±à¼ÍƼö: |
±¾ÎÄÀ´×ÔÓÚwww.8btc.com,ÔÚ±¾ÎÄÖУ¬ÎÒÃǽ«¶ÔÁ½¸ö
payload ½øÐзÖÎöÑо¿£¬ÕâÁ½¸ö¶ñÒâ³ÌÐòÖ®¼äÊÇÏ໥ÅäºÏµÄ£¬Ò»¸ö±»³ÆÎª Upatre£¨¸ºÔðÏÂÔØÆäËû¶ñÒâ³ÌÐò£©£¬Ò»¸ö±»³ÆÎªDyreza£¨¸ºÔðÇÔÈ¡Óû§¸÷ÀàÉí·ÝÐÅÏ¢£©¡£
|
|

ÔÚ¹ýÈ¥Ò»¶Îʱ¼äÀïÃæ£¬ÎÒÃÇ·ÖÎöÁËDyrezaµÄºËÐÄ´úÂëÒÔ¼°Ê¹Óõļ¼Êõ£¬ÄǽÓÏÂÀ´ÎÒÃǽ«Öð²½¶ÔÆä½øÐнâÎö¡£
ʲôÊÇDyreza£¿
Dyreza£¬ÆäÄ¿µÄÊÇÇÔÈ¡ÒøÐÐÕ˺źͱÈÌØ±Ò¡£Õû¸öÁ÷³ÌÊ×ÏÈÊÇͨ¹ýUpatre½øÐÐDyrezaµÄÏÂÔØ£¬¾ÝÑо¿£¬Ä¿Ç°ÌṩDyrezaÏÂÔØµÄ·þÎñÆ÷¾ùΪ·ÓÉÆ÷£¨´ó²¿·ÖΪAirOSºÍMicroTik£©¡£¶ø¹¥»÷ÕßÀûÓÃÈëÇֵķÓÉÆ÷£¬´æÔÚ¶àÖÖ¼ÓÃܵÄ×ÊÔ´°ü£¬¶øÊܵ½¸ÐȾµÄ»úÆ÷£¬»áͨ¹ýUpatreÏÂÔØÂ·ÓÉÆ÷Öдæ·ÅµÄ¼ÓÃܶñÒâ´úÂë³ÌÐò£¬È»ºóÔÚÓû§ÏµÍ³ÖнøÐнâÃܺóµÃµ½DyrezaľÂí¡£
ÎÒÃÇÒª¶ÔÆä½øÐзÖÎöµÄÒâÒåÔÚÓÚ£¬¶ñÒâ³ÌÐòDyreza¼Ò×åĿǰ´æÔÚÓÐÐí¶àµÄ±äÖÖ£¬µ«ÊÇËûÃǵÄÖ÷ÒªÐÐΪ¹ì¼£»¹ÊÇ´æÔÚ¹²ÐԵġ£ÎÒÃÇͨ¹ý·ÖÎöÆäÌØÐÔ¼°¹²ÐÔ£¬ÄܸüºÃµØ½øÐзÀÓù¡£
0¡Á00 Ñù±¾·ÖÎö
£££££
Ñù±¾£ºff3d706015b7b142ee0a8f0ad7ea2911
Dyreza µÄ¿ÉÖ´ÐÐÎļþ£¬Ò»¸ö½©Ê¬ÍøÂçµÄ¿Í»§¶Ë£¬¸ºÔðÖ´ÐÐÖ÷ÒªµÄ¶ñÒâ²Ù×÷¡£
£££££

