Äú¿ÉÒÔ¾èÖú£¬Ö§³ÖÎÒÃǵĹ«ÒæÊÂÒµ¡£

1Ôª 10Ôª 50Ôª





ÈÏÖ¤Â룺  ÑéÖ¤Âë,¿´²»Çå³þ?Çëµã»÷Ë¢ÐÂÑéÖ¤Âë ±ØÌî



  ÇóÖª ÎÄÕ ÎÄ¿â Lib ÊÓÆµ iPerson ¿Î³Ì ÈÏÖ¤ ×Éѯ ¹¤¾ß ½²×ù Model Center   Code  
»áÔ±   
   
 
     
   
 ¶©ÔÄ
  ¾èÖú
±ÈÌØ±Ò͵ÇÔÕßDyrezaµÄºËÐÄ´úÂë¼°¼¼Êõ·ÖÎö
 
  2089  次浏览      27
 2018-3-8  
 
±à¼­ÍƼö:

±¾ÎÄÀ´×ÔÓÚwww.8btc.com,ÔÚ±¾ÎÄÖУ¬ÎÒÃǽ«¶ÔÁ½¸ö payload ½øÐзÖÎöÑо¿£¬ÕâÁ½¸ö¶ñÒâ³ÌÐòÖ®¼äÊÇÏ໥ÅäºÏµÄ£¬Ò»¸ö±»³ÆÎª Upatre£¨¸ºÔðÏÂÔØÆäËû¶ñÒâ³ÌÐò£©£¬Ò»¸ö±»³ÆÎªDyreza£¨¸ºÔðÇÔÈ¡Óû§¸÷ÀàÉí·ÝÐÅÏ¢£©¡£

ÔÚ¹ýÈ¥Ò»¶Îʱ¼äÀïÃæ£¬ÎÒÃÇ·ÖÎöÁËDyrezaµÄºËÐÄ´úÂëÒÔ¼°Ê¹Óõļ¼Êõ£¬ÄǽÓÏÂÀ´ÎÒÃǽ«Öð²½¶ÔÆä½øÐнâÎö¡£

ʲôÊÇDyreza£¿

Dyreza£¬ÆäÄ¿µÄÊÇÇÔÈ¡ÒøÐÐÕ˺źͱÈÌØ±Ò¡£Õû¸öÁ÷³ÌÊ×ÏÈÊÇͨ¹ýUpatre½øÐÐDyrezaµÄÏÂÔØ£¬¾ÝÑо¿£¬Ä¿Ç°ÌṩDyrezaÏÂÔØµÄ·þÎñÆ÷¾ùΪ·ÓÉÆ÷£¨´ó²¿·ÖΪAirOSºÍMicroTik£©¡£¶ø¹¥»÷ÕßÀûÓÃÈëÇֵķÓÉÆ÷£¬´æÔÚ¶àÖÖ¼ÓÃܵÄ×ÊÔ´°ü£¬¶øÊܵ½¸ÐȾµÄ»úÆ÷£¬»áͨ¹ýUpatreÏÂÔØÂ·ÓÉÆ÷Öдæ·ÅµÄ¼ÓÃܶñÒâ´úÂë³ÌÐò£¬È»ºóÔÚÓû§ÏµÍ³ÖнøÐнâÃܺóµÃµ½DyrezaľÂí¡£

ÎÒÃÇÒª¶ÔÆä½øÐзÖÎöµÄÒâÒåÔÚÓÚ£¬¶ñÒâ³ÌÐòDyreza¼Ò×åĿǰ´æÔÚÓÐÐí¶àµÄ±äÖÖ£¬µ«ÊÇËûÃǵÄÖ÷ÒªÐÐΪ¹ì¼£»¹ÊÇ´æÔÚ¹²ÐԵġ£ÎÒÃÇͨ¹ý·ÖÎöÆäÌØÐÔ¼°¹²ÐÔ£¬ÄܸüºÃµØ½øÐзÀÓù¡£

0¡Á00 Ñù±¾·ÖÎö

£­£­£­£­£­

Ñù±¾£ºff3d706015b7b142ee0a8f0ad7ea2911

Dyreza µÄ¿ÉÖ´ÐÐÎļþ£¬Ò»¸ö½©Ê¬ÍøÂçµÄ¿Í»§¶Ë£¬¸ºÔðÖ´ÐÐÖ÷ÒªµÄ¶ñÒâ²Ù×÷¡£

£­£­£­£­£­

£­£­£­£­£­

Ñù±¾:

5a0e393031eb2accc914c1c832993d0b ¨C Dyreza DLL (32bit)

91b62d1380b73baea53a50d02c88a5c6 ¨C Dyreza DLL (64bit)

£­£­£­£­£­

0¡Á01ÐÐΪ·ÖÎö

µ± Dyreza¿ªÊ¼¸ÐȾ¼ÆËã»úµÄʱºò£¬ËüÓµÓнϿìµÄÀ©É¢¸ÐȾËÙ¶È¡£ÎÒÃÇ¿ÉÒÔͨ¹ýÔÚ½ø³Ì¹ÜÀíÖв鿴µ½Ëü£¬Í¬Ê±×îÖ±¹ÛµÄÒ»µã£¬¿ÉÒÔ·¢ÏÖÐí¶àеĽø³Ì±»´´½¨½Ó×ÅÓÖ½áÊø£¬Ïñexplorer, svchost, taskengµÈ½ø³Ì£¬¶øËù½øÐеÄÕâÒ»½×¶Î£¬¾ÍÊÇΪÁË»ìÏýÆäÖ´ÐеÄÁ÷³Ì£¬¸ÉÈŰ²È«ÈËÔ±µÄÑо¿ºÍ·ÖÎö¡£

½ÓÏÂÀ´£¬Ëü½«Á½¸öͨ¹ýÕýÔò±í´ïʽ [a-zA-Z]{15}.exe , i.e vfHNLkMCYaxBGFy.exeÒÔÎ±Ëæ»úÂëÃüÃûµÄ¶ñÒâ³ÌÐò¸´ÖÆÎļþ·Å½øC:\WindowsÒÔ¼°%APPDATA%Ŀ¼Ï£¬È»ºóͨ¹ýÔÚÈÎÎñµ÷¶ÈÖÐÌí¼ÓÒ»¸öеÄÈÎÎñ£¬ÔÚÿ·ÖÖÓ²»¶ÏµØÖ´ÐжñÒâ³ÌÐòÑù±¾£¬È·±£¶ñÒâ³ÌÐò³ÖÐøÖ´ÐС£

½Ó×Åͨ¹ý½«¶ñÒâ´úÂë×¢Èëµ½ÆäËû½ø³Ì(Èçsvchost, explorer)£¬È»ºóÓëÍâ½çµÄC&C·þÎñÆ÷½øÐÐͨѶ¡£

´ÓÒÔÉϹ۲쵽µÄ½á¹û£¬ÎÒÃÇ¿ÉÒÔÔÚ VirusTotalÉϲéѯµ½£¬ÉÏÊöÓësvchost,ºÍexplorer½ø³Ì½øÐÐͨѶµÄ·þÎñµØÖ·£¬ÆäʵÔçÒѾ­±»½øÐбê¼ÇΪ¶ñÒâµØÖ·ÁË£¬Ö÷ÒªµÄ½á¹ûÈçÏ£¬

141.8.226.14 -> virustotal/141.8.226.14/information

83.241.176.230 -> virustotal/83.241.176.230/information

197.231.198.234 -> virustotal/197.231.198.234/information/

¶øµ±°²×°ÈÎÒâwebä¯ÀÀÆ÷ʱ£¬ËüÒ²»áÖ±½Ó½«¶ñÒâ´úÂë×¢Èëµ½ä¯ÀÀÆ÷µÄ½ø³ÌÖÐÈ¥£¬È»ºó½øÐзǷ¨ÍâÁª¡£ÕâÊǸöñÒâ³ÌÐòÓëÍⲿC&C·þÎñÆ÷±£³ÖÁ¬½ÓµÄ·½Ê½£¬Í¬Ê±Ò²Ö´ÐÐ×Å¼à¿ØÓû§»î¶¯ÒÔ¼°ÇÔÈ¡¸÷ÀàÉí·Ýƾ֤ÐÅÏ¢µÄ¹¦ÄÜ¡£

ͨ¹ýÑо¿Ò²¿ÉÒÔ·¢ÏÖ£¬DyrezaÔÚ½«»ñÈ¡µ½µÄÐÅÏ¢·¢Ë͸ø C&C·þÎñÆ÷֮ǰ£¬»á½«ÐÅÏ¢×÷Ϊһ¸öСÐÍÊý¾Ý¿â´æ·ÅÔÚÃûΪ TEMPµÄÎļþ¼ÐÖС£

