<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>鹰眼威胁情报中心</title>
    <link>https://wechat2rss.xlab.app/feed/6bdcd81fd3702868c913261790ec10ffb76df144.xml</link>
    <description>鹰眼威胁情报中心，是金山毒霸旗下新一代威胁情报预警，研判分析共享平台。依托毒霸海量安全防护数据，顶级安全专家团队，产出精准高质量的威胁情报，帮助安全分析人员快速高效对安全事件防御检测和溯源分析。&#xA;(wechat feed made by @ttttmr https://wechat2rss.xlab.app)</description>
    <managingEditor> (鹰眼威胁情报中心)</managingEditor>
    <image>
      <url>https://wx.qlogo.cn/mmhead/Q3auHgzwzM4nJqDkdVicNJpee93hwFjutBr4ZastKUMzyYaU6TtiaaYw/0</url>
      <title>鹰眼威胁情报中心</title>
      <link>https://wechat2rss.xlab.app/feed/6bdcd81fd3702868c913261790ec10ffb76df144.xml</link>
    </image>
    <item>
      <title>宝爸宝妈请注意！3600元育儿补贴最新骗局来了</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzU2OTcxNjE4Mw==&amp;mid=2247486086&amp;idx=1&amp;sn=3724a0b0ce323a9831558b806a70232a</link>
      <description>记住三不原则，别让骗子偷走孩子的成长津贴！“您好，这里是卫健委，您的3600元育儿补贴已到账，请点击链接申领！</description>
      <content:encoded><![CDATA[<p>
原创 <span>DRP</span> <span>2025-08-28 18:01</span> <span style="display: inline-block;">北京</span>
</p>




<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=08bfe4cb&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2FXia34CufgojvvT2pKp00lGAAU0e1ichyGm6Wgg9ckO0nxuz6g41Tjgickkwa6q5WU44BqGicpUeItodLdB1aMNdxoA%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<blockquote><p><span leaf="">记住三不原则，别让骗子偷走孩子的成长津贴！</span></p></blockquote><p><span leaf="">“您好，这里是卫健委，您的3600元育儿补贴已到账，请点击链接申领！” 收到这样的短信，新手妈妈陈女士瞬间警觉，想起社区民警的提醒：“主动找你发补贴的，都是诈骗！”她果断删除了短信。</span></p><p><span leaf="">然而，骗局远不止于此。有人接到自称“人社厅”的电话，险些报出银行卡号；有人在妈妈群里随手扫了个“补贴二维码”，账户存款被洗劫一空。</span></p><p><span leaf="">这背后，是一张由信息泄露、精准定位和多渠道攻击编织的精密骗网。</span></p><p><span data-lark-record-format="docx/record"></span></p><h2 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 20px;font-weight: bold;">一、骗子为何盯上育儿补贴？</span></span></h2><p><span leaf="">骗子之所以能直呼其名、甚至报出您孩子的出生信息，关键在于他们掌握了非法获取的个人数据。</span></p><ol class="list-paddingleft-1" start="1"><li style="text-align:left;"><p><strong><span leaf="">政策</span></strong><strong><span leaf="">窗口期</span></strong><strong><span leaf="">被利用</span></strong><span leaf="">：2025年7月，国家《育儿补贴制度实施方案》正式实施，规定对0-3岁婴幼儿每年发放3600元补贴。在官方线上渠道（8月31日前）尚未全面开通的“时间差”里，骗子们闻风而动，抢先布局。</span></p></li><li style="text-align:left;"><p><strong><span leaf="">黑灰产数据泄露</span></strong><span leaf="">：骗术的起点，始于您信息的泄露。在暗网等非法渠道，包含“</span><strong><span leaf="">母亲身份证、母亲姓名、联系电话、新生儿姓名、出生年月</span></strong><span leaf="">”等精准数据已被打包售卖。骗子手握这些信息，伪装成官方人员时足以以假乱真，让您瞬间放下防备。</span></p></li></ol><p><span data-lark-record-format="docx/record"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002426" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.7294117647058823" data-s="300,640" data-type="png" data-w="425" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=6b0be350&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojvvT2pKp00lGAAU0e1ichyGmjaN5wEJVV4iaicIZEhYF9881ibWuRn117JWOzRRhT0kMA0rXJtL3uAOcg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><h2 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 20px;font-weight: bold;">二、诈骗套路再升级！4大渠道全解析</span></span></h2><h3><strong><span leaf="">套路1：【短信轰炸】+ 钓鱼链接</span></strong></h3><p><span leaf="">这是最经典的套路。骗子冒充卫健委、财政局，发送含“3600元补贴待领取”“24小时失效”等字眼的短信，并附上高仿政府网站的钓鱼链接。</span></p><ul class="list-paddingleft-1"><li style="text-align:left;"><p><strong><span leaf="">请注意</span></strong><span leaf="">：这些假冒网站域名会进行伪装，如将后缀 </span><strong><span leaf="">.</span></strong><strong><span leaf="">gov.cn</span></strong><span leaf="">（真官网）篡改为 </span><strong><span leaf="">gov.com.cn</span></strong><span leaf=""> 或 </span><strong><span leaf="">g0v.cn</span></strong><span leaf="">，一字之差，就是陷阱。</span></p></li></ul><p><span data-lark-record-format="docx/record"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002428" class="rich_pages wxw-img" data-ratio="0.5842592592592593" data-s="300,640" data-type="png" data-w="1080" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=36a44583&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojvvT2pKp00lGAAU0e1ichyGmnFaYnSNHsh8cg81wXS1rknAIDlAjhLvVzQk5uwRfsDHPM5VCx0hsjA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002427" class="rich_pages wxw-img js_insertlocalimg" data-ratio="1.4921968787515005" data-s="300,640" data-type="png" data-w="833" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=8aec153e&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojvvT2pKp00lGAAU0e1ichyGmwagoRulFDQBZxEXjrHsDFC0ZtXzoPlUfCZ0XSj7nkMLbKuibYhFjgBg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p data-pm-slice="0 0 []"><span leaf="" style="color:rgba(0, 0, 0, 0.9);font-size:17px;font-family:&#34;mp-quote&#34;, &#34;PingFang SC&#34;, system-ui, -apple-system, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;line-height:1.6;letter-spacing:0.034em;font-style:normal;font-weight:normal;"><span textstyle="" style="font-size: 12px;"> </span></span><span style="color: rgb(136, 136, 136);font-family: &#34;Helvetica Neue&#34;, Helvetica, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;font-size: 14px;font-style: normal;font-variant-ligatures: normal;font-variant-caps: normal;font-weight: 400;letter-spacing: 0.5px;orphans: 2;text-align: justify;text-indent: 0px;text-transform: none;widows: 2;word-spacing: 0px;-webkit-text-stroke-width: 0px;background-color: rgb(255, 255, 255);text-decoration-thickness: initial;text-decoration-style: initial;text-decoration-color: initial;display: inline !important;float: none;" data-pm-slice="0 0 []"><span leaf="">△图片来源：昭阳警方</span></span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;S50Wd7zsTo0l3yxZzvScC8Aunnf&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;图片来源：金坛公安&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+9&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006285747716100&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;a9e016f3-7d60-4258-b0e3-67227682c750&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:24,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:9},&#34;recordId&#34;:&#34;ENDndF5svoq1uqxZ853cvTeynzd&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><h3 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-weight: bold;">套路2：【电话“客服”】+ 精准下套</span></span></h3><p><span leaf="">“您好，是XX妈妈吗？这里是人社厅，看到您申请的育儿补贴还未到账，请提供卡号，我们后台为您查一下。”</span></p><ul class="list-paddingleft-1"><li style="text-align:left;"><p><strong><span leaf="">特点</span></strong><span leaf="">：骗子能准确说出您的姓名，以“帮您解决问题”为由，表现得非常“热心”。当您稍有迟疑，他们就会催促您点击其随后发来的短信链接，或是在电话里直接套取银行卡号和验证码。</span></p></li><li style="text-align:left;"><p><strong><span leaf="">破绽</span></strong><span leaf="">：这类骗子往往口音不符、业务生疏，被多问几句就会支支吾吾，甚至慌乱挂断电话。反诈中心监测到此类通话后，可能会立即向您发送预警提醒。</span></p></li></ul><h3><span leaf=""><span textstyle="" style="font-weight: bold;">套路3：【社群渗透】+ 病毒二维码</span></span></h3><p><span leaf="">深夜或午休时段，在母婴群、业主群里突然出现这样的消息：</span></p><blockquote><p><span leaf="">“@所有人《2025年度综合补贴》申领办理通知，育儿、社保、医保补贴已下发！（请于XX月XX日前认证，逾期作废）”</span></p></blockquote><p><span leaf="">并附上一张二维码，引导您“扫码进入小程序自助申请”。</span></p><ul class="list-paddingleft-1"><li style="text-align:left;"><p><strong><span leaf="">危险</span></strong><span leaf="">：这不仅是钓鱼陷阱，背后可能还隐藏着更深的技术攻击。有骗子会先</span><strong><span leaf="">通过木马病毒远程控制某位群友的电脑或手机</span></strong><span leaf="">，再用其微信将诈骗信息发到群里，使其看起来像是来自“熟人”的分享，极具迷惑性。</span></p></li></ul><p><span data-lark-record-format="docx/record"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002429" class="rich_pages wxw-img js_insertlocalimg" data-ratio="1.5074946466809422" data-s="300,640" data-type="png" data-w="467" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=af7f1167&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojvvT2pKp00lGAAU0e1ichyGm1rahS6plWFX3bgJoCUyoEdxWic7B7bTezCpXLxA98E6ibyIOVkBWa9FQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p data-pm-slice="2 3 []"><span style="color: rgb(136, 136, 136);font-family: &#34;Helvetica Neue&#34;, Helvetica, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;font-size: 14px;font-style: normal;font-variant-ligatures: normal;font-variant-caps: normal;font-weight: 400;letter-spacing: 0.5px;orphans: 2;text-align: justify;text-indent: 0px;text-transform: none;widows: 2;word-spacing: 0px;-webkit-text-stroke-width: 0px;background-color: rgb(255, 255, 255);text-decoration-thickness: initial;text-decoration-style: initial;text-decoration-color: initial;display: inline !important;float: none;" data-pm-slice="0 0 []"><span leaf="">△图片来源：网络</span></span></p><p style="text-align: center;" nodeleaf=""><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002430" data-ratio="1.7692307692307692" data-s="300,640" type="block" data-type="png" data-w="416" src="https://wechat2rss.xlab.app/img-proxy/?k=25a0fb3b&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojvvT2pKp00lGAAU0e1ichyGmyp3ibSibibckksNLKV1PCeBIs9LB4ZbF85uPENswQATzeDUyugpiaswLSg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><h3 data-pm-slice="0 0 []"><strong><span leaf="">套路4：【连环设套】+ 盗空存款</span></strong></h3><p><span leaf="">无论入口是短信、电话还是二维码，最终目的都是引诱您进入以下三步，盗空您的存款：</span></p><ol class="list-paddingleft-1" start="1"><li style="text-align:left;"><p><strong><span leaf="">第一步</span></strong><span leaf="">：诱导点击链接/扫码 → 填写身份证、银行卡号、预留手机号。</span></p></li><li style="text-align:left;"><p><strong><span leaf="">第二步</span></strong><span leaf="">：以“验证身份”“授权到账”为名，索要您收到的</span><strong><span leaf="">短信验证码</span></strong><span leaf="">（实为转账授权码）。</span></p></li><li style="text-align:left;"><p><strong><span leaf="">第三步</span></strong><span leaf="">：要求您开启</span><strong><span leaf="">人脸识别</span></strong><span leaf="">或</span><strong><span leaf="">屏幕共享</span></strong><span leaf="">，一旦照做，您的账户将彻底暴露，瞬间完成盗刷。</span></p></li></ol><p style="text-align: center;"><strong><span leaf=""><span textstyle="" style="font-size: 15px;">钓鱼网站页面</span></span></strong></p><p><span data-lark-record-format="docx/record"></span></p><p style="text-align: center;" nodeleaf=""><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002431" data-ratio="2.0356164383561643" data-s="300,640" type="block" data-type="png" data-w="365" src="https://wechat2rss.xlab.app/img-proxy/?k=0693a133&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojvvT2pKp00lGAAU0e1ichyGmjyrvfyVKoP74GFxTG2Bg1iauTqaNMxGl7sFzL8zeeb3eInIT0V7uadQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><h2 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 20px;font-weight: bold;">三、牢记“三不三查”防骗口诀</span></span></h2><p><span leaf="">✅ 三不原则</span></p><ol class="list-paddingleft-1" start="1"><li style="text-align:left;"><p><span leaf="">不点击：政府绝不会通过短信、微信链接发补贴！</span></p></li><li style="text-align:left;"><p><span leaf="">不泄露：银行卡密码、验证码、人脸信息打死不说！</span></p></li><li style="text-align:left;"><p><span leaf="">不交钱：凡收“手续费”“保证金”的都是骗子。</span></p></li></ol><p><span leaf="">✅ 三查行动</span></p><ol class="list-paddingleft-1" start="1"><li style="text-align:left;"><p><span leaf="">查渠道：线上仅认准 支付宝/微信官方小程序、省级政务平台（8月下旬开放）；线下到户籍地街道办办理。</span></p></li></ol><p style="text-align: center;"><strong><span leaf=""><span textstyle="" style="font-size: 14px;">支付宝搜索页面</span></span></strong></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002432" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.5657407407407408" data-s="300,640" data-type="png" data-w="1080" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=ca6b6e24&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojvvT2pKp00lGAAU0e1ichyGmph1nrJue5cPowsLk70xkoAjM4um2gcWOV4icmWTicsAGfve9ZvWhleaQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p style="text-align: center;"><strong><strong><span leaf="" data-pm-slice="1 1 [&#34;para&#34;,{&#34;tagName&#34;:&#34;p&#34;,&#34;attributes&#34;:{&#34;style&#34;:&#34;text-align: center;&#34;},&#34;namespaceURI&#34;:&#34;http://www.w3.org/1999/xhtml&#34;},&#34;node&#34;,{&#34;tagName&#34;:&#34;strong&#34;,&#34;attributes&#34;:{},&#34;namespaceURI&#34;:&#34;http://www.w3.org/1999/xhtml&#34;}]"><span textstyle="" style="font-size: 14px;">微信搜索页面</span></span></strong></strong></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002433" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.4185185185185185" data-s="300,640" data-type="png" data-w="1080" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=de4040df&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojvvT2pKp00lGAAU0e1ichyGmNhBb8sE68YeM2EsG5KtuuDXQ8fmmAejrJevjKzzKL1T22CyLPAVsEw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><span data-lark-record-format="docx/record"></span></p><ol class="list-paddingleft-1" start="2"><li style="text-align:left;"><p><span leaf="">查网址：政府网站域名必含 </span><code><span leaf="">.gov.cn</span></code><span leaf="">，其他一律拉黑。</span></p></li><li style="text-align:left;"><p><span leaf="">查来源：拨打当地卫健委、街道办公开电话核验（骗子最怕你主动联系真部门）。</span></p></li></ol><p><span data-lark-record-format="docx/record"></span></p><h2 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 20px;font-weight: bold;">四、万一中招，紧急挽救3步走</span></span></h2><ol class="list-paddingleft-1" start="1"><li style="text-align:left;"><p><span leaf="">立即冻结：拨打银行客服挂失银行卡；</span></p></li><li style="text-align:left;"><p><span leaf="">修改密码：火速重置手机银行、支付软件密码；</span></p></li><li style="text-align:left;"><p><span leaf="">果断报警：保留证据拨打110或反诈专线96110。</span></p></li></ol><p><span data-lark-record-format="docx/record"></span></p><h3 data-pm-slice="0 0 []"><span leaf="">📌 关键提醒</span></h3><blockquote><p><span leaf="">“真补贴不怕晚，国家的承诺绝不漏发一人”</span></p><p><span leaf="">截至2025年8月28日，各地育儿补贴尚未开通线上申领！凡主动联系你的“工作人员”，都是披着羊皮的狼。</span></p></blockquote><p><span leaf="">守住孩子的成长津贴，从记住这句话开始：</span></p><blockquote><p><span leaf="">不贪快、不轻信、不转账，认准 “.gov.cn” 和 街道办窗口，才是领到3600元的正道！</span></p></blockquote><p><span leaf="">提高警惕是最好的“防火墙”。与此同时，作为您的安全伙伴，我们也在背后默默努力。</span></p><p><span leaf="">目前，毒霸已经能够成功拦截最新的育儿补贴相关诈骗链接。未来我们也会持续关注，第一时间更新应对策略。</span></p><p><span data-lark-record-format="docx/record"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002434" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.5046296296296297" data-s="300,640" data-type="png" data-w="1080" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=d8f2d029&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojvvT2pKp00lGAAU0e1ichyGmbbVrocuWCcHiaG6kiaibjaWicaNxibIlZnaLGzlh4oOJ9WlwvswOY6EZmoA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p style="display: none;"><mp-style-type data-value="3"></mp-style-type></p>



<p><a href="2247486086">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=14924e78&amp;r=1&amp;u=https%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzU2OTcxNjE4Mw%3D%3D%26mid%3D2247486086%26idx%3D1%26sn%3D3724a0b0ce323a9831558b806a70232a">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Thu, 28 Aug 2025 18:01:00 +0800</pubDate>
    </item>
    <item>
      <title>&#34;银狐&#34;新进展：多Rootkit配合，内核InfinityHook+穿透读写</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzU2OTcxNjE4Mw==&amp;mid=2247486072&amp;idx=1&amp;sn=ce36707ae3974cc872b4432a8edf2dee</link>
