELL32.dll (Microsoft Corporation),
                                  version: 10.0.22621.5547 (WinBuild.160101.0800)
00007FFB4A670000-00007FFB4A7AF000 wintypes.dll (Microsoft Corporation),
                                  version: 10.0.22621.5262 (WinBuild.160101.0800)
00007FFB4CF30000-00007FFB4CFE1000 ADVAPI32.dll (Microsoft Corporation),
                                  version: 10.0.22621.5624 (WinBuild.160101.0800)
00007FFB4BC00000-00007FFB4BCA8000 sechost.dll (Microsoft Corporation),
                                  version: 10.0.22621.5415 (WinBuild.160101.0800)
00007FFB4A7B0000-00007FFB4A7D8000 bcrypt.dll (Microsoft Corporation),
                                  version: 10.0.22621.4746 (WinBuild.160101.0800)
00007FFB4AD60000-00007FFB4AF00000 ole32.dll (Microsoft Corporation),
                                  version: 10.0.22621.5415 (WinBuild.160101.0800)
00007FFB2D750000-00007FFB2D9EB000 COMCTL32.dll (Microsoft Corporation),
                                  version: 6.10 (WinBuild.160101.0800)
00007FFB464C0000-00007FFB464CA000 VERSION.dll (Microsoft Corporation),
                                  version: 10.0.22621.1 (WinBuild.160101.0800)
00007FFB4AFE0000-00007FFB4B011000 IMM32.DLL (Microsoft Corporation),
                                  version: 10.0.22621.5185 (WinBuild.160101.0800)

Process Trace
1  C:\Users\Lenovo\Downloads\20250711银狐1x\bii.968128004.exe [10400]
2  C:\Users\Lenovo\Downloads\20250711银狐1x\bii.968128004.exe [17776]
3  C:\Windows\explorer.exe [9960]

Dropped Files

Thumbprints
f7aa8048650d5a83c724db5dfeb169c9d96466414c20508242b00d960cb37231 (hhp-ownermodule)
c2d5f1fda2fdf09727d88cb17448f06e6c577a38f4c963e54d0ef73bd932ac6a (hhp-fhsh-ownmod)
8bd6282297e86da22e2023115e4b77d8ccd59e6f5a76cc67ea2423253cf946bb (hhp-pfn)
7b68d3fd63389518efe063254713a11fadabde10073cad12842e7662c41a85e5 (code)
xiaozhu009
 楼主| 发表于 2025-7-11 10:28:04 | 显示全部楼层
ulyanov2233 发表于 2025-7-11 10:27
是不是同一个东西换壳,每次hmpa的拦截点都一样

就这么换壳好多杀软都对付不了呢(某些md5入库的家伙)
啊松
发表于 2025-7-11 10:35:06 来自手机 | 显示全部楼层
钓鱼网址是哪个啊,直接让杀软入库
xiaozhu009
 楼主| 发表于 2025-7-11 10:35:42 | 显示全部楼层
啊松 发表于 2025-7-11 10:35
钓鱼网址是哪个啊,直接让杀软入库

检测ip的那个东西我报给火绒过,他们下载的是正常软件,但是也拉黑了
莒县小哥
发表于 2025-7-11 10:37:51 | 显示全部楼层

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
啊松
发表于 2025-7-11 10:39:23 来自手机 | 显示全部楼层
xiaozhu009 发表于 2025-7-11 10:35
检测ip的那个东西我报给火绒过,他们下载的是正常软件,但是也拉黑了

卡巴拉黑了吗
ulyanov2233
发表于 2025-7-11 10:39:52 | 显示全部楼层
啊松 发表于 2025-7-11 10:35
钓鱼网址是哪个啊,直接让杀软入库

实际下载蓝奏云分发的,这样搞的杀软直接拉黑蓝奏了,bd已经拦了,eset也拦截了
啊松
发表于 2025-7-11 10:42:21 来自手机 | 显示全部楼层
ulyanov2233 发表于 2025-7-11 10:39
实际下载蓝奏云分发的,这样搞的杀软直接拉黑蓝奏了,bd已经拦了,eset也拦截了

好吧,我说卡巴为什么莫名其妙拉黑蓝奏云呢...原来是钓鱼网站的原因。
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-10-31 21:09 , Processed in 0.138082 second(s), 17 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表