病毒描述:
“武汉男生”,俗称“熊猫烧香”,这是一个感染型的蠕虫病毒,它能感染系统中exe,com,pif,src,html,asp等文件,它还能中止大量的反病毒软件进程并且会删除扩展名为gho的文件,该文件是一系统备份工具GHOST的备份文件,使用户的系统备份文件丢失。被感染的用户系统中所有.exe可执行文件全部被改成熊猫举着三根香的模样。
1:拷贝文件
病毒运行后,会把自己拷贝到C:\WINDOWS\System32\Drivers\spoclsv.exe
2:添加注册表自启动
病毒会添加自启动项HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run svcshare -> C:\WINDOWS\System32\Drivers\spoclsv.exe
3:病毒行为
a:每隔1秒寻找桌面窗口,并关闭窗口标题中含有以下字符的程序:
QQKav、QQAV、防火墙、进程、VirusScan、网镖、杀毒、毒霸、瑞星、江民、黄山IE、超级兔子、优化大师、木马克星、木马清道夫、QQ病毒、注册表编辑器、系统配置实用程序、卡巴斯基反病毒、Symantec AntiVirus、Duba、esteem proces、绿鹰PC、密码防盗、噬菌体、木马辅助查找器、System Safety Monitor、Wrapped gift Killer、Winsock Expert、游戏木马检测大师、msctls_statusbar32、pjf(ustc)、IceSword
并使用的键盘映射的方法关闭安全软件IceSword
添加注册表使自己自启动 HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run svcshare -> C:\WINDOWS\System32\Drivers\spoclsv.exe
并中止系统中以下的进程:
Mcshield.exe、VsTskMgr.exe、naPrdMgr.exe、UpdaterUI.exe、TBMon.exe、scan32.exe、Ravmond.exe、CCenter.exe、RavTask.exe、Rav.exe、Ravmon.exe、RavmonD.exe、RavStub.exe、KVXP.kxp、kvMonXP.kxp、KVCenter.kxp、KVSrvXP.exe、KRegEx.exe、UIHost.exe、TrojDie.kxp、FrogAgent.exe、Logo1_.exe、Logo_1.exe、Rundl132.exe
b:每隔18秒点击病毒作者指定的网页,并用命令行检查系统中是否存在共享,共存在的话就运行net share命令关闭admin$共享
c:每隔10秒下载病毒作者指定的文件,并用命令行检查系统中是否存在共享,共存在的话就运行net share命令关闭admin$共享
d:每隔6秒删除安全软件在注册表中的键值
并修改以下值不显示隐藏文件 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL CheckedValue -> 0x00
删除以下服务:
navapsvc、wscsvc、KPfwSvc、SNDSrvc、ccProxy、ccEvtMgr、ccSetMgr、SPBBCSvc、Symantec Core LC、NPFMntor MskService、FireSvc
e:感染文件
病毒会感染扩展名为exe,pif,com,src的文件,把自己附加到文件的头部,并在扩展名为htm,html, asp,php,jsp,aspx的文件中添加一网址,用户一但打开了该文件,IE就会不断的在后台点击写入的网址,达到增加点击量的目的,但病毒不会感染以下文件夹名中的文件:
WINDOW、Winnt、System Volume Information、Recycled、Windows NT、WindowsUpdate、Windows Media Player、Outlook Express、Internet Explorer、NetMeeting、Common Files、ComPlus Applications、Messenger、InstallShield Installation Information、MSN、Microsoft Frontpage、Movie Maker、MSN Gamin Zone
g:删除文件
病毒会删除扩展名为gho的文件,该文件是一系统备份工具GHOST的备份文件使用户的系统备份文件丢失。
目前病毒创始人武汉男生被警方抓获。。。
==========
病毒代码:
某处下了个所谓的新版本熊猫烧香.
根据字符串结合loveboom的文章进行了深入的学习.
不敢独享,分享如下.