      <description>&#34;银狐&#34;新进展：多Rootkit配合，内核InfinityHook+穿透读写</description>
      <content:encoded><![CDATA[<p>
原创 <span>ch</span> <span>2025-07-21 20:52</span> <span style="display: inline-block;">广东</span>
</p>

<p>"银狐"新进展：多Rootkit配合，内核InfinityHook+穿透读写</p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=4fa3b988&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJ98POicW53pBia7iciaSM7zChwoIh64EKSfSsvRwzJWxEHewhicN1RBg9FSg%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<h1 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 24px;font-weight: bold;">攻击背景</span></span></h1><p data-pm-slice="0 0 []"><span leaf="">近期金山毒霸安全团队接到多位用户求助，发现在未操作电脑的情况下，鼠标自行移动操作微信，群发多个病毒文件。安全工程师介入分析后发现这是新型&#34;银狐&#34;远控木马。之后的溯源排查中发现病毒来源于搜索引擎推广，攻击者批量投放多个仿冒下载页涉及 CMake、Chrome浏览器、快连 VPN、Gmail邮箱客户端等软件，目标群体广泛。本次样本在隐蔽性上进一步提升，在运行中释放多个RootKit驱动程序，利用InfinityHook内核hook技术挂钩系统进程遍历Api达到隐藏自身进程的目的，为了进一步持久化使用内核读写穿透移除或禁用安全软件在内核的回调函数，达到致盲AV和EDR等安全软件。应用层最终加载”winos“远控木马来操控用户设备。</span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;详细分析&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+4&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;heading1&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;8ca5ba01-185b-4564-a7a4-5f97f8c8c664&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:6,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:4},&#34;recordId&#34;:&#34;Umf0dNsPzomlrOxqHxncA3aZnDb&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><h3 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 18px;font-weight: bold;">执行流程：</span></span></h3><p style="text-align: center;" nodeleaf=""><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002422" data-ratio="0.5027777777777778" data-s="300,640" type="block" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=96a57bff&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJic77ibLXlJ84vqmM0ynLtJfh8JIEvhWiaRrNeA1EV5FtdiaDN1l2y8RcwA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><h3 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 18px;font-weight: bold;">1.核心驱动</span></span></h3><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;1.核心驱动&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+6&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;heading3&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;b919b28a-fa0a-447d-999d-47fd7fd0dc53&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:9,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:6},&#34;recordId&#34;:&#34;FnDPdsDCkobDgGxjMm5cXKFmnkb&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><h4 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 17px;font-weight: bold;">  rwdriver.sys</span></span></h4><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;rwdriver.sys&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+c&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;heading4&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;398aea69-3747-473e-8e89-18d2ea184668&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:10,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:12},&#34;recordId&#34;:&#34;NFV2dH9LoodvAVxWZwqc9xAEnae&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p data-pm-slice="0 0 []"><span leaf="">功能为读写任意地址数据，进行拷贝覆盖。驱动使用的为泄露的“中兴通讯股份有限公司”过期签名</span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;功能为读写任意地址数据，进行拷贝覆盖。驱动使用的为中兴通讯股份有限公司过期签名&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*1*0+13&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;comment-id-7529345075647594524&#34;,&#34;true&#34;],&#34;1&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:2}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;1bb5a515-23cd-46db-93d1-5279041a5e70&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:11,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:39},&#34;recordId&#34;:&#34;VkpsdV693oJZm0x7QyrcQZzBnwe&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002389" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.4685185185185185" data-s="300,640" data-type="png" data-w="1080" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=ad4fe8a7&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJQbtHznrJUSJp8EkHibDhO8R36ia5Dianw8MngSaCibEDfKDgG6AROjWulQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p data-pm-slice="0 0 []"><span leaf="">Pdb符号显示这是一个在桌面编译的 rwdriver开源内核穿透读写项目。</span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;Pdb 符号”C:\\Users\\Administrator\\Desktop\\rwdriver-master\\x64\\Release\\rwdriver.pdb “显示这是一个在桌面编译的 rwdriver开源内核穿透读写项目。&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+34&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006010576289796&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;64404d63-7001-4762-a427-1505db92a348&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:115,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:112},&#34;recordId&#34;:&#34;FvivdyZeuooJtnxTRp2cxwgenbc&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002390" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.2538293216630197" data-s="300,640" data-type="png" data-w="457" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=c0539185&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJMUlhfiaRv0HbP3zuicKEnialebZVCzc5icqibAoRS3CUg3cM2BiaclNCrCZQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p data-pm-slice="0 0 []"><span leaf="">驱动接收控制码请求后，对指定地址进行读写操作</span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;驱动接收控制码请求后，对指定地址进行读写操作&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+m&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;7ac1ba6a-afa0-408f-a18c-6ba1b12972e2&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:13,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:22},&#34;recordId&#34;:&#34;SSNcd8hxboYDEKxNIcgcww3Wntf&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002391" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.6713124274099884" data-s="300,640" data-type="png" data-w="861" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=d2281350&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJXe2X2IQBHWSCYfdhABDxpRTYb7sBuknzM3Q6bibibynwiciae5t6R3LTuw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><h4 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 17px;font-weight: bold;">Cndom6.sys</span></span></h4><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;Cndom6.sys&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+a&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;heading4&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;11e3cd3b-7da9-466b-9295-d8c2f710310a&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:15,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:10},&#34;recordId&#34;:&#34;DKULdyPx8ocyE0xyne3ctFUwnMg&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p data-pm-slice="0 0 []"><span leaf="">驱动签名为“深圳市至高通讯技术发展有限公司”的过期签名。该驱动使用 InfinityHook 技术实现内核 API HOOK，通过针对不同系统版本设置特定偏移值，配合 SSDT 表定位目标函数地址，从而实现对系统关键 API 的 HOOK 操作。</span></p><p><span leaf="">由于 Windows 系统通过内置的 PatchGuard（内核补丁保护）机制，对包括 SSDT 表项、NotifyRoutine、ObRegisterCallback 等多个关键内核结构进行完整性校验，防止篡改系统核心逻辑。一旦检测到异常修改，将立即触发系统蓝屏以防止攻击。而InfinityHook正是为了绕过PatchGuard检查hook SystemCall而生，其原理通过修改系统数据的回调指针获得控制权，再遍历堆栈数据查找SSDT函数修改为自己的函数达到hook效果。早期以ETW的回调数据结构作为切入点，后来微软补丁更新后被修复，但开源项目中依然有开发者不断寻找系统新的利用点更新这个项目。 限于篇幅本文不再详细展开细述。</span></p><p><span data-lark-record-format="docx/record"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002392" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.4305555555555556" data-s="300,640" data-type="png" data-w="1080" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=be32a9e0&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJg9Kiceem2boyqTPUDE0icoP8CcSL6QsAzC3PBmicTnxiadCnmqLW6hZB5g%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p data-pm-slice="0 0 []"><span leaf="">本次驱动主要HOOK 三个API，被HOOK API与功能如下：</span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;本次驱动主要HOOK 三个API，被HOOK API与功能如下：&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+w&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;e2c82804-cd57-4ab7-9ba7-a62a4afe98a8&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:20,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:32},&#34;recordId&#34;:&#34;JoHZdXC2EoxbnMxl3nMcV3iLnXe&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002393" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.1860036832412523" data-s="300,640" data-type="png" data-w="543" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=b45c5a83&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJk6wqJnSoehV8npGQbKDCAo7A92fDrPmpaT0WtHIlFekvYHgVibjjEtg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p data-pm-slice="0 0 []"><span leaf="">驱动会获取系统版本信息，根据不同版本信息，通过遍历SSDT表获取函数地址，定位到函数地址后，HOOK为自定义函数</span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;驱动会获取系统版本信息，根据不同版本信息，通过遍历SSDT表获取函数地址，定位到函数地址后，HOOK为自定义函数&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+1k&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;3b460a94-4f6a-4ab2-b887-872c661288d4&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:22,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:56},&#34;recordId&#34;:&#34;EDBAdIi3to0yNHxG9F6c1hktnib&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002394" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.2814814814814815" data-s="300,640" data-type="png" data-w="1080" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=e25129ab&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJxbTeCyKRN5RGkS2p3AoKxACxApXRANggdLF3m9LicnzVHzj9du3bM0w%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002395" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.26944444444444443" data-s="300,640" data-type="png" data-w="1080" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=3e185c18&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJCvk87XQic3HJ8iaKRrveql2G7w78hQicickJ8N8Ek8Kxe4G3rrC7LcMtIQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p data-pm-slice="0 0 []"><span leaf="">调用NtQuerySystemInformation，API执行时如果判断为被保护进程，则进行断链隐藏进程，非保护进程则执行正常API函数调用，返回正常结果</span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;调用NtQuerySystemInformation，API执行时如果判断为被保护进程，则进行断链隐藏进程，非保护进程则执行正常API函数调用，返回正常结果&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+26&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;a6a57c3c-997b-49aa-8f63-4fcbfe8b1b81&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:25,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:78},&#34;recordId&#34;:&#34;FFdUd4P39o6KZxxFKSVcGieAnXg&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002396" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.8410041841004184" data-s="300,640" data-type="png" data-w="956" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=cf6ee81c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJdgEaKB35vCI0waIcogIOBAJYN57WeoSS9Tibs0RNk1jsfVPVWIIVWcQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p data-pm-slice="0 0 []"><span leaf="">调用NtOpenProcess，判断为保护进程后，则返回错误码0xC0000022，实现禁止其它进程获取保护进程句柄</span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;调用NtOpenProcess，判断为保护进程后，则返回错误码0xC0000022，实现禁止其它进程获取保护进程句柄&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+1m&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;b4b49805-ea10-4d17-bec9-24841708224d&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:27,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:58},&#34;recordId&#34;:&#34;M9QudZUDAoynpnxSEchcwItannb&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002397" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.4414201183431953" data-s="300,640" data-type="png" data-w="845" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=79ebbbae&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJeVk1JHOGYkQX4dfw8eyMbSIy2NdOZdsriaPRlNYxCibfZcBtgXiamFuuw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p data-pm-slice="0 0 []"><span leaf="">调用NtDuplicateObject，判断保护进程后，则返回错误码0xC0000022，禁止其它进程复制进程句柄</span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;调用NtDuplicateObject，判断保护进程后，则返回错误码0xC0000022，禁止其它进程复制进程句柄&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+1l&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;c67d63ee-6ca4-47b9-a6a4-18074ceefe14&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:29,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:57},&#34;recordId&#34;:&#34;QxuzdpWJWokXybxTkVvcVJgmn5c&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002398" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.45" data-s="300,640" data-type="png" data-w="1020" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=225b16ab&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJk0hUmrSibjeRtGEhnN1d23ibY30oTjUDm9Obl8MibK0nocbofyMqEzgyw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><h4 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 17px;font-weight: bold;">XiaoH.sys</span></span></h4><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;XiaoH.sys&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+9&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;heading4&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;b3ae6109-dbee-4ac2-a998-8064cb708654&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:31,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:9},&#34;recordId&#34;:&#34;JakLd05WBojhbqxXeVzcCkugnHg&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p data-pm-slice="0 0 []"><span leaf="">该驱动签名为“上海启思教育科技服务有限公司”的过期签名。其主要功能是通过获取 nsiproxy.sys 驱动对象，劫持其 IRP 回调函数指针，实现对网络连接枚举流程的拦截与篡改。Windows 中nsiproxy.sys是负责与 “Network Store Interface” 服务交互，向用户态提供网络连接状态、TCP/UDP连接表等网络状态数据。