£££££
Ñù±¾:
5a0e393031eb2accc914c1c832993d0b ¨C Dyreza DLL (32bit)
91b62d1380b73baea53a50d02c88a5c6 ¨C Dyreza DLL (64bit)
£££££
0¡Á01ÐÐΪ·ÖÎö
µ± Dyreza¿ªÊ¼¸ÐȾ¼ÆËã»úµÄʱºò£¬ËüÓµÓнϿìµÄÀ©É¢¸ÐȾËÙ¶È¡£ÎÒÃÇ¿ÉÒÔͨ¹ýÔÚ½ø³Ì¹ÜÀíÖв鿴µ½Ëü£¬Í¬Ê±×îÖ±¹ÛµÄÒ»µã£¬¿ÉÒÔ·¢ÏÖÐí¶àеĽø³Ì±»´´½¨½Ó×ÅÓÖ½áÊø£¬Ïñexplorer,
svchost, taskengµÈ½ø³Ì£¬¶øËù½øÐеÄÕâÒ»½×¶Î£¬¾ÍÊÇΪÁË»ìÏýÆäÖ´ÐеÄÁ÷³Ì£¬¸ÉÈŰ²È«ÈËÔ±µÄÑо¿ºÍ·ÖÎö¡£
½ÓÏÂÀ´£¬Ëü½«Á½¸öͨ¹ýÕýÔò±í´ïʽ [a-zA-Z]{15}.exe , i.e vfHNLkMCYaxBGFy.exeÒÔÎ±Ëæ»úÂëÃüÃûµÄ¶ñÒâ³ÌÐò¸´ÖÆÎļþ·Å½øC:\WindowsÒÔ¼°%APPDATA%Ŀ¼Ï£¬È»ºóͨ¹ýÔÚÈÎÎñµ÷¶ÈÖÐÌí¼ÓÒ»¸öеÄÈÎÎñ£¬ÔÚÿ·ÖÖÓ²»¶ÏµØÖ´ÐжñÒâ³ÌÐòÑù±¾£¬È·±£¶ñÒâ³ÌÐò³ÖÐøÖ´ÐС£

½Ó×Åͨ¹ý½«¶ñÒâ´úÂë×¢Èëµ½ÆäËû½ø³Ì(Èçsvchost, explorer)£¬È»ºóÓëÍâ½çµÄC&C·þÎñÆ÷½øÐÐͨѶ¡£

´ÓÒÔÉϹ۲쵽µÄ½á¹û£¬ÎÒÃÇ¿ÉÒÔÔÚ VirusTotalÉϲéѯµ½£¬ÉÏÊöÓësvchost,ºÍexplorer½ø³Ì½øÐÐͨѶµÄ·þÎñµØÖ·£¬ÆäʵÔçÒѾ±»½øÐбê¼ÇΪ¶ñÒâµØÖ·ÁË£¬Ö÷ÒªµÄ½á¹ûÈçÏ£¬