GameSetup.exe
1.脱壳:
FSG 2.0 -> bart/xt
Borland Delphi 6.0 - 7.0
ep:
00400154 G> 8725 F4D24100 xchg dword ptr ds:[41D2F4],esp
0040015A 61 popad
0040015B 94 xchg eax,esp
0040015C 55 push ebp
0040015D A4 movs byte ptr es:[edi],byte ptr ds:[e>
0040015E B6 80 mov dh,80
00400160 FF13 call dword ptr ds:[ebx]
00400162 ^ 73 F9 jnb short GameSetu.0040015D
...
004001CC 40 inc eax
004001CD ^ 78 F3 js short GameSetu.004001C2
004001CF 75 03 jnz short GameSetu.004001D4
004001D1 - FF63 0C jmp dword ptr ds:[ebx+C] ; GameSetu.0040D278 ,OEP
004001D4 50 push eax
004001D5 55 push ebp
004001D6 FF53 14 call dword ptr ds:[ebx+14]
004001D9 AB stos dword ptr es:[edi]
004001DA ^ EB EE jmp short GameSetu.004001CA
OEP:
0040D278 55 push ebp ; URLMON.702B0000
0040D279 8BEC mov ebp,esp
0040D27B 83C4 E8 add esp,-18
0040D27E 53 push ebx
0040D27F 56 push esi
0040D280 33C0 xor eax,eax
0040D282 8945 E8 mov dword ptr ss:[ebp-18],eax
0040D285 8945 EC mov dword ptr ss:[ebp-14],eax
0040D288 B8 C8D14000 mov eax,GameSetu.0040D1C8
0040D28D E8 5677FFFF call GameSetu.004049E8
文本字符串参考位于 GameSetu:
地址 反汇编 文本字符串
0040626A mov eax,GameSetu.004069D8 ASCII "VirusScan"
00406296 mov eax,GameSetu.004069EC ASCII "NOD32"
004064B0 mov eax,GameSetu.00406AB4 ASCII "Symantec AntiVirus"
004064E2 mov eax,GameSetu.00406AD0 ASCII "Duba"
00406514 mov eax,GameSetu.00406AE0 ASCII "esteem procs"
0040660E mov eax,GameSetu.00406B44 ASCII "System Safety Monitor"
00406640 mov eax,GameSetu.00406B64 ASCII "Wrapped gift Killer"
00406672 mov eax,GameSetu.00406B80 ASCII "Winsock Expert"
0040670E push GameSetu.00406BC0 ASCII "msctls_statusbar32"
00406748 mov eax,GameSetu.00406BDC ASCII "pjf(ustc)"
004067E4 push GameSetu.00406BE8 ASCII "IceSword"
00406826 mov eax,GameSetu.00406BFC ASCII "Mcshield.exe"
00406830 mov eax,GameSetu.00406C14 ASCII "VsTskMgr.exe"
0040683A mov eax,GameSetu.00406C2C ASCII "naPrdMgr.exe"
00406844 mov eax,GameSetu.00406C44 ASCII "UpdaterUI.exe"
0040684E mov eax,GameSetu.00406C5C ASCII "TBMon.exe"
00406858 mov eax,GameSetu.00406C70 ASCII "scan32.exe"
00406862 mov eax,GameSetu.00406C84 ASCII "Ravmond.exe"
0040686C mov eax,GameSetu.00406C98 ASCII "CCenter.exe"
00406876 mov eax,GameSetu.00406CAC ASCII "RavTask.exe"
00406880 mov eax,GameSetu.00406CC0 ASCII "Rav.exe"
0040688A mov eax,GameSetu.00406CD0 ASCII "Ravmon.exe"
00406894 mov eax,GameSetu.00406CE4 ASCII "RavmonD.exe"
0040689E mov eax,GameSetu.00406CF8 ASCII "RavStub.exe"
004068A8 mov eax,GameSetu.00406D0C ASCII "KVXP.kxp"
004068B2 mov eax,GameSetu.00406D20 ASCII "KvMonXP.kxp"
004068BC mov eax,GameSetu.00406D34 ASCII "KVCenter.kxp"
004068C6 mov eax,GameSetu.00406D4C ASCII "KVSrvXP.exe"
004068D0 mov eax,GameSetu.00406D60 ASCII "KRegEx.exe"