</span></p><p><span leaf="">用户态程序例如netstat、tasklist等，会通过IOCTL发送请求到 nsiproxy.sys，由其转发至内核中TCP/IP协议栈，读取网络连接状态，攻击者通过定位nsiproxy驱动对象，获取函数指针进行HOOK，当其它程序枚举网络连接时，拦截处理并返回一个被修改的结构，实现“隐藏通讯”的目的</span></p><p><span data-lark-record-format="docx/record"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002399" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.4074074074074074" data-s="300,640" data-type="png" data-w="1080" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=a1b33319&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJpwsBPx0leJ6yv3MYUppHUjADf5y7TM6dD1ibOuBjDHnJRnOEPoot0dA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002400" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.29074074074074074" data-s="300,640" data-type="png" data-w="1080" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=e3195b2d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJd9OlSjXjn8P65ngbmsvpEnBgJHSm84uicbvVsj2icpyJiar5iau6RG3ZdA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p data-pm-slice="0 0 []"><span leaf="">获取驱动对象指针，保存原始回调函数，根据偏移修改 nsiproxy.sys 驱动对象结构体的回调函数指针，替换为自定义 Hook 函数</span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;获取驱动对象指针，保存原始回调函数，根据偏移修改 nsiproxy.sys 驱动对象结构体的回调函数指针，替换为自定义 Hook 函数&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+1v&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;e590c150-6418-4ded-a5c3-2cb0b6aee31e&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:36,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:67},&#34;recordId&#34;:&#34;W1c8dpF0zohfbJxxiDHcL3mPnoh&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002401" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.3359639233370913" data-s="300,640" data-type="png" data-w="887" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=5d40cb86&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJgPkgaFRnAeTU41kbZxkrbaSR1AvZoVSMdl1b02OWy9CLmCVPkC4LLg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p data-pm-slice="0 0 []"><span leaf="">执行HOOK函数后，当调用此回调函数时，会判断是否为受保护进程，如果为受保护进程，则伪造一个虚假的结构体，隐藏网络连接行为</span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;执行HOOK函数后，当调用此回调函数时，会判断是否为受保护进程，如果为受保护进程，则伪造一个虚假的结构体，隐藏网络连接行为&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+1p&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;653660bc-9dce-4c75-9488-5c1761a2a525&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:38,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:61},&#34;recordId&#34;:&#34;ZQpId9xIYoR6NixpPwycwGfKnLb&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002402" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.8320775026910656" data-s="300,640" data-type="png" data-w="929" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=2b7f6073&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJkibm0vmooNw4RkS9L2KAx54ibvLNiaoCPJbEn4ITe7EgekRhVZZsvicFMg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><h4 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 17px;font-weight: bold;">NSecKrnl.sys</span></span></h4><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;NSecKrnl.sys&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0*1+c&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;],&#34;1&#34;:[&#34;comment-id-7529403633683890177&#34;,&#34;true&#34;]},&#34;nextNum&#34;:2}},&#34;type&#34;:&#34;heading4&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;baf002c5-de6a-4464-b66d-1fc127240129&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:40,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:12},&#34;recordId&#34;:&#34;Iunvdw9GroxIwQxcWfGc1oSZnRg&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p data-pm-slice="0 0 []"><span leaf="">该驱动签名为“山东安在信息技术股份有限公司”有效签名程序，由于内核结束进程操作没有有效鉴权被攻击者恶意利用，通过传入进程PID可以结束任意进程，在使用时释放在%temp%路径下，文件名称为随机名</span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;驱动签名为山东安在信息技术股份有限公司，此为一个正规驱动文件，被攻击者恶意利用，通过利用进程PID可以结束任意进程,在使用时释放在%temp%路径下，文件名称为随机名&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0*1+2b&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;],&#34;1&#34;:[&#34;comment-id-7529346774973595649&#34;,&#34;true&#34;]},&#34;nextNum&#34;:2}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;342a5241-1efc-4c4a-b339-484e328b9b76&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:41,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:83},&#34;recordId&#34;:&#34;VKTkdSnLlozChjxm2HDcH7v1nCg&#34;}],&#34;payloadMap&#34;:{&#34;lingoClipboardPayload&#34;:{&#34;spaceSubExtraInfo&#34;:[{&#34;spaceSubId&#34;:&#34;VKTkdSnLlozChjxm2HDcH7v1nCg&#34;,&#34;word&#34;:&#34;PID&#34;}],&#34;spaceId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;spaceType&#34;:1}},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002403" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.40925925925925927" data-s="300,640" data-type="png" data-w="1080" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=113338ae&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJ7tEE1739ibCjVraq5hmKUQfXeRGCoh5qHroSvKpRY77tRSnDuoibtVcQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p data-pm-slice="0 0 []"><span leaf="">接收控制码 0x2248E0，调用ZwTerminateProcess结束目标进程</span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;接收控制码 0x2248E0，调用ZwTerminateProcess结束目标进程&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+15&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;ce679914-5442-4b58-9a08-bf7d4d356df4&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:102,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:41},&#34;recordId&#34;:&#34;UHbSdKBNNoPYWKxIdFccVTQQnWh&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002404" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.7875" data-s="300,640" data-type="png" data-w="1040" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=b9440ea0&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJplBgXZDA71fuSm9gP9ic1jyyOtUDYUwxUH64DyhGKgXNLTV59SMDTiag%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><h3 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 18px;font-weight: bold;">2.初始执行</span></span></h3><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;2.初始执行&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+6&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;heading3&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;721b4028-0814-4234-be2d-41fe66d0518a&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:43,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:6},&#34;recordId&#34;:&#34;Hlx7dncpPo1Si7xjV4RcS1MEnl1&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p data-pm-slice="0 0 []"><span leaf="">此次分析的样本由伪造的&#34;CMake&#34;安装包释放，采用 Inno Setup 打包，释放路径为C:\Users\Public\Documents\WindowsData 目录，在目录中释放多个文件用于后续执行，其中main.xml和me.key都是压缩包文件，解压密码分别为“Server8888”、“htLcENyRFYwXsHFnUnqK”，在执行过程中解压执行,释放文件列表如下：</span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;此次分析的样本由伪造的\&#34;CMake\&#34;安装包释放，采用 Inno Setup 打包，释放路径为C:\\Users\\Public\\Documents\\WindowsData 目录，在目录中释放多个文件用于后续执行，其中main.xml和me.key都是压缩包文件，解压密码分别为“Server8888”、“htLcENyRFYwXsHFnUnqK”，在执行过程中解压执行,释放文件列表如下：&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+5c&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;cd41d737-1b84-4442-91df-4747805a521a&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:44,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:192},&#34;recordId&#34;:&#34;OncadsqREoIvS4xwn6McEBrInKb&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002405" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.36319018404907977" data-s="300,640" data-type="png" data-w="815" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=b612b590&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJiam9uhNTzoCKam7PUeo09FicicTsJXbiaxCZKNCehBSxswyzymGMpYU9Gw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p data-pm-slice="0 0 []"><span leaf="">样本执行时调用unzip.exe解压main.xml释放man.exe，执行后调用main.exe、bypass.exe、NtHandleCallback.exe，并启动服务 rwdriver.sys，并在执行 main.exe 后通过遍历系统进程，找到杀毒软件执行目录删除杀软的可执行文件</span></p><p data-pm-slice="0 0 []"><span leaf="">man.exe启动后执行 NtHandleCallback.exe ，并注册rwdriver.sys驱动，等待服务启动成功后执行 main.exe，</span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;man.exe启动后执行 NtHandleCallback.exe ，并注册rwdriver.sys驱动，等待服务启动成功后执行 main.exe，&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+22&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;f7be8d8b-6ff5-4ac4-b858-205b68e95ac3&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:48,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:74},&#34;recordId&#34;:&#34;PbO1dMWakooIVLxrz4Ecdv46nfh&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002406" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.6535269709543569" data-s="300,640" data-type="png" data-w="964" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=863df3dd&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJNO1QGUmKRrvEvhUglbvZqIunjfVSde3OPmYZcRhe9YHDrTcB3ASfLg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p data-pm-slice="0 0 []"><span leaf="">成功启动服务和 main.exe 后，遍历杀软进程，其本意是想通过main.exe覆盖 MiniFilter回调函数后，遍历杀软进程获取文件目录，并删除杀软的可执行文件，但是病毒实际运行过程中并未成功删除</span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;成功启动服务和 main.exe 后，遍历杀软进程，其本意是想通过main.exe覆盖 MiniFilter回调函数后，遍历杀软进程获取文件目录，并删除杀软的可执行文件，但是病毒实际运行过程中并未成功删除&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+2u&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;8295bccd-aa6f-4300-8d59-1217ea6d70c7&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:50,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:102},&#34;recordId&#34;:&#34;Lo1Hd3kGsoKNIGxQLKycuDeVnAh&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002407" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.4185149469623915" data-s="300,640" data-type="png" data-w="1037" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=10a7e7f7&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJsypzt4dUibYfpd2bvbvUCWBpywuKJ2PRFdVOMWmgxic23hznoNoPibsTA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p data-pm-slice="0 0 []"><span leaf="">通过调用系统组件 wdc.dll 中导出的 WdcRunTaskAsInteractiveUser函数，以实现计划任务的创建与执行。该函数用于以交互式用户身份运行任务，具有较高的权限，被滥用后实现持久化和权限提升。与常见的 schtasks.exe等计划任务接口相比，WdcRunTaskAsInteractiveUser具备更强的隐蔽性，调用该接口时不会触发明显的命令行行为，更容易绕过安全软件的检测。</span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002408" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.5390334572490706" data-s="300,640" data-type="png" data-w="807" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=aa955e8a&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJHDZcxyG19Sw2UGM4z1tggAa7OeWHPAY6xtQuc2f2dByXCLoib7DOafQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><h3 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 18px;font-weight: bold;">3.杀软对抗</span></span></h3><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;3.杀软对抗&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+6&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;heading3&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;e856f2e1-e985-4149-8b66-2edec92b988f&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:54,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:6},&#34;recordId&#34;:&#34;Xzw4dzih6omWS2xHyXXcKGpEnYe&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><h4 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 17px;font-weight: bold;">1.main.exe</span></span></h4><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;1.main.exe&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+a&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;heading4&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;7d94503e-f24a-4ca6-a3e9-009e34fe1baf&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:55,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:10},&#34;recordId&#34;:&#34;Fhg5dZcLRojR97xCaVrczL2oncb&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p data-pm-slice="0 0 []"><span leaf="">main.exe 通过加载驱动 rwdriver.sys 获取内存读写权限，并根据系统版本进行适配。随后字节码特征匹配，定位各类内核回调函数的实际地址。命中目标回调即调用驱动接口清除函数指针，实现在不终止安全软件进程的前提下，屏蔽其对进程、线程、文件、注册表等行为的监控能力，具体清除内核回调和功能如下：</span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002409" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.30404217926186294" data-s="300,640" data-type="png" data-w="569" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=f3d9d334&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJguuQReNrrBJAbKicWhlrACibMazDOUO0d0xtibsl3btiaKibUDG2uzowHCg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p data-pm-slice="0 0 []"><span leaf="">清理内核回调函数</span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;清理内核回调函数&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+8&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;66a3ad30-3427-4cb4-a95b-2dd841218171&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:58,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:8},&#34;recordId&#34;:&#34;NPTGdb74jo0DJ4xhEqXcXFFjneb&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002410" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.3453703703703704" data-s="300,640" data-type="png" data-w="1080" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=abb82d43&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJHggMXPfBbVkLyHhWGGnHKzL8N4vhMWfRJSPo28IJv3hqHOWb2ZV0PQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p data-pm-slice="0 0 []"><span leaf="">遍历内核函数字节码特征，找到对应函数地址后调用驱动进行清除</span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;遍历内核函数字节码特征，找到对应函数地址后调用驱动进行清除&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+t&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;0befb59e-6367-4f42-b584-ff3d0e633f50&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:60,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:29},&#34;recordId&#34;:&#34;PoAudtpIOojgZKxhg1IcyfJTnke&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002411" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.75" data-s="300,640" data-type="png" data-w="916" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=92fec3c8&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJG51TRA2k2auyVJeab15Q5gvBkEqBDSZt4LwryKKKibShDSaxeErn33g%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><h4 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 17px;font-weight: bold;">2.NVIDIA.exe</span></span></h4><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;2.NVIDIA.exe&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+c&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;heading4&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;dfdfa749-c7d6-42c8-92d7-3c5f413301eb&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:62,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:12},&#34;recordId&#34;:&#34;JVYKd1EKAo5TvFxmTUgcLtm3ni2&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p data-pm-slice="0 0 []"><span leaf="">bypass.exe执行后，调用COM接口{6EDD6D74-C007-4E75-B76A-E5740995E24C},创建一个提权对象，执行NVIDIA.exe，该文件为伪造无效的毒霸签名</span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002419" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.5907407407407408" data-s="300,640" data-type="png" data-w="1080" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=434760f6&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJTSh69ibYBC8nl9A58picLK5NzkH5GN7ibqHlKTe0sUeMxfODUe1GbLvgw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;，该文件为伪造无效的毒霸签名&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+e&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:false,&#34;pasteRandomId&#34;:&#34;7d6872ad-4a47-4fe6-9eec-8e2a21d3c981&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:63,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:81,&#34;end&#34;:95},&#34;recordId&#34;:&#34;HMxgdX3sPoW14ZxGnlPc7K55nGc&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002412" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.19198312236286919" data-s="300,640" data-type="png" data-w="948" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=76bddcb9&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJUQQZBos4pFciat4R07BaPUic4e3dEhKlbX4hjWkoGOQNgnNO7rNwJGIg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p data-pm-slice="0 0 []"><span leaf="">NVIDIA.exe执行后会读取目录下Windows.log，通过RC4解密，密钥 “??Bid@locale@std”，解密出DLL文件后加载，具体功能为通过获取系统进程快照，不断循环遍历杀软进程，如果发现杀软进程启动则发送控制码 0x2248E0 到驱动 </span><span leaf="" data-pm-slice="1 1 [&#34;para&#34;,{&#34;tagName&#34;:&#34;h4&#34;,&#34;attributes&#34;:{&#34;data-pm-slice&#34;:&#34;0 0 []&#34;},&#34;namespaceURI&#34;:&#34;http://www.w3.org/1999/xhtml&#34;}]"><span textstyle="" style="font-size: 17px;font-weight: normal;">NSecKrnl.sys</span></span><span leaf=""> 关闭杀软进程</span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002413" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.4842592592592593" data-s="300,640" data-type="png" data-w="1080" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=55376c49&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJIicUhLCJhk5V7gQC5dWwXTv1NVvQzIzGHMFwkr5JlMev7AKTKkiaGC9w%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><h3 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 18px;font-weight: bold;">4.