这是一篇木马分析文章,这篇文章的内容紧接着:悠悠鸟影视论坛(uuniao)主站被黑,并被“黑客”植入网马挂马!
dd01.css 这个木马信息如下:
大小:24.5 KB (25,088 字节)
MD5:A43EAC1037D1EE14BD3F1FC632DF1EBC
加壳:UPX 0.89.6 - 1.02 / 1.05 - 1.22 -> Markus & Lazlo
直接脱壳:
File size Ratio Format Name -------------- ------- -------- -------- 48640 <- 25088 51.58% win32/pe dd01.css Unpacked 1 file.
脱壳后:
大小:47.5 KB (48,640 字节)
MD5:BE8EA2ED75EB0E4914759CEA80524695
Unidentified Packer. *
木马运行后会首先检测主流杀毒软件,列表如下:
ASCII "avp.EXE" //卡巴斯基杀毒软件 ASCII "egui.exe" //Eset NOD32 Antivirus ASCII "360rp.exe" //360杀毒软件 ASCII "360sd.exe" //360杀毒软件 ASCII "kavstart.EXE" //金山毒霸杀毒软件 ASCII "RsTray.exe" //瑞星卡卡上网安全助手 ASCII "RavMonD.exe" //瑞星杀毒软件
并在临时文件目录创建六位随机数字名字的dll,在系统目录创建六位随机数字名字的exe。
并调用批处理进行自删除,具体的就不写了,在线程序行为分析结果见:
http://anubis.iseclab.org/?action=result&task_id=1dc9b871da00d8cf439efff55da61744d&format=html
上线地址:ad.ddnc.net:8832 --> 58.221.36.210 --> 江苏省南通市 电信
和之前的 huandan4.8866.org [58.221.36.212] 是同段服务器!
并且这个 IP 已经有很长时间挂马历史了,上了很多黑名单。
例如:http://www.kafan.cn/article-3462-1.html
挂马者有相当多免费域名,但端口无一例外都是:8832
挂马者至少拥有数台服务器,并且分工明确,一看就是专业挂马的,并且规模相当大。
这年头居然还专业挂马户,尼玛挂的还是国内的!不想活了!
那个谁有兴趣的话,去日了他服务器,把小马换成自己的,绝对超多肉鸡,黑吃黑不解释……
╭∩╮(︶︿︶)╭∩╮
● File Info
Name | Value |
---|---|
Size | 48640 |
MD5 | df743cc353cf89601932eb66d6a7cb67 |
SHA1 | 3a1ebd480ca42b40bbbe087090a06c96cedd3b60 |
SHA256 | 8ca6b87ff54fbbe6089e777d32ec9cb01e798e1b9e9a870a332d692d55eab81e |
Process | Active |
● Keys Created
● Keys Changed
● Keys Deleted
● Values Created
● Values Changed
● Values Deleted
● Directories Created
● Directories Changed
● Directories Deleted
● Files Created
Name | Size | Last Write Time | Creation Time | Last Access Time | Attr |
---|---|---|---|---|---|
C:\Documents and Settings\User\Local Settings\Temp\234812.dll | 14848 | 2009.01.09 10:37:33.593 | 2009.01.09 10:37:33.531 | 2009.01.09 10:37:33.531 | 0x20 |
● Files Changed
● Files Deleted
● Directories Hidden
● Files Hidden
● Drivers Loaded
Base | Size | Flags | Image Name |
---|---|---|---|
0xfa0dd000 | 0x1000 | 0x9104000 | \??\C:\WINDOWS\fonts\pci.sys |
● Drivers Unloaded
● Processes Created
PId | Process Name | Image Name |
---|---|---|
0x4b4 | rundll32.exe | C:\WINDOWS\system32\rundll32.exe |
● Processes Terminated
● Threads Created
PId | Process Name | TId | Start | Start Mem | Win32 Start | Win32 Start Mem |
---|---|---|---|---|---|---|
0x2b0 | lsass.exe | 0x4c0 | 0x7c810856 | MEM_IMAGE | 0x77e76bf0 | MEM_IMAGE |
0x3f4 | svchost.exe | 0x40c | 0x7c810856 | MEM_IMAGE | 0x762cf0a3 | MEM_IMAGE |
0x3f4 | svchost.exe | 0x674 | 0x7c810856 | MEM_IMAGE | 0x7529edb3 | MEM_IMAGE |
0x3f4 | svchost.exe | 0x678 | 0x7c810856 | MEM_IMAGE | 0x7529e44b | MEM_IMAGE |
0x3f4 | svchost.exe | 0x6ac | 0x7c810856 | MEM_IMAGE | 0x75219a1e | MEM_IMAGE |
0x3f4 | svchost.exe | 0x6ec | 0x7c810856 | MEM_IMAGE | 0x762cf0a3 | MEM_IMAGE |
0x4b4 | rundll32.exe | 0x5d0 | 0x7c810867 | MEM_IMAGE | 0x1001bdc | MEM_IMAGE |
● Modules Loaded