004068DA mov eax,GameSetu.00406D74 ASCII "UIHost.exe"
004068E4 mov eax,GameSetu.00406D88 ASCII "TrojDie.kxp"
004068EE mov eax,GameSetu.00406D9C ASCII "FrogAgent.exe"
004068F8 mov eax,GameSetu.00406D0C ASCII "KVXP.kxp"
00406902 mov eax,GameSetu.00406D20 ASCII "KvMonXP.kxp"
0040690C mov eax,GameSetu.00406D34 ASCII "KVCenter.kxp"
00406916 mov eax,GameSetu.00406D4C ASCII "KVSrvXP.exe"
00406920 mov eax,GameSetu.00406D60 ASCII "KRegEx.exe"
0040692A mov eax,GameSetu.00406D74 ASCII "UIHost.exe"
00406934 mov eax,GameSetu.00406D88 ASCII "TrojDie.kxp"
0040693E mov eax,GameSetu.00406D9C ASCII "FrogAgent.exe"
00406948 mov eax,GameSetu.00406DB4 ASCII "Logo1_.exe"
00406952 mov eax,GameSetu.00406DC8 ASCII "Logo_1.exe"
0040695C mov eax,GameSetu.00406DDC ASCII "Rundl132.exe"
00406966 mov eax,GameSetu.00406DF4 ASCII "regedit.exe"
00406970 mov eax,GameSetu.00406E08 ASCII "msconfig.exe"
0040697A mov eax,GameSetu.00406E20 ASCII "taskmgr.exe"
00406E44 mov eax,GameSetu.00407014 ASCII "Schedule"
00406E4E mov eax,GameSetu.00407028 ASCII "sharedaccess"
00406E58 mov eax,GameSetu.00407040 ASCII "RsCCenter"
00406E62 mov eax,GameSetu.00407054 ASCII "RsRavMon"
00406E6C mov eax,GameSetu.00407060 ASCII "RsCCenter"
00406E76 mov eax,GameSetu.0040706C ASCII "RsRavMon"
00406E80 mov edx,GameSetu.00407080 ASCII "SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RavTask"
00406E8F mov eax,GameSetu.004070C0 ASCII "KVWSC"
00406E99 mov eax,GameSetu.004070D0 ASCII "KVSrvXP"
00406EA3 mov eax,GameSetu.004070D8 ASCII "KVWSC"
00406EAD mov eax,GameSetu.004070E0 ASCII "KVSrvXP"
00406EB7 mov edx,GameSetu.004070F0 ASCII "SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KvMonXP"
00406EC6 mov eax,GameSetu.00407130 ASCII "kavsvc"
00406ED0 mov eax,GameSetu.00407140 ASCII "AVP"
00406EDA mov eax,GameSetu.00407144 ASCII "AVP"
00406EE4 mov eax,GameSetu.00407148 ASCII "kavsvc"
00406EEE mov edx,GameSetu.00407158 ASCII "SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kav"
00406EFD mov edx,GameSetu.00407194 ASCII "SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KAVPersonal50"
00406F0C mov eax,GameSetu.004071D8 ASCII "McAfeeFramework"
00406F16 mov eax,GameSetu.004071F0 ASCII "McShield"
00406F20 mov eax,GameSetu.00407204 ASCII "McTaskManager"
00406F2A mov eax,GameSetu.00407214 ASCII "McAfeeFramework"
00406F34 mov eax,GameSetu.00407224 ASCII "McShield"
00406F3E mov eax,GameSetu.00407230 ASCII "McTaskManager"
00406F48 mov edx,GameSetu.00407248 ASCII "SOFTWARE\Microsoft\Windows\CurrentVersion\Run\McAfeeUpdaterUI"
00406F57 mov edx,GameSetu.00407290 ASCII "SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Network Associates Error Reporting Service"
00406F66 mov edx,GameSetu.004072F4 ASCII "SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ShStatEXE"