远控模块执行</span></span></h3><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;4.远控模块执行&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+8&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;heading3&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;bb5f9298-9ae3-4f7f-b087-dc1efa812a2b&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:67,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:8},&#34;recordId&#34;:&#34;SqIed6QayoqUotxiBhecU1k2njh&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p data-pm-slice="0 0 []"><span leaf="">NtHandleCallback.exe 使用白加黑加载 log.dll，执行后启动三个线程，分别负责：</span></p><p><span leaf="">1.WinOs 远控模块：读取  SerVer.log文件，通过密钥 &#34;?Bid@locale@std&#34; 进行 RC4 解密，执行远控模块。</span></p><p><span leaf="">2.进程保护：获取 NtHandleCallback.exe 的 PID，向 Cndom6.sys 驱动发送控制码，HOOK 内核 API，形成 RootKit，实现全局隐藏进程</span></p><p><span leaf="">3.Windows defender路径过滤：调用PowerShell命令，将病毒执行目录添加到Windows defender过滤目录</span></p><p><span data-lark-record-format="docx/record"></span></p><p data-pm-slice="0 0 []"><span leaf="">读取SerVer.log文件，使用密钥??Bid@locale@std通过RC4解密，解密后执行远控模块</span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;读取SerVer.log文件，使用密钥??Bid@locale@std通过RC4解密，解密后执行远控模块&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+1g&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;715ee321-39aa-4758-841b-bffb38e36ec0&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:73,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:52},&#34;recordId&#34;:&#34;NTDjdQaBeoXpRVxLYkbcohKNnNb&#34;}],&#34;payloadMap&#34;:{&#34;lingoClipboardPayload&#34;:{&#34;spaceSubExtraInfo&#34;:[{&#34;spaceSubId&#34;:&#34;NTDjdQaBeoXpRVxLYkbcohKNnNb&#34;,&#34;word&#34;:&#34;std&#34;}],&#34;spaceId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;spaceType&#34;:1}},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002414" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.6988795518207283" data-s="300,640" data-type="png" data-w="714" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=fd28cf0e&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJfk1pNzYOskpzulEq9Xe3Svou35DCfB7xpufMpnzicOIagxicgRLy20LA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p data-pm-slice="0 0 []"><span leaf="">WinOs远控模块执行后，连接远程服务器实现远控逻辑，后续长期驻留和进行信息窃取。”WinOS“远控上线配置如下</span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002423" class="rich_pages wxw-img" data-ratio="0.07219251336898395" data-s="300,640" data-type="png" data-w="748" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=bb74eec3&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJibIN3JibxaZyoBPrBTAmLe5xJSFO5LwY6uxI3cLRaM0KxdiaHMB3iasewA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;WinOs远控模块执行后，连接远程服务器实现远控逻辑，后续长期驻留和进行信息窃取。”WinOS“远控上线配置如下&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*1*0+k*2*0+10&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;comment-id-7529405069817561090&#34;,&#34;true&#34;],&#34;1&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;],&#34;2&#34;:[&#34;author&#34;,&#34;7079006010576289796&#34;]},&#34;nextNum&#34;:3}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;56b1cb3d-ce04-4f77-a6df-593fcd606895&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:75,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:56},&#34;recordId&#34;:&#34;MdTxduAoCoPZWpxoJt3cUGLwnld&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002415" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.49939540507859737" data-s="300,640" data-type="png" data-w="827" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=a1feeff1&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJkiampmDgYk0sP6Ae6n524nzUHwuz5d7vaiconbDnLzEic1xVh1XYvoSuQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p data-pm-slice="0 0 []"><span leaf="">获取NtHandleCallback.exe PID，向XiaoH.sys驱动发送控制码，隐藏自身网络连接，再向驱动Cndom6.sys发送控制码，隐藏自身进程和启动自保功能</span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;获取NtHandleCallback.exe PID，向XiaoH.sys驱动发送控制码，隐藏自身网络连接，再向驱动Cndom6.sys发送控制码，隐藏自身进程和启动自保功能&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+2f&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;13af64c9-7fcc-455c-a1d9-753d8a95aadd&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:77,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:87},&#34;recordId&#34;:&#34;ZmOzdq8Ejopc72xLB8OcscnOnKf&#34;}],&#34;payloadMap&#34;:{&#34;lingoClipboardPayload&#34;:{&#34;spaceSubExtraInfo&#34;:[{&#34;spaceSubId&#34;:&#34;ZmOzdq8Ejopc72xLB8OcscnOnKf&#34;,&#34;word&#34;:&#34;PID&#34;}],&#34;spaceId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;spaceType&#34;:1}},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002416" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.668235294117647" data-s="300,640" data-type="png" data-w="850" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=48af5360&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJnPAGheFlNSQiagZxbowzFtiaqxXgsCwpPB4ckZqGBlSenM2tdLHGuIzQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p data-pm-slice="0 0 []"><span leaf="">调用PowerShell将病毒执行路径加入windows defender过滤目录 C:\\Users\\Public\\Documents 躲避windows defender查杀</span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;调用PowerShell将病毒执行路径加入windows defender过滤目录 C:\\\\Users\\\\Public\\\\Documents 躲避windows defender查杀&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+2j&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;bdc093f9-ab75-4453-941d-5415932be359&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:79,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:91},&#34;recordId&#34;:&#34;OkT4dP7Owo77rJxv4BNcTOdqnlb&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002417" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.2601851851851852" data-s="300,640" data-type="png" data-w="1080" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=0201bbfc&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJwrEtXXUWDCCCxez4UCYHtwXC5KpazBpEMfCOsKCxK6u89PfBBW4uZQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><h1 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 24px;font-weight: bold;">总结:</span></span></h1><p data-pm-slice="0 0 []"><span leaf="">&#34;银狐&#34;目前还在不断迭代更新，通过本次分析来看该&#34;银狐&#34;变种更倾向于隐藏自身长期驻留用户设备，技术上还是以开源项目组合为主，末端载荷依然使用&#34;winos&#34;远控。本次攻击中的多个 Rootkit驱动大量使用泄露过期签名证书，甚至一些是大厂。目前一些交易市场上也存在提供泄露签名买卖，甚至驱动按次代签服务，对安全防护带来了严峻挑战。另一方面一些厂商发行版本的驱动程序对于控制码的调用没有有效鉴权，导致轻易被恶意程序利用，从近期的安全事件看此类利用层出不穷 。广大用户在搜索引擎中寻找需要的软件时，避免盲目点击首位链接，仔细甄别进入官网和正规渠道下载，以防止下载运行恶意程序。对于有发现与本文中相似异常的用户可以点击金山毒霸百宝箱中的“顽固病毒木马专杀”进行处置，或在毒霸主界面点击“客服”按钮联系7*24h在线工程师协助处置。</span></p><p style="text-align: center;" nodeleaf=""><img data-imgfileid="100002420" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.8388683886838868" data-s="300,640" data-type="png" data-w="813" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=e34b1843&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvcu8nCtIj8flzliayBnzSZJJGSbAXBRowpibjCfnS6l1ibFBekMlNPpoZJ0brzuTianQNSgXH87X9Duw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34; \&#34;银狐\&#34;目前还在不断迭代更新，通过本次分析来看该\&#34;银狐\&#34;变种更倾向于隐藏自身长期驻留用户设备，技术上还是以开源项目组合为主，末端载荷依然使用\&#34;winos\&#34;远控。本次攻击中的多个 Rootkit驱动大量使用泄露过期签名证书，甚至一些是大厂。目前一些交易市场上也存在提供泄露签名买卖，甚至驱动按次代签服务，对安全防护带来了严峻挑战。另一方面一些厂商发行版本的驱动程序对于控制码的调用没有有效鉴权，导致轻易被恶意程序利用，从近期的安全事件看此类利用层出不穷 。广大用户在搜索引擎中寻找需要的软件时，避免盲目点击首位链接，仔细甄别进入官网和正规渠道下载，以防止下载运行恶意程序。对于有发现与本文中相似异常的用户可以点击金山毒霸百宝箱中的“顽固病毒木马专杀”进行处置，或在毒霸主界面点击“客服”按钮联系7*24h在线工程师协助处置。&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+a2&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006010576289796&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;5df3d553-2acf-4dac-9a0c-0adffc5bddb3&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:112,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:362},&#34;recordId&#34;:&#34;XxjIdgsJ4ob4kfx6NEqcOIWznrd&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p data-pm-slice="0 0 []"><span leaf="">IOC：</span></p><p><span leaf="">    ailletll.top:8880</span></p><p><span leaf="">MD5：</span></p><p><span leaf="">    F08A735829E4E95F8922189314C124E7</span></p><p><span leaf="">    EFF329C6B8C4C980FEB0D867C7082736</span></p><p><span leaf="">    893EDFA3A3A71D71CA670424E554E04C</span></p><p><span leaf="">    4B249ACC6B88C276690514F76B781DBC</span></p><p><span leaf="">    5231A08C5286803E300AC657E37272F8</span></p><p><span leaf="">    80961850786D6531F075B8A6F9A756AD</span></p><p><span data-lark-record-format="docx/record"></span></p><h1 data-pm-slice="0 0 []"><span leaf=""><br/></span></h1><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;总结&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+2&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;heading1&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;e4717973-080c-4937-9353-330649ec5f0f&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:81,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:2},&#34;recordId&#34;:&#34;EHDKd8aOUosCRdxuTSvcI7l0nkc&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p data-pm-slice="0 0 []"><span leaf=""><br/></span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;NVIDIA.exe执行后会读取目录下Windows.log，通过RC4解密，密钥 “??Bid@locale@std”，解密出DLL文件后加载，具体功能为通过获取系统进程快照，不断循环遍历杀软进程，如果发现杀软进程启动则发送控制码 0x2248E0 到驱动&lt;随机名.sys&gt; 关闭杀软进程&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+41&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;1a8777e3-2f8c-4dad-aad7-faffaa4443a5&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:65,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:145},&#34;recordId&#34;:&#34;UnYfdTrdjoBVMAx7RlvcwQTInOh&#34;}],&#34;payloadMap&#34;:{&#34;lingoClipboardPayload&#34;:{&#34;spaceSubExtraInfo&#34;:[{&#34;spaceSubId&#34;:&#34;UnYfdTrdjoBVMAx7RlvcwQTInOh&#34;,&#34;word&#34;:&#34;std&#34;}],&#34;spaceId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;spaceType&#34;:1}},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p data-pm-slice="0 0 []"><span leaf=""><br/></span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;bypass.exe执行后，调用COM接口{6EDD6D74-C007-4E75-B76A-E5740995E24C},创建一个提权对象，执行NVIDIA.exe&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+29&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;e3b679fd-7b33-4ff5-bc55-1590a7ca371d&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:63,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:81},&#34;recordId&#34;:&#34;HMxgdX3sPoW14ZxGnlPc7K55nGc&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p data-pm-slice="0 0 []"><span leaf=""><br/></span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;main.exe 通过加载驱动 rwdriver.sys 获取内存读写权限，并根据系统版本进行适配。随后字节码特征匹配，定位各类内核回调函数的实际地址。命中目标回调即调用驱动接口清除函数指针，实现在不终止安全软件进程的前提下，屏蔽其对进程、线程、文件、注册表等行为的监控能力，具体清除内核回调和功能如下：&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+48&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;b2e9a3c7-da5e-4860-9b41-d1173c6f5db1&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:56,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:152},&#34;recordId&#34;:&#34;QWgfdvaE0o1HS9x9eVsc5fJYnbz&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p data-pm-slice="0 0 []"><span leaf=""><br/></span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;通过调用系统组件 wdc.dll 中导出的 WdcRunTaskAsInteractiveUser函数，以实现计划任务的创建与执行。该函数用于以交互式用户身份运行任务，具有较高的权限，被滥用后实现持久化和权限提升。与常见的 schtasks.exe等计划任务接口相比，WdcRunTaskAsInteractiveUser具备更强的隐蔽性，调用该接口时不会触发明显的命令行行为，更容易绕过安全软件的检测。&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0*1+2z*0+2n&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;],&#34;1&#34;:[&#34;comment-id-7529347617518927874&#34;,&#34;true&#34;]},&#34;nextNum&#34;:2}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;dfec91d9-b3f3-40cc-806d-401b581f9acd&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:52,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:202},&#34;recordId&#34;:&#34;Ie5Adb0QQo2rgUxiSUhcNE4mnZb&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><h3 data-pm-slice="0 0 []"><span leaf=""><br/></span></h3><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;执行流程：&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+5&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;heading3&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;ef7f780d-23b6-4e75-bf17-6569e84e1028&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:7,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:5},&#34;recordId&#34;:&#34;QT19dUuRDo3mHNxSUWOcmHAensd&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><h1 data-pm-slice="0 0 []"><span leaf=""><br/></span></h1><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;APjOd088ao93SdxWUOxcBhXBnOc&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;攻击背景&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+4&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;heading1&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;934b63ec-e068-4703-bfe6-013c5bebfa2c&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:4,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:4},&#34;recordId&#34;:&#34;NVDtdAcHyoBL4QxwkjVcCZZPnNh&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p style="display: none;"><mp-style-type data-value="3"></mp-style-type></p>



<p><a href="2247486072">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=15516162&amp;r=1&amp;u=https%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzU2OTcxNjE4Mw%3D%3D%26mid%3D2247486072%26idx%3D1%26sn%3Dce36707ae3974cc872b4432a8edf2dee">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Mon, 21 Jul 2025 20:52:00 +0800</pubDate>
    </item>
    <item>
      <title>新团伙“肥鼠”：瞄准加密货币和黑灰产人员</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzU2OTcxNjE4Mw==&amp;mid=2247486031&amp;idx=1&amp;sn=bb9dd8398a0c05e524c53fd4b1aefbd7</link>
      <description>攻击背景    近期，金山毒霸安全团队在日常监测中发现一批新的钓鱼攻击活动，攻击者构建大批量仿冒软件下载页面，</description>
      <content:encoded><![CDATA[<p>
原创 <span>CH</span> <span>2025-03-31 16:05</span> <span style="display: inline-block;">广东</span>
</p>