PId | Process Name | Base | Size | Flags | Image Name |
---|---|---|---|---|---|
0x3f4 | svchost.exe | 0x73d30000 | 0x17000 | 0x800c4004 | C:\WINDOWS\system32\wbem\wbemcons.dll |
● Windows Api Calls
PId | Image Name | Address | Function ( Parameters ) | Return Value |
---|---|---|---|
0x4b4 | C:\WINDOWS\system32\rundll32.exe | 0x9223e1 | CreateServiceA(hSCManager: 0x9b410, lpServiceName: "acde", lpDisplayName: "acde", dwDesiredAccess: 0x10, dwServiceType: 0x1, dwStartType: 0x3, dwErrorControl: 0x0, lpBinaryPathName: "C:\WINDOWS\fonts\pci.sys", lpLoadOrderGroup: "(null)", lpdwTagId: 0x0, lpDependencies: 0x0, lpServiceStartName: "(null)", lpPassword: 0x0)|0x9b110 |
● DNS Queries
DNS Query Text |
---|
ad.ddnc.nett IN A + |
● HTTP Queries
● Verdict
Auto Analysis Verdict |
---|
Suspicious+ |
● Description
Suspicious Actions Detected |
---|
Creates system services or drivers |
Load system drivers |
● Mutexes Created or Opened
PId | Image Name | Address | Mutex Name |
---|---|---|---|
0x4ac | C:\TEST\sample.exe | 0x4022d9 | TGmae... |
0x4e0 | C:\WINDOWS\system32\241562.exe | 0x400f4e | XETTETT...... |
0x4e0 | C:\WINDOWS\system32\241562.exe | 0x76ee3a34 | RasPbFile |
0x4e0 | C:\WINDOWS\system32\241562.exe | 0x771ba3ae | _!MSFTHISTORY!_ |
0x4e0 | C:\WINDOWS\system32\241562.exe | 0x771bc1f9 | WininetConnectionMutex |
0x4e0 | C:\WINDOWS\system32\241562.exe | 0x771bc23d | WininetProxyRegistryMutex |
0x4e0 | C:\WINDOWS\system32\241562.exe | 0x771bc2dd | WininetStartupMutex |
0x4e0 | C:\WINDOWS\system32\241562.exe | 0x771d96e1 | c:!documents and settings!user!cookies! |
0x4e0 | C:\WINDOWS\system32\241562.exe | 0x771d96e1 | c:!documents and settings!user!local settings!history!history.ie5! |
0x4e0 | C:\WINDOWS\system32\241562.exe | 0x771d96e1 | c:!documents and settings!user!local settings!temporary internet files!content.ie5! |
0x4e0 | C:\WINDOWS\system32\241562.exe | 0x91a3ae | _!MSFTHISTORY!_ |
0x4e0 | C:\WINDOWS\system32\241562.exe | 0x91c21c | WininetConnectionMutex |
0x4e0 | C:\WINDOWS\system32\241562.exe | 0x91c23d | WininetProxyRegistryMutex |
0x4e0 | C:\WINDOWS\system32\241562.exe | 0x91c2dd | WininetStartupMutex |
0x4e0 | C:\WINDOWS\system32\241562.exe | 0x939710 | c:!documents and settings!user!cookies! |
0x4e0 | C:\WINDOWS\system32\241562.exe | 0x939710 | c:!documents and settings!user!local settings!history!history.ie5! |
0x4e0 | C:\WINDOWS\system32\241562.exe | 0x939710 | c:!documents and settings!user!local settings!temporary internet files!content.ie5! |
● Events Created or Opened
PId | Image Name | Address | Event Name |
---|---|---|---|
0x4b4 | C:\WINDOWS\system32\rundll32.exe | 0x77de5f48 | Global\SvcctrlStartEvent_A3752DX |
0x4e0 | C:\WINDOWS\system32\241562.exe | 0x769c4ec2 | Global\userenv: User Profile setup event |
0x4e0 | C:\WINDOWS\system32\241562.exe | 0x77de5f48 | Global\SvcctrlStartEvent_A3752DX |
留言评论(旧系统):