00406F75 mov eax,GameSetu.0040732C ASCII "navapsvc"
00406F7F mov eax,GameSetu.00407338 ASCII "wscsvc"
00406F89 mov eax,GameSetu.00407340 ASCII "KPfwSvc"
00406F93 mov eax,GameSetu.00407348 ASCII "SNDSrvc"
00406F9D mov eax,GameSetu.00407350 ASCII "ccProxy"
00406FA7 mov eax,GameSetu.00407358 ASCII "ccEvtMgr"
00406FB1 mov eax,GameSetu.00407364 ASCII "ccSetMgr"
00406FBB mov eax,GameSetu.00407370 ASCII "SPBBCSvc"
00406FC5 mov eax,GameSetu.0040737C ASCII "Symantec Core LC"
00406FCF mov eax,GameSetu.00407390 ASCII "NPFMntor"
00406FD9 mov eax,GameSetu.0040739C ASCII "MskService"
00406FE3 mov eax,GameSetu.004073A8 ASCII "FireSvc"
00406FED mov edx,GameSetu.004073B8 ASCII "SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YLive.exe"
00406FFC mov edx,GameSetu.004073F8 ASCII "SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yassistse"
004075D5 mov ecx,GameSetu.0040764C ASCII ":\"
004079FF mov edx,GameSetu.00407AF4 ASCII "Search"
00407A04 mov eax,GameSetu.00407B04 ASCII "=nb{end'w{g>ispy>,.ps~*bb?2'gm.12&mmeb|'lwl'swi:&9ibmnlwispy>,.ps~*bb?2'gm.12&mmeb|'lwl'swi:&9ibmnlwmov dword ptr ss:[ebp-2C],5
0040AA13 B8 F0E04000 mov eax,GameSetu.0040E0F0 ; 注意地址,字符串指针
0040AA18 8945 BC mov dword ptr ss:[ebp-44],eax ; 字符串指针保存
0040AA1B 8D55 B4 lea edx,dword ptr ss:[ebp-4C] ; 循环指针,开始处
0040AA1E 8B45 E0 mov eax,dword ptr ss:[ebp-20]
...
0040AA31 8B45 BC mov eax,dword ptr ss:[ebp-44]
0040AA34 FF30 push dword ptr ds:[eax]
0040AA36 8D45 B8 lea eax,dword ptr ss:[ebp-48] ; 目标1
0040AA39 BA 04000000 mov edx,4
0040AA3E E8 4995FFFF call GameSetu.00403F8C
0040AA43 8B55 B8 mov edx,dword ptr ss:[ebp-48]
0040AA46 8B45 FC mov eax,dword ptr ss:[ebp-4]
0040AA49 E8 7AFDFFFF call GameSetu.0040A7C8
0040AA4E 85C0 test eax,eax
0040AA50 0F84 4E020000 je GameSetu.0040ACA4
0040AA56 6A 00 push 0
0040AA58 8D55 AC lea edx,dword ptr ss:[ebp-54] ; 目标3
0040AA5B 8B45 E0 mov eax,dword ptr ss:[ebp-20]
0040AA5E E8 AD9BFFFF call GameSetu.00404610
...
0040AA6E 8B45 BC mov eax,dword ptr ss:[ebp-44]
0040AA71 FF30 push dword ptr ds:[eax]
0040AA73 68 64AD4000 push GameSetu.0040AD64 ; ASCII "GameSetup.exe"
0040AA78 8D45 B0 lea eax,dword ptr ss:[ebp-50] ; 目标2
0040AA7B BA 05000000 mov edx,5
0040AA80 E8 0795FFFF call GameSetu.00403F8C
0040AA85 8B45 B0 mov eax,dword ptr ss:[ebp-50]
0040AA88 E8 3F96FFFF call GameSetu.004040CC
...
0040AA99 68 7CAD4000 push GameSetu.0040AD7C ; ASCII "drivers\"
0040AA9E 68 90AD4000 push GameSetu.0040AD90 ; ASCII "spo0lsv.exe"
0040AAB9 E8 2EA0FFFF call GameSetu.00404AEC ; jmp to KERNEL32.CopyFileA
...
0040AB80 E8 83FAFFFF call GameSetu.0040A608 ; jmp to netapi32.NetRemoteTOD
0040AC07 E8 F4F9FFFF call GameSetu.0040A600 ; jmp to netapi32.NetScheduleJobAdd
...