<p>攻击背景    近期，金山毒霸安全团队在日常监测中发现一批新的钓鱼攻击活动，攻击者构建大批量仿冒软件下载页面，</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=7f128d66&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2FXia34CufgojsND4lewiatM2mez70iaBD5AOzD4UheJheLc6byX3hwI0FWoK4JGQgmRyOibEeWCKuLNV27QVFjWYxmw%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<section style="text-align: center;" nodeleaf=""><img data-imgfileid="100002367" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.5712962962962963" data-s="300,640" data-type="png" data-w="1080" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=bb914d71&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsND4lewiatM2mez70iaBD5AOqFUtmibxlHK93N0fe3XSaiaePDUBMTuKqYQRwFKm23CJTTPKFuBxyMiaQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><h2 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 24px;letter-spacing: normal;font-weight: bold;">攻击背景</span></span></h2><section><span data-lark-record-data="{&#34;rootId&#34;:&#34;ENPZdJjpCo3qkVxf7WLcK9E4ngf&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;攻击背景&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*1*0+4&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;comment-id-7486075315349880833&#34;,&#34;true&#34;],&#34;1&#34;:[&#34;author&#34;,&#34;7079006010576289796&#34;]},&#34;nextNum&#34;:2}},&#34;type&#34;:&#34;heading2&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;c5c4a94a-02eb-45b5-88e6-68d78187b386&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:5,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:4},&#34;recordId&#34;:&#34;G85VdAtZroKw4TxaDcEc3mXKnue&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></section><p data-pm-slice="0 0 []" style="margin-top: 0px;margin-bottom: 0px;"><span leaf=""><span textstyle="" style="letter-spacing: normal;">    近期，金山毒霸安全团队在日常监测中发现一批新的钓鱼攻击活动，攻击者构建大批量仿冒软件下载页面，这些软件包括TradingView、SiguaTalk、Telegram 、Clash等。并借助搜索引擎优化（SEO）手段将这些站点推至搜索结果前列，诱导用户在搜索关键词时误入钓鱼页面，从而下载携带WinOs远控木马的安装包。</span></span></p><p style="margin-top: 0px;margin-bottom: 0px;"><span leaf=""><span textstyle="" style="letter-spacing: normal;">    而这些被仿冒软件均为境外软件，其中TradingView是从事金融和虚拟货币交易的平台，结合末端的远控木马存在窃取加密货币的可能，同时SiguaTalk和Telegram也被大量黑灰产人员使用。我们由此推测此次攻击主要针对虚拟货币交易和黑灰产从业人员及其上下游群体。根据它的特性命名为“肥鼠”。</span></span></p><p style="margin-top: 0px;margin-bottom: 0px;"><span leaf=""><span textstyle="" style="letter-spacing: normal;">    “肥鼠”在免杀技术上较其它家族有明显提升，后阶段释放的恶意模块无论是主程序还是dll劫持的利用，都是在原始文件进行少量patch修改嵌入Shellcode的方式执行恶意代码，实现了对恶意逻辑的深度隐藏，与原始文件对比仅有极少量差异，整体结构契合度高，具备优良的免杀效果。</span></span></p><section><span data-lark-record-format="docx/record"></span></section><section style="text-align: center;" nodeleaf=""><img data-imgfileid="100002371" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.5425925925925926" data-s="300,640" data-type="png" data-w="1080" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=b42bf152&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsND4lewiatM2mez70iaBD5AOj8dU1x80XZys1NrAIlOyWicK87WpicMnAUguxEFya12VApVoza7x4xVA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><p data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="letter-spacing: normal;">    本次分析以TradingView 伪装程序为例 ，该样本采用 Inno Setup 打包，运行后会在 C:\Users\AppData\Roaming\&lt;随机目录&gt; 中释放多份文件用于后续执行。</span></span></p><section><span data-lark-record-data="{&#34;rootId&#34;:&#34;ENPZdJjpCo3qkVxf7WLcK9E4ngf&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;本次分析以TradingView 伪装程序为例 ，该样本采用 Inno Setup 打包，运行后会在 C:\\Users\\AppData\\Roaming\\&lt;随机目录&gt; 中释放多份文件用于后续执行。&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+4*1+1*0+g*1+3*0+1z*0*2+2&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;],&#34;1&#34;:[&#34;author&#34;,&#34;7079006010576289796&#34;],&#34;2&#34;:[&#34;comment-id-7486769172958281756&#34;,&#34;true&#34;]},&#34;nextNum&#34;:3}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;3f6c54f8-6820-48ff-b4c4-b5ad4545a531&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:10,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:97},&#34;recordId&#34;:&#34;Ki78dLbfEoy32fxb0F0cj0NnnUX&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text" class="lark-record-clipboard"></span></section><section style="text-align: center;" nodeleaf=""><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002372" data-ratio="0.21428571428571427" data-s="300,640" type="block" data-type="png" data-w="728" src="https://wechat2rss.xlab.app/img-proxy/?k=62f05042&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsND4lewiatM2mez70iaBD5AOa6eGDoB2ziaSIPAibqklJ5KQhsDjic2DuvVMykmDtwF9z840OMlDXicc1A%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><h1 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 24px;letter-spacing: normal;font-weight: bold;">执行流程</span></span></h1><section><span data-lark-record-data="{&#34;rootId&#34;:&#34;ENPZdJjpCo3qkVxf7WLcK9E4ngf&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;执行流程&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+4&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;heading1&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;67ddb946-3a39-4c83-a4d4-cfa75b0f73e3&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:12,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:4},&#34;recordId&#34;:&#34;WsDGdumCcoT6eoxhYyAcmq4Sn4R&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></section><section style="text-align: center;" nodeleaf=""><img data-imgfileid="100002373" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.6259946949602122" data-s="300,640" data-type="png" data-w="754" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=d01dae02&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsND4lewiatM2mez70iaBD5AOiatruJJCPTIwibkpwjLe8BkH6FGEOjRany63XSjNo5iaicSsB1zuSvuUcA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><p data-pm-slice="0 0 []" style="margin-bottom: 8px;"><span leaf=""><span textstyle="" style="letter-spacing: normal;">    以下为该样本完整的多阶段执行链概览,为规避安全产品检测，攻击链条被设计为多层嵌套执行：</span></span></p><p style="margin-bottom: 8px;"><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">    第一阶段</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">：被篡改的</span></span><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;"> overseer.exe</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;"> 程序在运行后首先解密内嵌的 Repository.xml 文件，释放并启动攻击组件（GUP.exe），同时写入持久化信息，并尝试终止本地安全软件相关进程。</span></span></p><p style="margin-bottom: 8px;"><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">    第二阶段</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">：利用合法白文件（GUP.exe） 加载经过 Patch 的 DLL 组件，实现绕过静态检测与信任机制。</span></span></p><p style="margin-bottom: 8px;"><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">    第三阶段</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">：白文件加载 ShellCode，执行反调试与环境检查，若检测通过则加载核心远控木马，实现远程控制与命令执行。</span></span></p><p style="margin-bottom: 8px;"><span leaf=""><span textstyle="" style="letter-spacing: normal;">目前观测到的白利用组件包括 </span></span><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">GUP.exe</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;"> 与 </span></span><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">yyrun.exe</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;"> 等。</span></span></p><section><span data-lark-record-format="docx/record"></span></section><h1 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 24px;letter-spacing: normal;font-weight: bold;">详细分析</span></span></h1><h1 data-pm-slice="0 0 []"><span leaf=""><br/></span></h1><h3><span leaf=""><span textstyle="" style="font-size: 20px;letter-spacing: normal;font-weight: bold;">1.解密初始模块与驱动投放</span></span></h3><p><span leaf=""><span textstyle="" style="letter-spacing: normal;">    样本运行后释放的 </span></span><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">overseer.exe（</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">原为 AVG 的合法组件）被 Patch 修改，使其具备加载执行</span></span><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">Repository.xml</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">中恶意 ShellCode 的能力</span></span></p><ul style="list-style-type: disc;" class="list-paddingleft-1"><li style="letter-spacing:normal;"><p style="margin-bottom: 0px;"><span leaf=""><span textstyle="" style="letter-spacing: normal;">Repository.xml 被 xor 解密为 ShellCode；</span></span></p></li><li style="letter-spacing:normal;"><p style="margin-bottom: 0px;"><span leaf=""><span textstyle="" style="letter-spacing: normal;">ShellCode 写入带签名的 sys 驱动（签名为TPZ SOLUCOES DIGITAIS LTDA）；</span></span></p></li><li style="letter-spacing:normal;"><p style="margin-bottom: 0px;"><span leaf=""><span textstyle="" style="letter-spacing: normal;">遍历进程，利用驱动查杀安全软件；驱动操作仅在首次执行时触发，随后自删除以降低暴露风险；</span></span></p></li><li style="letter-spacing:normal;"><p style="margin-bottom: 0px;"><span leaf=""><span textstyle="" style="letter-spacing: normal;">释放后续攻击载荷，并实现持久化；</span></span></p></li></ul><p style="margin-bottom:0px;"><span leaf=""><br/></span></p><p><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">overseer.exe 代码修改如下：</span></span></strong></p><section><span data-lark-record-format="docx/record"></span></section><section style="text-align: center;" nodeleaf=""><img data-imgfileid="100002374" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.5577689243027888" data-s="300,640" data-type="png" data-w="1004" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=2e1d68ce&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsND4lewiatM2mez70iaBD5AOxXoQFBV9vpGd0llbQQZOEB7WnPq6QB7NP2Wvgvuo1VibU4Ddx4NibxGQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><p data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="letter-spacing: normal;">    ShellCode 在 </span></span><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">%TEMP%</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;"> 目录下释放了一个随机名称的驱动文件，该驱动为 Topaz Antifraud 反欺诈软件的内核模块 </span></span><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">wsftprm.sys，</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">带有 </span></span><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">TPZ SOLUCOES DIGITAIS LTDA</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;"> 的合法数字签名。该驱动存在已公开的本地权限提升漏洞 </span></span><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">CVE-2023-52271</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">。</span></span></p><p><span leaf=""><span textstyle="" style="letter-spacing: normal;">    在实际利用过程中，使用目标进程</span></span><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">PID</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">发送IOCTL控制码（</span></span><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">0x22201C</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">）。驱动在接收到请求后，则调用 </span></span><code><span leaf=""><span textstyle="" style="letter-spacing: normal;font-weight: bold;">ZwTerminateProcess</span></span></code><span leaf=""><span textstyle="" style="letter-spacing: normal;font-weight: bold;"> </span><span textstyle="" style="letter-spacing: normal;font-weight: normal;">终止进程。</span></span></p><section><span data-lark-record-format="docx/record"></span></section><section style="text-align: center;" nodeleaf=""><img data-imgfileid="100002375" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.30833333333333335" data-s="300,640" data-type="png" data-w="1080" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=59c69219&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsND4lewiatM2mez70iaBD5AO53IrKBibOCZoxuFAq4wbcFCART6nbv20Tx247B0znAEso7mVUjm7Biag%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><p data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="letter-spacing: normal;">遍历进程列表如下：</span></span></p><section><span data-lark-record-data="{&#34;rootId&#34;:&#34;ENPZdJjpCo3qkVxf7WLcK9E4ngf&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;遍历进程列表如下：&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+9&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;d3ded23e-22b3-45d5-bc26-42b59b85f17b&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:116,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:9},&#34;recordId&#34;:&#34;IDFzdUNTmovC0txgYsAc7Pk8nxe&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></section><section style="text-align: center;" nodeleaf=""><img data-imgfileid="100002376" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.12962962962962962" data-s="300,640" data-type="png" data-w="1080" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=9023aa66&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsND4lewiatM2mez70iaBD5AONljyjh8lkicliaicHtGAEjeK4RpLCl9tWmnmV5ZtTRdNEAMibibYhd4QianA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><h3 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 20px;letter-spacing: normal;font-weight: bold;">2.释放后续攻击载荷</span></span></h3><p style="margin-bottom: 0px;"><span leaf=""><span textstyle="" style="letter-spacing: normal;">    在完成初步植入后，</span></span><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">overseer.exe</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;"> 会向 </span></span><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">C:\ProgramData\&lt;随机目录&gt;</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;"> 写入后续组件：</span></span></p><ul class="list-paddingleft-1"><li style="text-align:left;"><p style="margin-top: 0px;"><span leaf=""><span textstyle="" style="letter-spacing: normal;">白利用组件 GUP.exe（NotePad++ 的合法签名文件）；</span></span></p></li><li style="text-align:left;"><p><span leaf=""><span textstyle="" style="letter-spacing: normal;">被篡改的 libcurl.dll；</span></span></p></li><li><p><span leaf=""><span textstyle="" style="letter-spacing: normal;">LICENSE（加密ShellCode 反沙箱）；</span></span></p></li><li><p><span leaf=""><span textstyle="" style="letter-spacing: normal;">pluginRepository</span></span><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">.</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">xml（加密ShellCode 远控木马）；</span></span></p></li></ul><p style="margin-top: 8px;"><span leaf=""><span textstyle="" style="letter-spacing: normal;">    随后,攻击者通过COM接口（0F87369F-A4E5-4CFC-BD3E-73E6154572DD）注册计划任务，将 </span></span><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">GUP.exe</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;"> 伪装为 Edge 升级程序，实现持久化驻留。</span></span></p><section><span data-lark-record-format="docx/record"></span></section><section style="text-align: center;" nodeleaf=""><img data-imgfileid="100002377" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.7984234234234234" data-s="300,640" data-type="png" data-w="888" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=d5e3eba6&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsND4lewiatM2mez70iaBD5AO0wsPicVBL78MZWzYko27zicxeWKRzPqYaMwCdyCicSfhI9bUJAcvqXuFg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><p data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="letter-spacing: normal;">    在计划任务执行后，</span></span><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">GUP.exe</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;"> 会加载同目录下被篡改的 </span></span><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">libcurl.dll</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">。该 DLL 在执行过程中会读取并解密 </span></span><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">LICENSE </span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">文件，其内容为第一层加密的 LoadPE 载荷。