这种DDE攻击技术首次被高级持续威胁(APT)黑客组织APT28利用,FireEye公司发布了最新的威胁情报报告《APT28: At The Center for The Storm(APT28:位于风暴中心)》。在此报告中FireEye认定著名的APT28组织就是俄罗斯政府支持的黑客组织。结合本次用YARA规则获取的样本,利用样本里的C&C信息还关联到DDE当前还被大量的Locky类勒索病毒所使用。
报错是:Traceback (most recent call last): File "D:\yujin\���\pycharm\PyCharm Community Edition 5.0.4\helpers\pydev\pydevd.py", line 2411, in <module> globals = debugger.run(setup['file'], None, None, is_module) File "D:\yujin\���\pycharm\PyCharm Community Edition 5.0.4\helpers\pydev\pydevd.py", line 1802, in run launch(file, globals, locals) # execute the script File "D:/yujin/��ҵ���/gui/����/123yara.py", line 35, in <module> yararule = getRules(rulepath) File "D:/yujin/��ҵ���/gui/����/123yara.py", line 13, in getRules for index,file in enumerate(os.listdir(path)): WindowsError: [Error 123] : 'D:\\yujin\\yara\\\xe6\x96\xb0\xe5\xbb\xba\xe6\x96\x87\xe4\xbb\xb6\xe5\xa4\xb9 (2)\xe6\xba\x90\xe4\xbb\xa3\xe7\xa0\x81\\Ft44k-yavol-87828aa60741\\yara_rules/*.*' 望楼主能指点一二,我将不胜感激