0¡Á02 ´úÂë·ÖÎö

»·¾³¼ì²â

1¡¢Ö´ÐÐǰµÄ¼ì²â£­DyrezaÈç¹û¼ì²âµ½»úÆ÷É쵀 cpuÊýÁ¿ÉÙÓÚ2¸ö£¬Ëü½«²»»áÔËÐС£¸Ã¼¼ÊõÊÇΪÁ˽øÐÐ×ÔÎÒ±£»¤£¬È·±£×ÔÉí³ÌÐò²»ÊÇÔËÐÐÔÚÐéÄâ»ú»·¾³ÉÏ¡£ÒòΪ´ÓĿǰµÄÊг¡¼°É豸ÅäÖõÄÇé¿öÀ´¿´£¬³ýÁËÐéÄâ»ú¾­³£Ê¹Óõ¥ºËcpuÖ®Í⣬һ°ãÎïÀí»ú¶¼ÊÇË«ºËÒÔÉϵ쬶øDyrezaÒ²ÊÇ»ùÓÚÕâÒ»µã×÷ΪÅжÏÒÀ¾ÝµÄ¡£DyrezaÊÇͨ¹ý¼ì²â½ø³Ì»·¾³¿éϵÄÏß³ÌÐÅÏ¢¿éÖеÄFS:[0x30]ÇøÓòµÄÐÅÏ¢À´½øÐÐÅжϡ£¶øÖ»ÓÐÈ·ÈÏcpuÊýÁ¿Âú×ã´óÓÚ2¸ö£¨°üÀ¨2¸ö£©Ö®ºó£¬¶ñÒâ³ÌÐò²Å»á¼ÌÐøÖ´ÐС£

2¡¢ÔÚÖ´ÐпªÊ¼µÄʱºò£¬¶ñÒâÈí¼þ¼ÓÔØ¶îÍâµÄ±íµ¥µ½Ò»¸öзÖÅäµÄÄÚ´æÒ³¡£ÔÚÔËÐеĹý³ÌÖУ¬Ä£¿éÃûºÍº¯Êý¿ªÊ¼±»½âÃÜ¡£

3¡¢Ö´Ðл·¾³µÄ¼ì²â£­Í¨¹ýLookupPrivilegeValueº¯ÊýÖеÄSeDebugPrivilege ²ÎÊý£¬À´ÅжÏÊÇ·ñÔÚµ÷ÊÔÆ÷ϽøÐа²×°£¬Èç¹û¼ì²âµ½·µ»ØÖµÎª·ÇÁãÖµ£¬¶ñÒâ³ÌÐòµÄÖ´Ðн«ÖÕÖ¹¡£

4¡¢½øÐÐÓÐЧִÐÐͨ¹ýÈçϼ¸¸ö¼ì²â·½Ê½¡£Ò»¿ªÊ¼£¬¸ù¾Ý³õʼµÄ»·¾³£¬Í¨¹ý¶Ô·¾¶½øÐиú×Ù¼ì²â£¬Èçµ±³ÌÐòÔËÐÐʱ¿ÉÖ´ÐеÄ·¾¶ºÍ²ÎÊý¡£µ±ËüµÚÒ»´Î°²×°Ê±£¬Ëü½«»á¶Ô×ÔÉí½øÐи´ÖÆ£¬²¢½«¸´ÖƵÄÎļþ·ÅÖÁ C:\WindowsÒÔ¼°%APPDATA% Ŀ¼Ï£¬²¢½«¸´ÖƵijÌÐò×÷Ϊһ¸öеĽø³ÌÖ´Ðа²×°¡£Èç¹ûËü±»²¿Êðµ½ÓÐЧ·¾¶ºÍ³õʼ²ÎÊý²¢Í¨¹ýÁËÑéÖ¤£¬ÔòÖ´ÐÐÏÂÒ»²½¼ì²é£­È·ÈÏÊÇ·ñÊǵÚÒ»´Î°²×°¡£¸Ã²½ÖèÊÇͨ¹ý´´½¨Ò»¸öÌØ¶¨µÄÈ«¾Ö»¥³âÁ¿£¨Ãû³ÆÎª¼ÆËã»úÃûºÍϵͳ°æ±¾µÄ¹þÏ£Öµ£¬Í¨¹ý GetComputerName, RtlGetVersionÁ½¸öº¯Êý»ñÈ¡£©À´ÊµÏֵġ£