加载后，</span></span><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">LICENSE </span><span textstyle="" style="letter-spacing: normal;font-weight: normal;">作</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">为ShellCode执行，并通过检测调试器、 CPU核心数、物理内存大小等，判断自身是否在调试或沙箱环境中，规避行为分析。</span></span></p><p><span leaf=""><span textstyle="" style="letter-spacing: normal;">下图为</span></span><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">libcurl.dll</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">被篡改的函数代码：</span></span></p><section><span data-lark-record-format="docx/record"></span></section><section style="text-align: center;" nodeleaf=""><img data-imgfileid="100002378" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.5037037037037037" data-s="300,640" data-type="png" data-w="1080" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=23748aa5&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsND4lewiatM2mez70iaBD5AOluu3cudXxIUI8ofiaNzSyykPEzibCpLshLhJAkZg1EmxibnvCz1WqhALg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><h3 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 20px;letter-spacing: normal;font-weight: bold;">3.远控执行</span></span></h3><p><span leaf=""><span textstyle="" style="letter-spacing: normal;">    在通过环境检测后，</span></span><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">libcurl.dll</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;"> 会继续加载同目录下的另一个加密文件 </span></span><strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">pluginRepository.xml，</span></span></strong><span leaf=""><span textstyle="" style="letter-spacing: normal;">通过解密该文件，样本最终加载的核心组件为 WinOs远控木马。</span></span></p><section><span data-lark-record-format="docx/record"></span></section><section style="text-align: center;" nodeleaf=""><img data-imgfileid="100002379" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.6435185185185185" data-s="300,640" data-type="png" data-w="1080" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=5486ea9a&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsND4lewiatM2mez70iaBD5AONAjF9o0ayHyibpfHrZ2kPhWfnib98IAScxZsAGl0jTY5hpRlJib3ic0yibw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><p data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="letter-spacing: normal;">    远控木马在执行前，会进行窗口检测，识别是否存在安全分析工具或监控软件。监控的窗口包含网络抓包类工具、系统进程监控工具等，若发现此类进程执行，则一直循环等待窗口关闭。</span></span></p><section><span data-lark-record-data="{&#34;rootId&#34;:&#34;ENPZdJjpCo3qkVxf7WLcK9E4ngf&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;远控木马在执行前，会进行窗口检测，识别是否存在安全分析工具或监控软件。监控的窗口包含网络抓包类工具、系统进程监控工具等，若发现此类进程执行，则一直循环等待窗口关闭。&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+2a&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;8a515c82-e717-4ee0-9f45-5da210076f15&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:141,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:82},&#34;recordId&#34;:&#34;UuwtdOQUVoWThQxNqtdc7N6encg&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></section><section style="text-align: center;" nodeleaf=""><img data-imgfileid="100002380" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.9686888454011742" data-s="300,640" data-type="png" data-w="511" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=3ee1bc2b&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsND4lewiatM2mez70iaBD5AOX598mSs61GHNjJZJjeNNJytVXvEtnkoHx0dCqluCITqru6P6aOr8vA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><p data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="letter-spacing: normal;">    最终该木马会将受感染主机的系统信息、计算机名称、操作系统版本、IP地址等信息发送到攻击者服务器，并开始监听服务器命令执行多种任务,具体任务列表如下：</span></span></p><section><span data-lark-record-data="{&#34;rootId&#34;:&#34;ENPZdJjpCo3qkVxf7WLcK9E4ngf&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;最终该木马会将受感染主机的系统信息、计算机名称、操作系统版本、IP地址等信息发送到攻击者服务器，并开始监听服务器命令执行多种任务,具体任务列表如下：&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+3*0*1+2*0+p*0*2+1*0+17&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7469635985750228994&#34;],&#34;1&#34;:[&#34;comment-id-7486778074196033564&#34;,&#34;true&#34;],&#34;2&#34;:[&#34;trigger&#34;,&#34;3fa08e7c-6654-47bb-907d-dd019b210f3a&#34;]},&#34;nextNum&#34;:3}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;isEqualBlockSelection&#34;:true,&#34;pasteRandomId&#34;:&#34;b113af3a-2bbd-49d8-a6fd-56cd93602d17&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:53,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:74},&#34;recordId&#34;:&#34;K25PdYYzOoyu5qxrZSCcsdqjnwe&#34;}],&#34;payloadMap&#34;:{&#34;lingoClipboardPayload&#34;:{&#34;spaceSubExtraInfo&#34;:[{&#34;spaceSubId&#34;:&#34;K25PdYYzOoyu5qxrZSCcsdqjnwe&#34;,&#34;word&#34;:&#34;IP&#34;}],&#34;spaceId&#34;:&#34;ENPZdJjpCo3qkVxf7WLcK9E4ngf&#34;,&#34;spaceType&#34;:1}},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></section><section style="text-align: center;" nodeleaf=""><img data-imgfileid="100002381" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.9072753209700428" data-s="300,640" data-type="png" data-w="701" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=caee8a25&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsND4lewiatM2mez70iaBD5AOETWytTV2LDGB5YbNvByelbPTnicLAgicvAUUyfeZNOzOm3iaq44x2U7Cg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><h1 data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 20px;letter-spacing: normal;font-weight: bold;">总结</span></span></h1><p><span leaf=""><span textstyle="" style="letter-spacing: normal;">    本次攻击活动具备高度的定向性、欺骗性与隐蔽性。攻击者通过构建仿冒软件下载站群并结合 SEO 技术精准引流，以虚拟货币相关软件为诱饵，针对特定人群实施定向投毒。样本在执行过程中采用多阶段加载、白文件利用、反调试与反沙箱检查、驱动提权等手段，实现较强的免杀效果。通过该木马实现对受害主机的持久化控制，窃取用户信息，导致信息泄露并带来资产安全风险。毒霸提醒广大用户，下载软件到官网和正规渠道下载，安装杀毒软件实时监控，避免造成损失。</span></span></p><section><span data-lark-record-format="docx/record"></span></section><section style="text-align: center;" nodeleaf=""><img data-imgfileid="100002382" class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.7017189079878665" data-s="300,640" data-type="png" data-w="989" type="block" src="https://wechat2rss.xlab.app/img-proxy/?k=fd69cf61&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsND4lewiatM2mez70iaBD5AOBbjkWf4GMibXIia3m6aHFoVDRfrX6b2yw81qmuJnSLpm4lV9Mb9uAibLA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><p data-pm-slice="0 0 []"><span leaf=""><span textstyle="" style="font-size: 20px;letter-spacing: normal;font-weight: bold;">IOC：</span></span></p><p><span leaf=""><span textstyle="" style="letter-spacing: normal;">8.217.85.20:27955</span></span></p><p><span leaf=""><span textstyle="" style="font-size: 20px;letter-spacing: normal;font-weight: bold;">MD5：</span></span></p><p><span leaf=""><span textstyle="" style="letter-spacing: normal;">56588F31225886D9561B25B37473C2F5</span></span></p><p><span leaf=""><span textstyle="" style="letter-spacing: normal;">0622A89B5FF66F735BF73048CBD23891</span></span></p><p><span leaf=""><span textstyle="" style="letter-spacing: normal;">2F4B5A0D98BC4E5616F2DD04337AE674</span></span></p><p><span leaf=""><span textstyle="" style="letter-spacing: normal;">3100CFE0F0B32082FFF6082DAC86DDCF</span></span></p><p><span leaf=""><span textstyle="" style="letter-spacing: normal;">37A49EF7C102F96F7D4385E81FCB780E</span></span></p><p style="display: none;"><mp-style-type data-value="3"></mp-style-type></p>



<p><a href="2247486031">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=a7a36d2d&amp;r=1&amp;u=https%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzU2OTcxNjE4Mw%3D%3D%26mid%3D2247486031%26idx%3D1%26sn%3Dbb9dd8398a0c05e524c53fd4b1aefbd7%26subscene%3D0">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Mon, 31 Mar 2025 16:05:00 +0800</pubDate>
    </item>
    <item>
      <title>DeepSeek 相关安全事件分析报告</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzU2OTcxNjE4Mw==&amp;mid=2247486013&amp;idx=1&amp;sn=92709dc9add6e0b7ad6f9e3283711575</link>
      <description></description>
      <content:encoded><![CDATA[<p>
原创 <span>DRP</span> <span>2025-02-07 18:55</span> <span style="display: inline-block;">广东</span>
</p>

<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=afc4a776&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2FXia34CufgojuYVSWdVRO0ngnbNEicnQgj4CJ66ZdH5bYDFMjUiaB4yKwPF2UwGFLEX85vs5riaGAljO9nPKSt4TDPw%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<h2 style="break-after: avoid-page;break-inside: avoid;orphans: 4;font-size: 1.75em;margin-top: 1rem;margin-bottom: 1rem;font-weight: bold;line-height: 1.225;cursor: text;border-bottom: 1px solid rgb(238, 238, 238);width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);">一、引言</h2><p style="line-height: inherit;orphans: 4;margin-top: 0.8em;margin-bottom: 0.8em;white-space: pre-wrap;width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);"> </p><p style="line-height: inherit;orphans: 4;margin-top: 0.8em;margin-bottom: 0.8em;white-space: pre-wrap;width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);">近期，DeepSeek 作为一家迅速崛起的中国 AI 公司，凭借其先进的 AI 模型吸引了全球关注。然而，随着其知名度的提升，各类安全问题也接踵而至。网络犯罪分子纷纷利用 DeepSeek 的热度，发起多种恶意攻击活动，给用户带来了极大的安全风险。本报告将对近期 DeepSeek 相关的安全事件进行详细分析，旨在揭示这些安全威胁的本质，为公众提供防范建议。</p><h2 style="break-after: avoid-page;break-inside: avoid;orphans: 4;font-size: 1.75em;margin-top: 1rem;margin-bottom: 1rem;font-weight: bold;line-height: 1.225;cursor: text;border-bottom: 1px solid rgb(238, 238, 238);width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);">二、安全事件详述</h2><h3 style="break-after: avoid-page;break-inside: avoid;orphans: 4;font-size: 1.5em;margin-top: 1rem;margin-bottom: 1rem;font-weight: bold;line-height: 1.43;cursor: text;width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);">（一）恶意软件包事件</h3><ol start="" style="margin-top: 0.8em;margin-bottom: 0.8em;padding-left: 30px;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);" class="list-paddingleft-1"><li style="white-space-collapse: preserve;"><p style="line-height: inherit;orphans: 4;margin-bottom: 0.5rem;width: inherit;"><strong>事件概述</strong>：Positive Technologies Expert Security Center 的供应链安全团队检测到，2025 年 1 月 29 日，恶意用户 “bvk”（2023 年 6 月创建账户，此前无其他活动）在 Python Package Index（PyPI）上传了 “deepseeek” 和 “deepseekai” 两个恶意软件包，目标是对将 DeepSeek 集成到系统中的开发者、ML 工程师和 AI 爱好者进行攻击。</p></li><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002320" data-ratio="0.35" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=402d9fa8&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuYVSWdVRO0ngnbNEicnQgj4u2kdnPUvFjyoBib1hLR3l3Q2nib77DATfNFCEISGE3quDU2GM1mRK0LA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p style="line-height: inherit;orphans: 4;margin-top: 0.5rem;margin-bottom: 0.5rem;width: inherit;"><br/></p><li style="white-space-collapse: preserve;"><p style="line-height: inherit;orphans: 4;margin-bottom: 0.5rem;width: inherit;"><strong>恶意软件功能</strong>：这些软件包中的函数旨在收集用户和计算机数据，并窃取环境变量。当用户在命令行界面运行 “deepseeek” 或 “deepseekai” 命令时，恶意负载就会执行。环境变量通常包含应用程序运行所需的敏感数据，如 S3 存储服务的 API 密钥、数据库凭据等。</p></li><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002322" data-ratio="0.4361111111111111" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=6f33635d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuYVSWdVRO0ngnbNEicnQgj448AIwZPicEY4Z94LHIgnJiaI90yWqLjRzG79YpT0icCXEI2uXBTTBelgg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p style="line-height: inherit;orphans: 4;margin-top: 0.5rem;margin-bottom: 0.5rem;width: inherit;"><br/></p><li style="white-space-collapse: preserve;"><p style="line-height: inherit;orphans: 4;margin-bottom: 0.5rem;width: inherit;"><strong>传播情况</strong>：尽管 PyPI 在收到通知后迅速删除了这些软件包，但在此之前，它们已通过 pip 包管理器、bandersnatch 镜像工具被下载 36 次，通过浏览器、requests 库和其他工具被下载 186 次 。下载地区涉及美国、中国、俄罗斯等多个国家。</p></li><li style="white-space-collapse: preserve;"><p style="line-height: inherit;orphans: 4;margin-bottom: 0.5rem;width: inherit;"><strong>技术分析</strong>：从恶意软件包的代码来看，其作者使用 Pipedream 作为命令和控制服务器来接收被盗数据，并且代码中的特征注释表明该脚本是在 AI 助手的帮助下编写的。</p></li><li style="white-space-collapse: preserve;"><p style="line-height: inherit;orphans: 4;margin-bottom: 0.5rem;width: inherit;"><strong>时间线</strong>：</p><figure style="overflow-x: auto;margin-top: 1.2em;margin-bottom: 0.5rem;"><table width="1110"><thead style="background-color: rgb(248, 248, 248);"><tr style="break-inside: avoid;break-after: auto;border-width: 1px;border-style: solid;border-color: rgb(223, 226, 229);"><th style="border-bottom: 0px;border-top-color: rgb(223, 226, 229);border-right-color: rgb(223, 226, 229);border-left-color: rgb(223, 226, 229);padding: 6px 13px;">2025年1月29日 15:52:58</th><th style="border-bottom: 0px;border-top-color: rgb(223, 226, 229);border-right-color: rgb(223, 226, 229);border-left-color: rgb(223, 226, 229);padding: 6px 13px;">deepseeek 0.0.8 软件包首次发布</th></tr></thead><tbody><tr style="break-inside: avoid;break-after: auto;border-width: 1px;border-style: solid;border-color: rgb(223, 226, 229);"><td style="border-color: rgb(223, 226, 229);padding: 6px 13px;">2025年1月29日 16:13:10</td><td style="border-color: rgb(223, 226, 229);padding: 6px 13px;">deepseekai 0.0.8 软件包首次发布</td></tr><tr style="break-inside: avoid;break-after: auto;border-width: 1px;border-style: solid;border-color: rgb(223, 226, 229);background-color: rgb(248, 248, 248);"><td style="border-color: rgb(223, 226, 229);padding: 6px 13px;">2025年1月29日 16:21:32</td><td style="border-color: rgb(223, 226, 229);padding: 6px 13px;">根据报告,这两个软件包都被隔离,无法通过包管理器下载</td></tr><tr style="break-inside: avoid;break-after: auto;border-width: 1px;border-style: solid;border-color: rgb(223, 226, 229);"><td style="border-color: rgb(223, 226, 229);padding: 6px 13px;">2025年1月29日 16:41:14</td><td style="border-color: rgb(223, 226, 229);padding: 6px 13px;">PyPI管理员删除了 deepseeek</td></tr></tbody></table></figure></li></ol><p style="line-height: inherit;orphans: 4;margin-top: 0.8em;margin-bottom: 0.8em;white-space: pre-wrap;width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);"> </p><h3 style="break-after: avoid-page;break-inside: avoid;orphans: 4;font-size: 1.5em;margin-top: 1rem;margin-bottom: 1rem;font-weight: bold;line-height: 1.43;cursor: text;width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);">(二）钓鱼攻击事件</h3><ol start="" style="margin-top: 0.8em;margin-bottom: 0.8em;padding-left: 30px;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);" class="list-paddingleft-2"><li style="white-space-collapse: preserve;"><p style="line-height: inherit;orphans: 4;margin-bottom: 0.5rem;width: inherit;"><strong>事件概述</strong>：黑客组织利用 DeepSeek 的热度，伪装成 DeepSeek 客户端安装程序、官方网站等进行钓鱼攻击，诱导用户下载恶意软件、提供个人信息或进行虚假投资，从而造成用户的财产损失和隐私泄露。</p></li><li style="white-space-collapse: preserve;"><p style="line-height: inherit;orphans: 4;margin-bottom: 0.5rem;width: inherit;">具体形式</p></li><ul style="padding-left: 30px;" class="list-paddingleft-1"><li><p style="line-height: inherit;orphans: 4;margin-bottom: 0.5rem;width: inherit;"><strong>伪装安装程序</strong>：黑客将恶意软件伪装成 DeepSeek 客户端安装程序 “DeepSeekSetup.msi”，解析该安装程序后发现，它会加载执行恶意模块 ，恶意模块编译时间为 2025 年 1 月 23 日。从代码特征分析，其与 BumbleBee 恶意软件家族代码特征基本一致。