141.8.226.14 -> virustotal/141.8.226.14/information
83.241.176.230 ->
virustotal/83.241.176.230/information
197.231.198.234 -> virustotal/197.231.198.234/information/
¶øµ±°²×°ÈÎÒâwebä¯ÀÀÆ÷ʱ£¬ËüÒ²»áÖ±½Ó½«¶ñÒâ´úÂë×¢Èëµ½ä¯ÀÀÆ÷µÄ½ø³ÌÖÐÈ¥£¬È»ºó½øÐзǷ¨ÍâÁª¡£ÕâÊǸöñÒâ³ÌÐòÓëÍⲿC&C·þÎñÆ÷±£³ÖÁ¬½ÓµÄ·½Ê½£¬Í¬Ê±Ò²Ö´ÐÐ×Å¼à¿ØÓû§»î¶¯ÒÔ¼°ÇÔÈ¡¸÷ÀàÉí·Ýƾ֤ÐÅÏ¢µÄ¹¦ÄÜ¡£
ͨ¹ýÑо¿Ò²¿ÉÒÔ·¢ÏÖ£¬DyrezaÔÚ½«»ñÈ¡µ½µÄÐÅÏ¢·¢Ë͸ø C&C·þÎñÆ÷֮ǰ£¬»á½«ÐÅÏ¢×÷Ϊһ¸öСÐÍÊý¾Ý¿â´æ·ÅÔÚÃûΪ
TEMPµÄÎļþ¼ÐÖС£
0¡Á02 ´úÂë·ÖÎö
»·¾³¼ì²â
1¡¢Ö´ÐÐǰµÄ¼ì²â£DyrezaÈç¹û¼ì²âµ½»úÆ÷É쵀 cpuÊýÁ¿ÉÙÓÚ2¸ö£¬Ëü½«²»»áÔËÐС£¸Ã¼¼ÊõÊÇΪÁ˽øÐÐ×ÔÎÒ±£»¤£¬È·±£×ÔÉí³ÌÐò²»ÊÇÔËÐÐÔÚÐéÄâ»ú»·¾³ÉÏ¡£ÒòΪ´ÓĿǰµÄÊг¡¼°É豸ÅäÖõÄÇé¿öÀ´¿´£¬³ýÁËÐéÄâ»ú¾³£Ê¹Óõ¥ºËcpuÖ®Í⣬һ°ãÎïÀí»ú¶¼ÊÇË«ºËÒÔÉϵ쬶øDyrezaÒ²ÊÇ»ùÓÚÕâÒ»µã×÷ΪÅжÏÒÀ¾ÝµÄ¡£DyrezaÊÇͨ¹ý¼ì²â½ø³Ì»·¾³¿éϵÄÏß³ÌÐÅÏ¢¿éÖеÄFS:[0x30]ÇøÓòµÄÐÅÏ¢À´½øÐÐÅжϡ£¶øÖ»ÓÐÈ·ÈÏcpuÊýÁ¿Âú×ã´óÓÚ2¸ö£¨°üÀ¨2¸ö£©Ö®ºó£¬¶ñÒâ³ÌÐò²Å»á¼ÌÐøÖ´ÐС£