0040AC6B B8 A4AD4000 mov eax,GameSetu.0040ADA4 ; ASCII "admin$"
0040AC70 E8 4BA4FFFF call GameSetu.004050C0
0040AC75 84C0 test al,al
0040AC77 75 2B jnz short GameSetu.0040ACA4
...
0040ACA4 8345 BC 04 add dword ptr ss:[ebp-44],4
0040ACA8 FF4D D4 dec dword ptr ss:[ebp-2C]
0040ACAB ^ 0F85 6AFDFFFF jnz GameSetu.0040AA1B ;
dd 0040E0F0
0040E0F0 0040A828 GameSetu.0040A828 ; 以下为攻击目标
0040E0F4 0040A834 ASCII "\Documents and Settings\All Users\Start Menu\Programs\Startup\"
0040E0F8 0040A87C GameSetu.0040A87C
0040E0FC 0040A8C0 ASCII "\WINDOWS\Start Menu\Programs\Startup\"
0040E100 0040A8F0 ASCII "\WINNT\Profiles\All Users\Start Menu\Programs\Startup\"
0040E104 00000000
0040E108 0040ADB4 ASCII "1234" ; 以下为字典密码
0040E10C 0040ADC4 ASCII "password"
0040E110 0040ADD8 ASCII "6969"
0040E114 0040ADE8 ASCII "harley"
0040E118 0040ADF8 ASCII "123456"
0040E11C 0040AE08 ASCII "golf"
0040E120 0040AE18 ASCII "pussy"
0040E124 0040AE28 ASCII "mustang"
0040E128 0040AE38 ASCII "1111"
0040E12C 0040AE48 ASCII "shadow"
0040E130 0040AE58 ASCII "1313"
0040E134 0040AE68 ASCII "fish"
0040E138 0040AE78 ASCII "5150"
0040E13C 0040AE88 ASCII "7777"
0040E140 0040AE98 ASCII "qwerty"
0040E144 0040AEA8 ASCII "baseball"
0040E148 0040AEBC ASCII "2112"
0040E14C 0040AECC ASCII "letmein"
0040E150 0040AEDC ASCII "12345678"
0040E154 0040AEF0 ASCII "12345"
0040E158 0040AF00 ASCII "ccc"
0040E15C 0040AF0C ASCII "admin"
0040E160 0040AF1C ASCII "5201314"
0040E164 0040AF2C ASCII "qq520"
0040E168 0040AF3C GameSetu.0040AF3C
0040E16C 0040AF48 ASCII "12"
0040E170 0040AF54 ASCII "123"
0040E174 0040AF60 ASCII "1234567"
0040E178 0040AF70 ASCII "123456789"
0040E17C 0040AF84 ASCII "654321"
0040E180 0040AF94 ASCII "54321"
0040E184 0040AFA4 ASCII "111"
0040E188 0040AFB0 ASCII "000000"
0040E18C 0040AFC0 ASCII "abc"
0040E190 0040AFCC ASCII "pw"
0040E194 0040AFD8 ASCII "11111111"
0040E198 0040AFEC ASCII "88888888"
0040E19C 0040B000 ASCII "pass"
0040E1A0 0040B010 ASCII "passwd"
0040E1A4 0040B020 ASCII "database"
0040E1A8 0040B034 ASCII "abcd"
0040E1AC 0040B044 ASCII "abc123"
0040E1B0 0040B000 ASCII "pass"
0040E1B4 0040B054 ASCII "sybase"
0040E1B8 0040B064 ASCII "123qwe"
0040E1BC 0040B074 ASCII "server"
0040E1C0 0040B084 ASCII "computer"
0040E1C4 0040B098 ASCII "520"
0040E1C8 0040B0A4 ASCII "super"
0040E1CC 0040B0B4 ASCII "123asd"
0040E1D0 0040B0C4 GameSetu.0040B0C4
0040E1D4 0040B0D0 ASCII "ihavenopass"
0040E1D8 0040B0E4 ASCII "godblessyou"
0040E1DC 0040B0F8 ASCII "enable"