</p><p style="line-height: inherit;orphans: 4;margin-top: 0.5rem;margin-bottom: 0.5rem;width: inherit;"><strong>恶意样本特征</strong>：</p></li></ul><section class="code-snippet__fix code-snippet__js"><ul class="code-snippet__line-index code-snippet__js"><li></li><li></li><li></li><li></li></ul><pre class="code-snippet__js" data-lang="css"><code><span class="code-snippet_outer">样本1：</span></code><code><span class="code-snippet_outer"><span class="code-snippet__selector-tag">-</span> 分发地址：<span class="code-snippet__selector-tag">deepseek-umxvljvoilcnxih</span><span class="code-snippet__selector-attr">[.]</span><span class="code-snippet__selector-tag">app-tools</span><span class="code-snippet__selector-class">.info</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__selector-tag">-</span> <span class="code-snippet__selector-tag">SHA256</span>：</span></code><code><span class="code-snippet_outer">934<span class="code-snippet__selector-tag">f87fdc0aa5bfdf4b572a7fd56e4e139fe1974396d1bbb09d2c222bdb838a0</span></span></code></pre></section><p><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002353" data-ratio="0.4925925925925926" data-s="300,640" style="color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: center;text-indent: 32px;background-color: rgb(255, 255, 255);" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=39bea5fb&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuYVSWdVRO0ngnbNEicnQgj4gib4iapPCMuBlNTYkPmy5ECTEAicn4xIA5hzI5UF8ricK8PDqm5sWS1IZw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002355" data-ratio="0.6314814814814815" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=062c1326&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuYVSWdVRO0ngnbNEicnQgj4LaVlfia2g7X7whQU3Zoxw4mhcML0ThopMILk4DibxKtyz7eXB2DEqaGA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><section class="code-snippet__fix code-snippet__js"><ul class="code-snippet__line-index code-snippet__js"><li></li><li></li><li></li><li></li></ul><pre class="code-snippet__js" data-lang="diff"><code><span class="code-snippet_outer">样本2：</span></code><code><span class="code-snippet_outer"><span class="code-snippet__deletion">- 分发地址：http[:]//5.61.58[.]167/files/</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__deletion">- SHA256：</span></span></code><code><span class="code-snippet_outer">31b72e1c246b4f38e70f9c8c556a626b15736589860f3231001bb4ebae74923</span></code></pre></section><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002338" data-ratio="0.4083333333333333" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=52fe2ea4&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuYVSWdVRO0ngnbNEicnQgj4NLUic9cR94PicZbXbDMYdldP7LC7dbpf1iafjP8JYPSfIyrGqCzoO5PBw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><br/></p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002339" data-ratio="0.562962962962963" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=bb444de9&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuYVSWdVRO0ngnbNEicnQgj4akiaicyIIrzwbxbo9iaRGrlFPjlTFHjF60m3ibLDEcFzb21wy2uL8x7UTg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><br/></p><ul class="list-paddingleft-1" style="list-style-type: circle;"><li><p style="line-height: inherit;orphans: 4;margin-bottom: 0.5rem;white-space: pre-wrap;width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: left;background-color: rgb(255, 255, 255);"><strong>仿冒官方网站</strong>：网络上出现了大量仿冒 DeepSeek 官方网站的钓鱼网站。这些网站有的与加密货币钓鱼计划相关，诱使用户扫描 QR 码连接钱包，导致钱包账户被盗；有的虚假宣传 DeepSeekPre - IPO 股份，吸引用户投资，骗取用户资金；还有的网站收集用户的个人身份信息（PII），存在隐私和安全隐患。</p></li></ul><ul style="padding-left: 30px;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: left;white-space: pre-wrap;background-color: rgb(255, 255, 255);" class="list-paddingleft-1"><ul class="list-paddingleft-2" style="list-style-type: square;"><li><p>deepseek-v3[.]live</p></li><li><p>deepseek-wl[.]com</p></li><li><p>deepseekonchain[.]com</p></li><li><p>deepseek-login[.]com</p></li><li><p>deepseeklogin[.]com</p></li><li><p>deepseeklogins[.]com</p></li><li><p>deepseeklogin[.]xyz</p></li><li><p>deepseeklogin[.]net</p></li><li><p>deepseeklogin[.]me</p></li><li><p>deepseeklogin[.]co</p></li><li><p>deepseeklogin[.]us</p></li></ul></ul><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002340" data-ratio="0.4925925925925926" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=1e89b28f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuYVSWdVRO0ngnbNEicnQgj4iaCkibg20fzv0BFCppjQdeMWUJp9qwBFnRkuE2hhEoJZek3M7kd8nWibA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p style="line-height: inherit;orphans: 4;margin-top: 0.5rem;margin-bottom: 0.5rem;white-space: pre-wrap;width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: left;background-color: rgb(255, 255, 255);"><br/></p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002341" data-ratio="0.4925925925925926" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=14a7334f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuYVSWdVRO0ngnbNEicnQgj493alIPa2sgRxOCAo7l1RjjroU5JIEzOxF0vcUgJYxRiaAPG1ZBKnXgQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><br/></p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002342" data-ratio="0.4925925925925926" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=c9bfed1b&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuYVSWdVRO0ngnbNEicnQgj4vMRuR8mWnSLrQ7zfrxXeyPMYC44DmQKPgyP2heDXCTv7VG3SQXGibGw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><br/></p><ul class="list-paddingleft-1" style="list-style-type: circle;"><li><p style="line-height: inherit;orphans: 4;margin-bottom: 0.5rem;width: inherit;"><strong>仿冒官方社媒账号</strong>：随着DeepSeek的破圈，其品牌传播都极具上升，国内外社交媒体网络上存在大量仿冒社媒账号，有的是在为钓鱼或者虚假加密货币引流。有的是蹭DeepSeek公司的流量，无论何种目的的仿冒账号，都影响了DeepSeek的品牌现象，并且对其目标用户构成了实际的威胁。</p></li></ul><pre spellcheck="false" lang="" style="font-family: var(--monospace);font-size: 0.9em;break-inside: avoid;overflow: visible;white-space: normal;background-image: inherit;background-position: inherit;background-size: inherit;background-repeat: inherit;background-attachment: inherit;background-origin: inherit;background-clip: inherit;background-color: rgb(248, 248, 248);border-width: 1px;border-style: solid;border-color: rgb(231, 234, 237);border-radius: 3px;padding: 8px 4px 6px;margin-bottom: 15px;margin-top: 15px;width: inherit;"><div lang="" style="height: auto;overflow: hidden;background: inherit;"><p><br/></p><pre style="font-family: inherit;padding-right: 4px;padding-left: 4px;border-radius: 0px;border-width: 0px;background: 0px 0px;font-size: inherit;color: inherit;z-index: 2;overflow: visible;word-break: normal;width: inherit;"></pre><pre role="presentation" style="font-family: inherit;break-inside: avoid;padding-right: 4px;padding-left: 4px;border-radius: 0px;border-top-width: 0px;border-right: none;border-bottom-width: 0px;border-left-width: 0px;background: 0px 0px;font-size: inherit;color: inherit;z-index: 2;overflow: visible;word-break: normal;width: inherit;"><span role="presentation" style="padding-right: 0.1px;">样本1：</span></pre><pre role="presentation" style="font-family: inherit;break-inside: avoid;padding-right: 4px;padding-left: 4px;border-radius: 0px;border-top-width: 0px;border-right: none;border-bottom-width: 0px;border-left-width: 0px;background: 0px 0px;font-size: inherit;color: inherit;z-index: 2;overflow: visible;word-break: normal;width: inherit;"><span role="presentation" style="padding-right: 0.1px;">- x[.]com/DeepSeek_solano</span></pre></div></pre><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002343" data-ratio="1.4294975688816856" data-s="300,640" style="" data-type="png" data-w="617" src="https://wechat2rss.xlab.app/img-proxy/?k=6a897979&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuYVSWdVRO0ngnbNEicnQgj4HW6FNLBLoD5OYl3r7uibibmH0jNhw8ib0R2asWvou04664CdzMRm46yuQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p style="line-height: inherit;orphans: 4;margin-top: 0.5rem;margin-bottom: 0.5rem;width: inherit;">这个方面仿冒账号目的是向deepseekonchain[.]com这个仿冒网站引流，并且还转发了官方的消息假装是正规账号。</p><pre spellcheck="false" lang="" style="font-family: var(--monospace);font-size: 0.9em;break-inside: avoid;overflow: visible;white-space: normal;background-image: inherit;background-position: inherit;background-size: inherit;background-repeat: inherit;background-attachment: inherit;background-origin: inherit;background-clip: inherit;background-color: rgb(248, 248, 248);border-width: 1px;border-style: solid;border-color: rgb(231, 234, 237);border-radius: 3px;padding: 8px 4px 6px;margin-bottom: 15px;margin-top: 15px;width: inherit;"><div lang="" style="height: auto;overflow: hidden;background: inherit;"><p><br/></p><pre style="font-family: inherit;padding-right: 4px;padding-left: 4px;border-radius: 0px;border-width: 0px;background: 0px 0px;font-size: inherit;color: inherit;z-index: 2;overflow: visible;word-break: normal;width: inherit;"></pre><pre role="presentation" style="font-family: inherit;break-inside: avoid;padding-right: 4px;padding-left: 4px;border-radius: 0px;border-top-width: 0px;border-right: none;border-bottom-width: 0px;border-left-width: 0px;background: 0px 0px;font-size: inherit;color: inherit;z-index: 2;overflow: visible;word-break: normal;width: inherit;"><span role="presentation" style="padding-right: 0.1px;">样本2：</span></pre><pre role="presentation" style="font-family: inherit;break-inside: avoid;padding-right: 4px;padding-left: 4px;border-radius: 0px;border-top-width: 0px;border-right: none;border-bottom-width: 0px;border-left-width: 0px;background: 0px 0px;font-size: inherit;color: inherit;z-index: 2;overflow: visible;word-break: normal;width: inherit;"><span role="presentation" style="padding-right: 0.1px;">- facebook[.]com/profile.php?id=61572622324898</span></pre></div></pre><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002344" data-ratio="0.856637168141593" data-s="300,640" style="" data-type="png" data-w="565" src="https://wechat2rss.xlab.app/img-proxy/?k=eba8840f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuYVSWdVRO0ngnbNEicnQgj42K6SH1HAebMsSEK66LuF1IAkUknODZCnzGDZmqZgCesiapNxfVwGNbQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><br/></p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002345" data-ratio="1.282225237449118" data-s="300,640" style="" data-type="png" data-w="737" src="https://wechat2rss.xlab.app/img-proxy/?k=0b13dba9&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuYVSWdVRO0ngnbNEicnQgj4m72Pe5515zmlJo5IFStlvUYURGBwMvOdThMdNajRxM4V2qyq2B8qWQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p style="line-height: inherit;orphans: 4;margin-top: 0.5rem;margin-bottom: 0.5rem;width: inherit;">国内社交媒体软件上的仿冒账号</p><p style="line-height: inherit;orphans: 4;margin-top: 0.5rem;margin-bottom: 0.5rem;width: inherit;">DeepSeek官方提醒用户主页甄别仿冒社媒账号</p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002346" data-ratio="1.2046556741028127" data-s="300,640" style="" data-type="png" data-w="1031" src="https://wechat2rss.xlab.app/img-proxy/?k=5a9ddc2d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuYVSWdVRO0ngnbNEicnQgj4ntGTyFVqIBIIpz4nN369XsnK12wkugvRQz2MPLrEBic3eVPQJeqwN6w%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><br/></p><ul class="list-paddingleft-1" style="list-style-type: circle;"><li><p style="line-height: inherit;orphans: 4;margin-bottom: 0.5rem;white-space: pre-wrap;width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: left;background-color: rgb(255, 255, 255);"><strong>虚假加密货币</strong>：随着 DeepSeek 的走红，多个区块链网络上出现了大量虚假的 DeepSeek 加密货币令牌。这些令牌市值短期内飙升，吸引了众多投资者。但 DeepSeek 官方已明确表示未发行任何加密货币，这些虚假令牌均为诈骗手段。据 Blockaid 数据，截至 2025 年 1 月 27 日，至少有 75 个此类诈骗令牌被创建 。据 Blockaid 研究分析师 Oz Tamir 称，诈骗者利用热门叙事和创建诈骗代币的速度越来越快。</p></li></ul><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002348" data-ratio="0.7431018078020932" data-s="300,640" style="" data-type="png" data-w="1051" src="https://wechat2rss.xlab.app/img-proxy/?k=ed69443f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuYVSWdVRO0ngnbNEicnQgj4Z8A8sVgZo1Ps6nRpGia3aqcoCJs5S2jja51LvGyEU2Y794icpsI7rQpw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p style="line-height: inherit;orphans: 4;margin-bottom: 0.5rem;white-space: pre-wrap;width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: left;background-color: rgb(255, 255, 255);">在 1 月 10 日的置顶 X 帖子中，DeepSeek 写道：“DeepSeek 没有发行任何加密货币。目前，Twitter 平台上只有一个官方账号。我们不会通过其他账户联系任何人。请保持警惕，提防潜在的骗局。</p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002349" data-ratio="0.3685185185185185" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=58bf8626&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuYVSWdVRO0ngnbNEicnQgj43CicFE3DprL2yunTcSo8u5wc2fUJAhb9THfBxtVD1HqhicKml2MaVibsw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><br/></p></ol><h3 style="break-after: avoid-page;break-inside: avoid;orphans: 4;font-size: 1.5em;margin-top: 1rem;margin-bottom: 1rem;font-weight: bold;line-height: 1.43;cursor: text;width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);">（三）模型越狱事件</h3><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002350" data-ratio="0.29014084507042254" data-s="300,640" style="" data-type="png" data-w="1065" src="https://wechat2rss.xlab.app/img-proxy/?k=e1fa017b&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuYVSWdVRO0ngnbNEicnQgj4xdEtpYicaDH3hRQN2hjGdibzD20xVWYTvBiaXGKZu9oibnBlBYXL6ojbVg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><ol start="" style="margin-top: 0.8em;margin-bottom: 0.8em;padding-left: 30px;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);" class="list-paddingleft-1"><li style="white-space-collapse: preserve;"><p style="line-height: inherit;orphans: 4;margin-bottom: 0.5rem;width: inherit;"><strong>事件概述</strong>：Palo Alto Networks 的 Unit 42 研究人员对 DeepSeek 模型进行测试，发现了三种有效的越狱技术，即 Bad Likert Judge、Crescendo 和 Deceptive Delight，这些技术能够绕过 DeepSeek 模型的安全限制，获取恶意输出。</p></li><li style="white-space-collapse: preserve;"><p style="line-height: inherit;orphans: 4;margin-bottom: 0.5rem;width: inherit;"><strong>越狱技术原理及影响</strong></p></li><ul style="padding-left: 30px;" class="list-paddingleft-1"><li><p><strong>Bad Likert Judge</strong>：该技术通过让模型使用 Likert 量表评估响应的危害性，然后促使模型生成与高评分相关的示例，从而获取恶意内容。测试中，研究人员使用该技术成功让 DeepSeek 模型生成了数据泄露工具、网络钓鱼邮件模板、社会工程优化建议等恶意输出。</p></li><li><p><strong>Crescendo</strong>：利用模型自身知识，通过逐步提供相关内容的提示，引导对话走向被禁止的话题，直至覆盖模型的安全机制。在对 DeepSeek 模型的测试中，研究人员从询问莫洛托夫鸡尾酒的历史开始，通过一系列相关提示，最终使模型生成了制作莫洛托夫鸡尾酒的详细指南。</p></li><li><p><strong>Deceptive Delight</strong>：将不安全的话题嵌入良性话题的积极叙述中，先让模型创建连接这些话题的故事，再对每个话题进行详细阐述，以此绕过安全措施。测试中，研究人员使用该技术让 DeepSeek 模型生成了利用分布式组件对象模型（DCOM）在 Windows 机器上远程运行命令的脚本。</p><p><br/></p></li></ul></ol><h3 style="margin-top: 1rem;margin-bottom: 1rem;font-weight: bold;font-size: 1.5em;break-after: avoid-page;break-inside: avoid;orphans: 4;line-height: 1.43;cursor: text;width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);">（四）数据库泄露事件</h3><ol start="" class="list-paddingleft-1" style="margin-top: 0.8em;margin-bottom: 0.8em;padding-left: 30px;width: 577.188px;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);"><li style="white-space-collapse: preserve;"><p><strong>事件概述</strong>：Wiz Research 发现 DeepSeek 有可公开访问的 ClickHouse 数据库，该数据库允许对数据库操作进行完全控制，暴露了超过 100 万行包含敏感信息的日志流，涵盖聊天记录、密钥、后端细节等。