2¡¢ÔÚÖ´ÐпªÊ¼µÄʱºò£¬¶ñÒâÈí¼þ¼ÓÔØ¶îÍâµÄ±íµ¥µ½Ò»¸öзÖÅäµÄÄÚ´æÒ³¡£ÔÚÔËÐеĹý³ÌÖУ¬Ä£¿éÃûºÍº¯Êý¿ªÊ¼±»½âÃÜ¡£
3¡¢Ö´Ðл·¾³µÄ¼ì²â£Í¨¹ýLookupPrivilegeValueº¯ÊýÖеÄSeDebugPrivilege
²ÎÊý£¬À´ÅжÏÊÇ·ñÔÚµ÷ÊÔÆ÷ϽøÐа²×°£¬Èç¹û¼ì²âµ½·µ»ØÖµÎª·ÇÁãÖµ£¬¶ñÒâ³ÌÐòµÄÖ´Ðн«ÖÕÖ¹¡£

4¡¢½øÐÐÓÐЧִÐÐͨ¹ýÈçϼ¸¸ö¼ì²â·½Ê½¡£Ò»¿ªÊ¼£¬¸ù¾Ý³õʼµÄ»·¾³£¬Í¨¹ý¶Ô·¾¶½øÐиú×Ù¼ì²â£¬Èçµ±³ÌÐòÔËÐÐʱ¿ÉÖ´ÐеÄ·¾¶ºÍ²ÎÊý¡£µ±ËüµÚÒ»´Î°²×°Ê±£¬Ëü½«»á¶Ô×ÔÉí½øÐи´ÖÆ£¬²¢½«¸´ÖƵÄÎļþ·ÅÖÁ
C:\WindowsÒÔ¼°%APPDATA% Ŀ¼Ï£¬²¢½«¸´ÖƵijÌÐò×÷Ϊһ¸öеĽø³ÌÖ´Ðа²×°¡£Èç¹ûËü±»²¿Êðµ½ÓÐЧ·¾¶ºÍ³õʼ²ÎÊý²¢Í¨¹ýÁËÑéÖ¤£¬ÔòÖ´ÐÐÏÂÒ»²½¼ì²é£È·ÈÏÊÇ·ñÊǵÚÒ»´Î°²×°¡£¸Ã²½ÖèÊÇͨ¹ý´´½¨Ò»¸öÌØ¶¨µÄÈ«¾Ö»¥³âÁ¿£¨Ãû³ÆÎª¼ÆËã»úÃûºÍϵͳ°æ±¾µÄ¹þÏ£Öµ£¬Í¨¹ý
GetComputerName, RtlGetVersionÁ½¸öº¯Êý»ñÈ¡£©À´ÊµÏֵġ£
5¡¢Èç¹ûÕâ¸öÌõ¼þÂú×㣬¶ø»¥³âÁ¿Ò²ÒѾ´æÔÚ£¬ÄÇôËü½ÓÏÂÀ´½«½øÐÐ×îÖØÒªµÄÒ»²½£¬Ö´ÐжñÒâ´úÂë¡£Ò»¿ªÊ¼£¬»á½«¼ÓÃܵÄÊý¾ÝºÍÃÜÔ¿´Ó¿ÉÖ´ÐеÄ×ÊÔ´°üÖмÓÔØ¡£

ÈçÉÏͼ£¬T1RY615NR£¼ÓÃܵÄ32λ´úÂ룬YS45H26GT £¼ÓÃܵÄ64λ´úÂ룬UZGN53WMY£ÃÜÔ¿
½ÓÏÂÀ´Êǽâ°ü£¬½«´úÂëÈ¡³ö£º

½â°üµÄËã·¨Ò²ºÜ¼òµ¥£¬key_dataÖаüº¬ÁËÊýÖµºÍÊý¾Ý£ÔÚkey_dataÖÐÊýÖµµÄË÷ÒýÁÐ±í¡£ÎÒÃÇͨ¹ýÏàÓ¦µÄË÷ÒýÁбíÀ´¶ÁÈ¡ÏàÓ¦µÄÊýÖµ¡£ÏàÓ¦µÄ´úÂëÈçÏ£¬
def decode(data,
key_data):
decoded = bytearray()
for i in range(0, len(data)):
val_index = data[i]
decoded.append(key_data[val_index])
return decoded |
½âÃÜÖ´Ðв¿·Ö´úÂëÈçÏ£¬
import argparse
import hashlib
from Crypto.Cipher import AES
BS = 16
pad = lambda s: s + (BS - len(s) % BS) * chr(BS
- len(s) % BS)
unpad = lambda s : s[:-ord(s[len(s)-1:])]
def aes_decrypt(enc, iv, key):
cipher = AES.new(key, AES.MODE_CBC, iv )
return unpad(cipher.decrypt(enc)) |
ÏêϸִÐдúÂ룬¿É²Î¿¼ dyrezadll_decoder.py
½âÃܳöÀ´µÄÎļþ°üÀ¨ÁËÒ»¸öÓÃÓÚ×¢ÈëµÄshellcodeºÍÒ»¸öÓÃÓÚµ÷ÓöñÒâ³ÌÐòº¯ÊýµÄDLL£¨¼æÈÝ32/64룩¡£

0¡Á03 ºËÐĶñÒâ DLL
ÔÚÕâ¸ö½×¶Î£¬¶ñÒâÈí¼þµÄ¹¦ÄܱäµÃ·Ç³£ÇåÎú¡£dllÎļþ²»°üº¬Ì«¶à»ìÏýÐÅÏ¢¨CËü¾ßÓÐÃ÷ÏÔµÄ×Ö·û´®ºÍÒ»¸öµäÐ͵ĵ¼Èë±í¡£
ÎÒÃÇ¿ÉÒÔ¿´µ½±»ÓÃÓÚÓë C&C·þÎñÆ÷½øÐÐͨѶµÄ×Ö·û´®¡£