0040E1E0 0040B108 ASCII "xp"
0040E1E4 0040B114 ASCII "2002"
0040E1E8 0040B124 ASCII "2003"
0040E1EC 0040B134 ASCII "2600"
0040E1F0 0040B144 ASCII "alpha"
0040E1F4 0040B154 ASCII "110"
0040E1F8 0040B160 ASCII "111111"
0040E1FC 0040B170 ASCII "121212"
0040E200 0040B180 ASCII "123123"
0040E204 0040B190 ASCII "1234qwer"
0040E208 0040B1A4 ASCII "123abc"
0040E20C 0040B1B4 ASCII "007"
0040E210 0040B1C0 GameSetu.0040B1C0
0040E214 0040B1CC ASCII "aaa"
0040E218 0040B1D8 ASCII "patrick"
0040E21C 0040B1E8 ASCII "pat"
0040E220 0040B1F4 ASCII "administrator"
0040E224 0040B20C ASCII "root"
0040E228 0040B21C ASCII "sex"
0040E22C 0040B228 ASCII "god"
0040E230 0040B234 ASCII "*you"
0040E234 0040B244 ASCII "*"
0040E238 0040AFC0 ASCII "abc"
0040E23C 0040B254 ASCII "test"
0040E240 0040B264 ASCII "test123"
0040E244 0040B274 ASCII "temp"
0040E248 0040B284 ASCII "temp123"
0040E24C 0040B294 ASCII "win"
0040E250 0040B2A0 ASCII "pc"
0040E254 0040B2AC ASCII "asdf"
0040E258 0040B2BC ASCII "pwd"
0040E25C 0040B2C8 ASCII "qwer"
0040E260 0040B2D8 ASCII "yxcv"
0040E264 0040B2E8 ASCII "zxcv"
0040E268 0040B2F8 ASCII "home"
0040E26C 0040B308 ASCII "xxx"
0040E270 0040B314 ASCII "owner"
0040E274 0040B324 ASCII "login"
0040E278 0040B334 ASCII "Login"
0040E27C 0040B344 ASCII "pw123"
0040E280 0040B354 ASCII "love"
0040E284 0040B364 ASCII "mypc"
0040E288 0040B374 ASCII "mypc123"
0040E28C 0040B384 ASCII "admin123"
0040E290 0040B398 ASCII "mypass"
0040E294 0040B3A8 ASCII "mypass123"
0040E298 0040B3BC ASCII "901100"
0040E29C 0040B3CC ASCII "Administrator"
0040E2A0 0040B3E4 ASCII "Guest"
0040E2A4 0040B3F4 ASCII "admin"
0040E2A8 0040B404 ASCII "Root"
2.9 复制病毒到根目录,生成autorun.inf:
病毒建立一个计时器以,6秒为周期在磁盘的根目录下生成setup.exe,
并利用AutoRun Open关联,使病毒在用户点击被感染磁盘时能被自动运行.
0040C374 68 7CBE4000 push GameSetu.0040BE7C ; 执行主体
0040C379 68 70170000 push 1770 ; 时间6000ms
0040C37E 6A 00 push 0
0040C380 6A 00 push 0
0040C382 E8 BD88FFFF call GameSetu.00404C44 ; jmp to user32.SetTimer
将病毒复制到各分区下命名为setup.exe,建立autorun.inf:
0040BEC6 E8 BDFDFFFF call GameSetu.0040BC88
0040BCCC E8 7B8EFFFF call GameSetu.00404B4C ; jmp to KERNEL32.GetDriveTypeA
0040BF9F B9 F4C24000 mov ecx,GameSetu.0040C2F4 ; ASCII ":\setup.exe"
0040BFC4 B9 08C34000 mov ecx,GameSetu.0040C308 ; ASCII ":\autorun.inf"
0040C08A E8 5D8AFFFF call GameSetu.00404AEC ; jmp to KERNEL32.CopyFileA
0040C11D BA 20C34000 mov edx,GameSetu.0040C320 ; ASCII "[AutoRun]
内容太多,自己进我的空间里找吧.
点我的名字
温馨提示:内容为网友见解,仅供参考