5¡¢Èç¹ûÕâ¸öÌõ¼þÂú×㣬¶ø»¥³âÁ¿Ò²ÒѾ­´æÔÚ£¬ÄÇôËü½ÓÏÂÀ´½«½øÐÐ×îÖØÒªµÄÒ»²½£¬Ö´ÐжñÒâ´úÂë¡£Ò»¿ªÊ¼£¬»á½«¼ÓÃܵÄÊý¾ÝºÍÃÜÔ¿´Ó¿ÉÖ´ÐеÄ×ÊÔ´°üÖмÓÔØ¡£

ÈçÉÏͼ£¬T1RY615NR£­¼ÓÃܵÄ32λ´úÂ룬YS45H26GT £­¼ÓÃܵÄ64λ´úÂ룬UZGN53WMY£­ÃÜÔ¿

½ÓÏÂÀ´Êǽâ°ü£¬½«´úÂëÈ¡³ö£º

½â°üµÄËã·¨Ò²ºÜ¼òµ¥£¬key_dataÖаüº¬ÁËÊýÖµºÍÊý¾Ý£­ÔÚkey_dataÖÐÊýÖµµÄË÷ÒýÁÐ±í¡£ÎÒÃÇͨ¹ýÏàÓ¦µÄË÷ÒýÁбíÀ´¶ÁÈ¡ÏàÓ¦µÄÊýÖµ¡£ÏàÓ¦µÄ´úÂëÈçÏ£¬

def decode(data, key_data):
decoded = bytearray()
for i in range(0, len(data)):
val_index = data[i]
decoded.append(key_data[val_index])
return decoded

½âÃÜÖ´Ðв¿·Ö´úÂëÈçÏ£¬

import argparse
import hashlib
from Crypto.Cipher import AES
BS = 16
pad = lambda s: s + (BS - len(s) % BS) * chr(BS - len(s) % BS)
unpad = lambda s : s[:-ord(s[len(s)-1:])]
def aes_decrypt(enc, iv, key):
cipher = AES.new(key, AES.MODE_CBC, iv )
return unpad(cipher.decrypt(enc))

ÏêϸִÐдúÂ룬¿É²Î¿¼ dyrezadll_decoder.py

½âÃܳöÀ´µÄÎļþ°üÀ¨ÁËÒ»¸öÓÃÓÚ×¢ÈëµÄshellcodeºÍÒ»¸öÓÃÓÚµ÷ÓöñÒâ³ÌÐòº¯ÊýµÄDLL£¨¼æÈÝ32/64룩¡£

0¡Á03 ºËÐĶñÒâ DLL

ÔÚÕâ¸ö½×¶Î£¬¶ñÒâÈí¼þµÄ¹¦ÄܱäµÃ·Ç³£ÇåÎú¡£dllÎļþ²»°üº¬Ì«¶à»ìÏýÐÅÏ¢¨CËü¾ßÓÐÃ÷ÏÔµÄ×Ö·û´®ºÍÒ»¸öµäÐ͵ĵ¼Èë±í¡£

ÎÒÃÇ¿ÉÒÔ¿´µ½±»ÓÃÓÚÓë C&C·þÎñÆ÷½øÐÐͨѶµÄ×Ö·û´®¡£

32ºÍ64λµÄDLL¶¼¾ßÓÐÏàËÆµÄ¹¦ÄÜ¡£Á½Õß֮ǰֻÓмܹ¹Ïà¹Ø²¿·ÖºÍ×Ö·û´®ÊDz»Í¬µÄ¡£¶øÍ¨¹ý¿Í»§¶Ë¿ÉÒÔ¶Ôϵͳ½øÐÐʶ±ð£¬È»ºó½«ÐÅÏ¢·¢Ë͵½ C&C·þÎñÆ÷ÉÏ¡£

