模块化的木马代码
这个Mirai木马变种的SQL注入和暴力入侵技术都是从一个叫做“Cracker”库编译而来的。这个库允许为各种攻击的提供了模块化的任务。根据从可用c2下载的加密文件来指示木马的各个任务。
[Cracker:MS] [Cracker:MS] [Cracker:RDP] [Cracker:SSH]
Windows 木马的源代码似乎是在C ++中以相当模块化的方式开发的,因为该功能在源代码库中被分解为:
CheckUpdate.cpp Cracker_Inline.cpp Cracker_Standalone.cpp cService.cpp CThreadPool.cpp Db_Mysql.cpp Dispatcher.cpp IpFetcher.cpp libtelnet.cpp Logger_Stdout.cpp Scanner_Tcp_Connect.cpp Scanner_Tcp_Raw.cpp ServerAgent.cpp Task_Crack_Ipc.cpp Task_Crack_Mssql.cpp Task_Crack_Mysql.cpp Task_Crack_Rdp.cpp Task_Crack_Ssh.cpp Task_Crack_Telnet.cpp Task_Crack_Wmi.cpp Task_Scan.cpp WPD.cpp catdbsvc.cpp catadnew.cpp catdbcli.cpp waitsvc.cpp errlog.cpp
代码签名证书
代码签名证书似乎是从中国的制造商哪里盗取的,不过已经过了有效期。
文件对象的扫描
Trojan.Win32.SelfDel.ehlq Trojan.Win32.Agent.ikad Trojan.Win32.Agentb.btlt Trojan.Win32.Agentb.budb Trojan.Win32.Zapchast.ajbs Trojan.BAT.Starter.hj Trojan-PSW.Win32.Agent.lsmj Trojan-Downloader.Win32.Agent.hesn Trojan-Downloader.Win32.Agent.silgjn HEUR:Trojan-Downloader.Linux.Gafgyt.b Backdoor.Win32.Agent.dpeu DangerousPattern.Multi.Generic (UDS)
文件对象的分析
c2和url
http://dwon.f321y[.]com:280/mysql.exe https://down2.b5w91[.]com:8443 http://down.f4321y[.]com:8888/kill.html http://down.f4321y[.]com:8888/test.html http://down.f4321y[.]com:8888/ups.rar http://67.229.225.20 http://down.f4321y[.]com http://up.f4321y[.]com http://up.f4321y[.]com:8888/ver.txt http://up.f4321y[.]com:8888/ups.rar http://up.f4321y[.]com:8888/update.txt http://up.f4321y[.]com:8888/wpdmd5.txt http://up.f4321y[.]com:8888/wpd.dat http://down.F4321Y[.]com:8888/my1.html http://up.mykings[.]pw:8888/ver.txt http://up.mykings[.]pw:8888/ups.rar http://up.mykings[.]pw:8888/update.txt http://up.mykings[.]pw:8888/wpdmd5.txt http://up.mykings[.]pw:8888/wpd.dat http://down.mykings[.]pw:8888/my1.html http://down.mykings[.]pw:8888/ups.rar http://down.mykings[.]pw:8888/item.dat http://js.f4321y[.]com:280/v.sct http://down.b591[.]com:8888/ups.exe http://down.b591[.]com:8888/ups.rar http://down2.b591[.]com:8888/ups.rar http://down2.b591[.]com:8888/wpd.dat http://down2.b591[.]com:8888/wpdmd5.txt http://down2.b591[.]com:8888/ver.txt http://up.f4321y[.]com:8888/ups.rar http://down.b591[.]com:8888/test.html http://dwon.kill1234[.]com:280/cao.exe http://down.b591[.]com:8888/ups.rar http://down.b591[.]com:8888/ups.exe http://down.b591[.]com:8888/cab.rar http://down.b591[.]com:8888/cacls.rar http://down.b591[.]com:8888/kill.html
签名证书
Xi’ an JingTech electronic Technology Co.,LTD sn: 65 f9 b9 66 60 ad 34 c1 c1 fe f2 97 26 6a 1b 36 Partner Tech(Shanghai)Co.,Ltd sn: 26 59 63 33 50 73 23 10 40 17 81 35 53 05 97 60 39 76 89
Md5
e7761db0f63bc09cf5e4193fd6926c5e c88ece9a379f4a714afaf5b8615fc66c 91a12a4cf437589ba70b1687f5acad19 a3c09c2c3216a3a24dce18fd60a5ffc2 297d1980ce171ddaeb7002bc020fe6b6 5707f1e71da33a1ab9fe2796dbe3fc74 a4c7eb57bb7192a226ac0fb6a80f2164 64f0f4b45626e855b92a4764de62411b 02b0021e6cd5f82b8340ad37edc742a0 10164584800228de0003a37be3a61c4d fd7f188b853d5eef3760228159698fd8 cbe2648663ff1d548e036cbe4351be39 fb7b79e9337565965303c159f399f41b eb814d4e8473e75dcbb4b6c5ab1fa95b 04eb90800dff297e74ba7b81630eb5f7 508f53df8840f40296434dfb36087a17 93ccd8225c8695cade5535726b0dd0b6 62270a12707a4dcf1865ba766aeda9bc 43e7580e15152b67112d3dad71c247ec 0779a417e2bc6bfac28f4fb79293ec34 ac8d3581841b8c924a76e7e0d5fced8d cf1ba0472eed104bdf03a1712b3b8e3d 4eee4cd06367b9eac405870ea2fd2094 21d291a8027e6de5095f033d594685d0 097d32a1dc4f8ca19a255c401c5ab2b6 5950dfc2f350587a7e88fa012b3f8d92 2d411f5f92984a95d4c93c5873d9ae00 9a83639881c1a707d8bbd70f871004a0 5cae130b4ee424ba9d9fa62cf1218679 2346135f2794de4734b9d9a27dc850e1 fe7d9bdbf6f314b471f89f17b35bfbcd c289c15d0f7e694382a7e0a2dc8bdfd8 9098e520c4c1255299a2512e5e1135ba db2a34ac873177b297208719fad97ffa defff110df48eb72c16ce88ffb3b2207 c289c15d0f7e694382a7e0a2dc8bdfd8 c75bd297b87d71c8c73e6e27348c67d5 5af3bab901735575d5d0958921174b17 1a6fea56dc4ee1c445054e6bc208ce4f ae173e8562f6babacb8e09d0d6c29276 ad0496f544762a95af11f9314e434e94
Contents of http://down.mykings[.]pw:8888/my1.html
Contents of http://up.mykings[.]pw:8888/update.txt
分页阅读: 1 2
解决办法呢????
2017-03-01 下午4:17