32ºÍ64λµÄDLL¶¼¾ßÓÐÏàËÆµÄ¹¦ÄÜ¡£Á½Õß֮ǰֻÓмܹ¹Ïà¹Ø²¿·ÖºÍ×Ö·û´®ÊDz»Í¬µÄ¡£¶øÍ¨¹ý¿Í»§¶Ë¿ÉÒÔ¶Ôϵͳ½øÐÐʶ±ð£¬È»ºó½«ÐÅÏ¢·¢Ë͵½
C&C·þÎñÆ÷ÉÏ¡£

ÀàËÆµÄ³ÌÐòÔÚ64λ°æ±¾µÄDLL£¬Ö»ÓÐÔÚÆäÓ²±àÂë×Ö·û´®ÉÏÓá°_64bit¡±´úÌæÁË¡°_32bit¡±£º

ͬʱ£¬¶ÔÍøÂçÉèÖýøÐмì²é£¨È·Èϲ¢¸æÖªÓëC&C¿Í»§¶ËÊÇ·ñ¿ÉÒÔ½¨Á¢ºóÁ¬½Ó¨CÃüÁautobackconn£©

½«¶ñÒâÄ£¿é×¢Èëµ½ä¯ÀÀÆ÷ÖÐÖ´ÐдúÂ룺

½ÓÏÂÀ´£¬³¢ÊÔ·¢ËÍÇÔÈ¡µÄÕË»§ÐÅÏ¢¡£

´ËÍâ³ýÁ˼à²âä¯ÀÀÆ÷Í⣬ËüÒ²ÊÕ¼¯¼ÆËã»úÉÏÏàÓ¦µÄ»ù±¾ÐÅÏ¢£¨±ÈÈçÅäÖ㬴æÔÚÓû§µÈ£©

¸Ã¶ñÒâÈí¼þ²»½öÇÔÈ¡ÐÅÏ¢ºÍÐá̽Óû§µÄä¯ÀÀ»î¶¯£¬²¢ÇÒ»¹ÊÔͼ¶Ôϵͳ½øÐÐÍêÈ«¿ØÖÆ£¬Ä¿µÄÊÇÖ´Ðи÷ÖÖshellÃüÁÈç½øÐÐϵͳ¹Ø»úµÈ£¬²¿·ÖÀý×ÓÈçÏ£º

³¢ÊÔ´´½¨¾ß±¸¹ÜÀíԱȨÏÞµÄÐÂÓû§£º

¿Éͨ¹ýÃüÁîAUTOKILLOSÀ´½øÐйػú²Ù×÷¡£
0¡Á04 C&Cs
¸Ã½©Ê¬ÍøÂçΪÁË·ÀÖ¹±»¼ì²âµ½£¬·þÎñÆ÷Óë¿Í»§¶ËÖ®¼äµÄͨÐÅÊDzÉÓüÓÃܵķ½Ê½£¬²¢²ÉÈ¡ÁËÐí¶à²ßÂÔ¡£
Ê×ÏÈ£¬C&C·þÎñÆ÷µÄµØÖ·ÊÇËæ»ú´ÓÓ²±àÂë³ØÀïÃæÌôÑ¡µÄ¡£¸ÃµØÖ·³ØÊÇ´æ´¢ÔÚDyreza DLL£¨Í¨¹ýAES¼ÓÃÜËã·¨½øÐмÓÃܵ쩵Ä×ÊÔ´°üÖС£½ÓÏÂÀ´£¬ÔÚÖ´ÐÐpayloadµÄʱºò£¬ÎÒÃÇ¿ÉÒÔ¿´µ½ËüÊÇÈçºÎ½øÐнâÃܵġ£

ÒÔÉÏ£¬ÊDZ¾´ÎµÄ·ÖÎöÑо¿Ì½ÌÖ£¬¾ßÌåµÄDyreza´úÂ룬¿ÉÒÔÔÚdyrezaÖлñÈ¡¡£
|