ÀàËÆµÄ³ÌÐòÔÚ64λ°æ±¾µÄDLL£¬Ö»ÓÐÔÚÆäÓ²±àÂë×Ö·û´®ÉÏÓá°_64bit¡±´úÌæÁË¡°_32bit¡±£º

ͬʱ£¬¶ÔÍøÂçÉèÖýøÐмì²é£¨È·Èϲ¢¸æÖªÓëC&C¿Í»§¶ËÊÇ·ñ¿ÉÒÔ½¨Á¢ºóÁ¬½Ó¨CÃüÁautobackconn£©

½«¶ñÒâÄ£¿é×¢Èëµ½ä¯ÀÀÆ÷ÖÐÖ´ÐдúÂ룺

½ÓÏÂÀ´£¬³¢ÊÔ·¢ËÍÇÔÈ¡µÄÕË»§ÐÅÏ¢¡£

´ËÍâ³ýÁ˼à²âä¯ÀÀÆ÷Í⣬ËüÒ²ÊÕ¼¯¼ÆËã»úÉÏÏàÓ¦µÄ»ù±¾ÐÅÏ¢£¨±ÈÈçÅäÖ㬴æÔÚÓû§µÈ£©

¸Ã¶ñÒâÈí¼þ²»½öÇÔÈ¡ÐÅÏ¢ºÍÐá̽Óû§µÄä¯ÀÀ»î¶¯£¬²¢ÇÒ»¹ÊÔͼ¶Ôϵͳ½øÐÐÍêÈ«¿ØÖÆ£¬Ä¿µÄÊÇÖ´Ðи÷ÖÖshellÃüÁÈç½øÐÐϵͳ¹Ø»úµÈ£¬²¿·ÖÀý×ÓÈçÏ£º

³¢ÊÔ´´½¨¾ß±¸¹ÜÀíԱȨÏÞµÄÐÂÓû§£º

¿Éͨ¹ýÃüÁîAUTOKILLOSÀ´½øÐйػú²Ù×÷¡£

0¡Á04 C&Cs

¸Ã½©Ê¬ÍøÂçΪÁË·ÀÖ¹±»¼ì²âµ½£¬·þÎñÆ÷Óë¿Í»§¶ËÖ®¼äµÄͨÐÅÊDzÉÓüÓÃܵķ½Ê½£¬²¢²ÉÈ¡ÁËÐí¶à²ßÂÔ¡£

Ê×ÏÈ£¬C&C·þÎñÆ÷µÄµØÖ·ÊÇËæ»ú´ÓÓ²±àÂë³ØÀïÃæÌôÑ¡µÄ¡£¸ÃµØÖ·³ØÊÇ´æ´¢ÔÚDyreza DLL£¨Í¨¹ýAES¼ÓÃÜËã·¨½øÐмÓÃܵ쩵Ä×ÊÔ´°üÖС£½ÓÏÂÀ´£¬ÔÚÖ´ÐÐpayloadµÄʱºò£¬ÎÒÃÇ¿ÉÒÔ¿´µ½ËüÊÇÈçºÎ½øÐнâÃܵġ£

ÒÔÉÏ£¬ÊDZ¾´ÎµÄ·ÖÎöÑо¿Ì½ÌÖ£¬¾ßÌåµÄDyreza´úÂ룬¿ÉÒÔÔÚdyrezaÖлñÈ¡¡£

 

 

   
2089 ´Îä¯ÀÀ       27
Ïà¹ØÎÄÕÂ

»ùÓÚEAµÄÊý¾Ý¿â½¨Ä£
Êý¾ÝÁ÷½¨Ä££¨EAÖ¸ÄÏ£©
¡°Êý¾Ýºþ¡±£º¸ÅÄî¡¢ÌØÕ÷¡¢¼Ü¹¹Óë°¸Àý
ÔÚÏßÉ̳ÇÊý¾Ý¿âϵͳÉè¼Æ ˼·+Ч¹û
 
Ïà¹ØÎĵµ

GreenplumÊý¾Ý¿â»ù´¡Åàѵ
MySQL5.1ÐÔÄÜÓÅ»¯·½°¸
ijµçÉÌÊý¾ÝÖÐ̨¼Ü¹¹Êµ¼ù
MySQL¸ßÀ©Õ¹¼Ü¹¹Éè¼Æ
Ïà¹Ø¿Î³Ì

Êý¾ÝÖÎÀí¡¢Êý¾Ý¼Ü¹¹¼°Êý¾Ý±ê×¼
MongoDBʵս¿Î³Ì
²¢·¢¡¢´óÈÝÁ¿¡¢¸ßÐÔÄÜÊý¾Ý¿âÉè¼ÆÓëÓÅ»¯
PostgreSQLÊý¾Ý¿âʵսÅàѵ