数据库托管在oauth2callback.deepseek.com:9000和dev.deepseek.com:9000 。</p></li><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002362" data-ratio="0.5564814814814815" data-s="300,640" data-w="1080" data-type="png" src="https://wechat2rss.xlab.app/img-proxy/?k=7322c1ba&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuYVSWdVRO0ngnbNEicnQgj4IxvRmek75EbI98BQkh2VzGHeleLKQORoSjDWAicTlQNsxhMGDpcTSQQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><li style="white-space-collapse: preserve;"><p><strong>发现过程</strong>：研究人员在评估 DeepSeek 公开可访问域名时，通过映射外部攻击面，发现了与特定主机相关的异常开放端口 8123 和 9000，进一步调查发现这些端口关联到无需认证即可访问的 ClickHouse 数据库。</p></li><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002363" data-ratio="0.6935185185185185" data-s="300,640" data-w="1080" data-type="png" src="https://wechat2rss.xlab.app/img-proxy/?k=4a23beda&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuYVSWdVRO0ngnbNEicnQgj4R8TGY7MSSkx9Fw7zQx55SVanBZnibYMfy5IY11ceaNk2TyfPLxAuzdw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><li style="white-space-collapse: preserve;"><p><strong>数据泄露影响</strong>：此次泄露不仅使攻击者能够获取敏感日志和明文聊天消息，还可能利用 ClickHouse 配置，通过类似 “SELECT * FROM file (&#39;filename&#39;)” 的查询直接从服务器窃取明文密码和本地文件。</p></li><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002364" data-ratio="0.5601851851851852" data-s="300,640" data-w="1080" data-type="png" src="https://wechat2rss.xlab.app/img-proxy/?k=0393dfec&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuYVSWdVRO0ngnbNEicnQgj4wiaicuibdpvVUkeSBjqZ8JsIVHJs7zHQzicTiaAgHOGXxqMhuoDBmzsnreQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><li style="white-space-collapse: preserve;"><p><strong>事件处理</strong>：Wiz Research 及时向 DeepSeek 披露问题，DeepSeek 迅速对数据库进行了安全加固，防止数据进一步泄露。</p><p><br/></p></li></ol><h2 style="break-after: avoid-page;break-inside: avoid;orphans: 4;font-size: 1.75em;margin-top: 1rem;margin-bottom: 1rem;font-weight: bold;line-height: 1.225;cursor: text;border-bottom: 1px solid rgb(238, 238, 238);width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);">三、安全事件综合分析</h2><h3 style="break-after: avoid-page;break-inside: avoid;orphans: 4;font-size: 1.5em;margin-top: 1rem;margin-bottom: 1rem;font-weight: bold;line-height: 1.43;cursor: text;width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);">（一）攻击手段特点</h3><ol start="" style="margin-top: 0.8em;margin-bottom: 0.8em;padding-left: 30px;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);" class="list-paddingleft-1"><li style="white-space-collapse: preserve;"><p><strong>利用热点和信任</strong>：网络犯罪分子紧密跟踪技术热点，利用 DeepSeek 的高人气，通过伪装成官方产品、服务或投资机会，利用用户对 DeepSeek 的信任进行攻击，具有很强的欺骗性。</p></li><li style="white-space-collapse: preserve;"><p><strong>技术手段多样且隐蔽</strong>：结合 AI 编写恶意代码、利用开源平台传播恶意软件、通过精心设计的越狱技术绕过模型安全机制等，攻击手段越来越复杂隐蔽，增加了检测和防范的难度。</p></li><li style="white-space-collapse: preserve;"><p><strong>多领域协同攻击</strong>：涵盖了软件供应链（恶意软件包事件）、网络钓鱼（仿冒网站和虚假投资）、数据安全（数据库泄露）以及 AI 模型安全（模型越狱）等多个领域，形成了全方位的攻击态势。</p><p><br/></p></li></ol><h3 style="break-after: avoid-page;break-inside: avoid;orphans: 4;font-size: 1.5em;margin-top: 1rem;margin-bottom: 1rem;font-weight: bold;line-height: 1.43;cursor: text;width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);">（二）安全事件的影响</h3><ol start="" style="margin-top: 0.8em;margin-bottom: 0.8em;padding-left: 30px;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);" class="list-paddingleft-1"><li style="white-space-collapse: preserve;"><p><strong>用户层面</strong>：导致用户的个人信息泄露、财产损失，如加密货币钱包被盗、投资被骗等，同时也可能使设备感染恶意软件，影响设备的正常使用和数据安全。</p></li><li style="white-space-collapse: preserve;"><p><strong>企业层面</strong>：DeepSeek 的品牌声誉受损，用户对其信任度下降；企业需要投入大量资源进行安全修复和用户安抚，增加运营成本；同时，整个 AI 行业的信任环境也受到冲击，影响行业的健康发展。</p></li><li style="white-space-collapse: preserve;"><p><strong>社会层面</strong>：大量的安全事件引发公众对 AI 技术安全性的担忧，阻碍 AI 技术的推广和应用；网络犯罪活动的增加也给社会安全带来不稳定因素。</p></li></ol><p style="line-height: inherit;orphans: 4;margin-top: 0.8em;margin-bottom: 0.8em;white-space: pre-wrap;width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);"> </p><h2 style="break-after: avoid-page;break-inside: avoid;orphans: 4;font-size: 1.75em;margin-top: 1rem;margin-bottom: 1rem;font-weight: bold;line-height: 1.225;cursor: text;border-bottom: 1px solid rgb(238, 238, 238);width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);">四、防范建议</h2><h3 style="break-after: avoid-page;break-inside: avoid;orphans: 4;font-size: 1.5em;margin-top: 1rem;margin-bottom: 1rem;font-weight: bold;line-height: 1.43;cursor: text;width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);">（一）用户层面</h3><ol start="" style="margin-top: 0.8em;margin-bottom: 0.8em;padding-left: 30px;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);" class="list-paddingleft-1"><li style="white-space-collapse: preserve;"><p><strong>谨慎下载和使用</strong>：只从 DeepSeek 官方网站（www.deepseek.com）下载官方正版 App，避免从不可信的网站下载文件或软件包。对于新出现的与 DeepSeek 相关的应用或服务，要仔细核实其真实性。</p></li><li style="white-space-collapse: preserve;"><p><strong>警惕网络钓鱼</strong>：不轻易点击来自未知来源的链接，尤其是那些声称与 DeepSeek 相关的邮件、短信或社交媒体消息中的链接。对于仿冒官方网站的钓鱼网站，要注意识别网站 URL、页面布局和内容细节等方面的差异。在涉及资金交易或提供个人信息时，务必谨慎确认对方身份。</p></li><li style="white-space-collapse: preserve;"><p><strong>加强安全意识培训</strong>：学习基本的网络安全知识，了解常见的网络攻击手段和防范方法。关注安全机构发布的安全提示和威胁情报，提高自身的安全防范意识。</p></li><li style="white-space-collapse: preserve;"><p><strong>使用安全防护工具</strong>：在设备上安装可靠的反病毒和互联网安全软，开启实时防护功能，及时检测和拦截恶意软件、网络钓鱼攻击等。同时，启用设备和应用程序的多因素身份验证（2FA）功能，增加账户的安全性。</p><p><br/></p></li></ol><h3 style="break-after: avoid-page;break-inside: avoid;orphans: 4;font-size: 1.5em;margin-top: 1rem;margin-bottom: 1rem;font-weight: bold;line-height: 1.43;cursor: text;width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);">（二）企业层面</h3><ol start="" style="margin-top: 0.8em;margin-bottom: 0.8em;padding-left: 30px;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);" class="list-paddingleft-1"><li style="white-space-collapse: preserve;"><p><strong>强化供应链安全管理</strong>：对于使用的第三方软件包，要进行严格的安全审查，建立软件成分分析（SCA）机制，及时发现和处理恶意软件包。与供应商保持密切沟通，及时获取安全更新和漏洞修复信息。</p></li><li style="white-space-collapse: preserve;"><p><strong>加强 AI 模型安全防护</strong>：针对 AI 模型，持续优化安全机制，提高对越狱攻击的检测和防范能力。定期对模型进行安全评估和测试，及时发现和修复潜在的安全漏洞。同时，加强对员工使用 AI 模型的管理和监控，规范使用行为。</p></li><li style="white-space-collapse: preserve;"><p><strong>提高应急响应能力</strong>：建立完善的应急响应机制，一旦发生安全事件，能够迅速采取措施进行处理，降低损失。及时向用户和相关机构通报安全事件情况，积极配合调查和处理工作。</p></li><li style="white-space-collapse: preserve;"><p><strong>加强品牌保护和用户沟通</strong>：加强对品牌的保护，及时发现和打击仿冒品牌的行为。通过官方渠道及时向用户发布安全提示和相关信息，增强用户对企业的信任。</p></li></ol><p style="line-height: inherit;orphans: 4;margin-top: 0.8em;margin-bottom: 0.8em;white-space: pre-wrap;width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);"> </p><h2 style="break-after: avoid-page;break-inside: avoid;orphans: 4;font-size: 1.75em;margin-top: 1rem;margin-bottom: 1rem;font-weight: bold;line-height: 1.225;cursor: text;border-bottom: 1px solid rgb(238, 238, 238);width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);">五、结论</h2><p style="line-height: inherit;orphans: 4;margin-top: 0.8em;margin-bottom: 0.8em;white-space: pre-wrap;width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);">DeepSeek 相关的安全事件给用户和企业敲响了警钟，在享受 AI 技术带来便利的同时，必须高度重视网络安全问题。网络犯罪分子利用新技术进行攻击的手段不断翻新，用户和企业需要不断提升安全意识，加强安全防护措施。同时，AI 行业也应加强自律，推动安全标准的制定和完善，共同营造安全可靠的网络环境。</p><p style="line-height: inherit;orphans: 4;margin-top: 0.8em;margin-bottom: 0.8em;white-space: pre-wrap;width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);"> </p><figure style="overflow-x: auto;margin-top: 1.2em;margin-bottom: 1.2em;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);"><table width="1140"><thead style="background-color: rgb(248, 248, 248);"><tr style="break-inside: avoid;break-after: auto;border-width: 1px;border-style: solid;border-color: rgb(223, 226, 229);"><th style="border-bottom: 0px;border-top-color: rgb(223, 226, 229);border-right-color: rgb(223, 226, 229);border-left-color: rgb(223, 226, 229);padding: 6px 13px;">安全事件</th><th style="border-bottom: 0px;border-top-color: rgb(223, 226, 229);border-right-color: rgb(223, 226, 229);border-left-color: rgb(223, 226, 229);padding: 6px 13px;">具体表现</th><th style="border-bottom: 0px;border-top-color: rgb(223, 226, 229);border-right-color: rgb(223, 226, 229);border-left-color: rgb(223, 226, 229);padding: 6px 13px;">影响</th><th style="border-bottom: 0px;border-top-color: rgb(223, 226, 229);border-right-color: rgb(223, 226, 229);border-left-color: rgb(223, 226, 229);padding: 6px 13px;">防范建议</th></tr></thead><tbody><tr style="break-inside: avoid;break-after: auto;border-width: 1px;border-style: solid;border-color: rgb(223, 226, 229);"><td style="border-color: rgb(223, 226, 229);padding: 6px 13px;">数据库泄露</td><td style="border-color: rgb(223, 226, 229);padding: 6px 13px;">可公开访问的 ClickHouse 数据库暴露敏感信息，包括聊天记录、密钥等</td><td style="border-color: rgb(223, 226, 229);padding: 6px 13px;">用户隐私泄露、企业数据安全受威胁</td><td style="border-color: rgb(223, 226, 229);padding: 6px 13px;">企业加强数据库安全管理，用户关注数据安全动态</td></tr><tr style="break-inside: avoid;break-after: auto;border-width: 1px;border-style: solid;border-color: rgb(223, 226, 229);background-color: rgb(248, 248, 248);"><td style="border-color: rgb(223, 226, 229);padding: 6px 13px;">恶意软件包</td><td style="border-color: rgb(223, 226, 229);padding: 6px 13px;">PyPI 上的 “deepseeek” 和 “deepseekai” 恶意软件包窃取用户数据</td><td style="border-color: rgb(223, 226, 229);padding: 6px 13px;">用户数据被盗取，可能导致财产损失</td><td style="border-color: rgb(223, 226, 229);padding: 6px 13px;">只从官方渠道下载软件包，使用安全防护工具</td></tr><tr style="break-inside: avoid;break-after: auto;border-width: 1px;border-style: solid;border-color: rgb(223, 226, 229);"><td style="border-color: rgb(223, 226, 229);padding: 6px 13px;">钓鱼攻击</td><td style="border-color: rgb(223, 226, 229);padding: 6px 13px;">伪装安装程序、仿冒官方网站、仿冒社交媒体账号、虚假加密货币等手段骗取用户信息和资金</td><td style="border-color: rgb(223, 226, 229);padding: 6px 13px;">用户财产损失、隐私泄露</td><td style="border-color: rgb(223, 226, 229);padding: 6px 13px;">谨慎点击链接，核实网站真实性，不参与虚假投资</td></tr><tr style="break-inside: avoid;break-after: auto;border-width: 1px;border-style: solid;border-color: rgb(223, 226, 229);background-color: rgb(248, 248, 248);"><td style="border-color: rgb(223, 226, 229);padding: 6px 13px;">模型越狱</td><td style="border-color: rgb(223, 226, 229);padding: 6px 13px;">Bad Likert Judge、Crescendo 和 Deceptive Delight 等技术绕过模型安全限制获取恶意输出</td><td style="border-color: rgb(223, 226, 229);padding: 6px 13px;">AI 模型被恶意利用，可能引发多种安全问题</td><td style="border-color: rgb(223, 226, 229);padding: 6px 13px;">企业优化 AI 模型安全机制，用户谨慎使用 AI 服务</td></tr></tbody></table></figure><p style="line-height: inherit;orphans: 4;margin-top: 0.8em;margin-bottom: 0.8em;white-space: pre-wrap;width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);"> </p><h2 style="break-after: avoid-page;break-inside: avoid;orphans: 4;font-size: 1.75em;margin-top: 1rem;margin-bottom: 1rem;font-weight: bold;line-height: 1.225;cursor: text;border-bottom: 1px solid rgb(238, 238, 238);width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);">六、参考链接</h2><ol style="margin-top: 0.8em;margin-bottom: 0.8em;padding-left: 30px;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);" class="list-paddingleft-1"><li style="white-space-collapse: preserve;"><p><a href="https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak" target="_blank">https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak</a></p></li><li style="white-space-collapse: preserve;"><p><a href="https://global.ptsecurity.com/analytics/pt-esc-threat-intelligence/malicious-packages-deepseeek-and-deepseekai-published-in-python-package-index" target="_blank">https://global.ptsecurity.com/analytics/pt-esc-threat-intelligence/malicious-packages-deepseeek-and-deepseekai-published-in-python-package-index</a></p></li><li style="white-space-collapse: preserve;"><p><a href="https://mp.weixin.qq.com/s?__biz=Mzk0OTYwNzc3NQ==&amp;mid=2247485519&amp;idx=1&amp;sn=f00e427f5395d34ec3614136465b405f&amp;scene=21#wechat_redirect" target="_blank" style="cursor: pointer;color: rgb(65, 131, 196);word-break: break-all;" data-linktype="2"><a href="https://mp.weixin.qq.com/s/u5coDiS5lXKjENlu1ghcoQ" target="_blank">https://mp.weixin.qq.com/s/u5coDiS5lXKjENlu1ghcoQ</a></a></p></li><li style="white-space-collapse: preserve;"><p><a href="https://www.welivesecurity.com/en/cybersecurity/scammers-exploiting-deepseek-hype/" target="_blank">https://www.welivesecurity.com/en/cybersecurity/scammers-exploiting-deepseek-hype/</a></p></li><li style="white-space-collapse: preserve;"><p><a href="https://cyble.com/blog/deepseeks-growing-influence-surge-frauds-phishing-attacks/" target="_blank">https://cyble.com/blog/deepseeks-growing-influence-surge-frauds-phishing-attacks/</a></p></li><li style="white-space-collapse: preserve;"><p><a href="https://cointelegraph.com/news/scam-tokens-surge-deepseek-ai-viral" target="_blank">https://cointelegraph.com/news/scam-tokens-surge-deepseek-ai-viral</a></p></li><li style="white-space-collapse: preserve;"><p><a href="https://unit42.paloaltonetworks.com/jailbreaking-deepseek-three-techniques/" target="_blank">https://unit42.paloaltonetworks.com/jailbreaking-deepseek-three-techniques/</a></p></li></ol><p style="line-height: inherit;orphans: 4;margin-top: 0.8em;margin-bottom: 0.8em;white-space: pre-wrap;width: inherit;color: rgb(51, 51, 51);font-family: &#34;Open Sans&#34;, &#34;Clear Sans&#34;, &#34;Helvetica Neue&#34;, Helvetica, Arial, &#34;Segoe UI Emoji&#34;, sans-serif;font-size: 16px;letter-spacing: normal;text-align: start;background-color: rgb(255, 255, 255);"> </p><p style="display: none;"><mp-style-type data-value="3"></mp-style-type></p>



<p><a href="2247486013">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=b982bd4c&amp;r=1&amp;u=https%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzU2OTcxNjE4Mw%3D%3D%26mid%3D2247486013%26idx%3D1%26sn%3D92709dc9add6e0b7ad6f9e3283711575%26subscene%3D0">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Fri, 07 Feb 2025 18:55:00 +0800</pubDate>
    </item>
    <item>
      <title>银狐&#39;全家桶&#39;病毒：下载这些软件时，千万别掉进陷阱！</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzU2OTcxNjE4Mw==&amp;mid=2247485941&amp;idx=1&amp;sn=121fec7e6f5f7733972733e59ed84d36</link>
      <description></description>
      <content:encoded><![CDATA[<p>
<span>fm</span> <span>2024-11-18 16:27</span> <span style="display: inline-block;">北京</span>
</p>

<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=08763907&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2FXia34CufgojvsCja3boFFPVg51JaxmgNx6AVd9LloopDNgXzxYW71bicRmkwfUibChUAz9zjB5CWJK72gpRxdASug%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p>小张是某公司的财务，一天她急需处理一份PDF文件。搜索&#34;PDF转换器&#34;时，第一条就是某知名PDF软件的&#34;官方下载&#34;页面。</p><p>界面非常专业，还标注&#34;企业版已被10000+公司采用&#34;。小张想都没想就点击了下载...<span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;"></span></p><p>三天后，公司老板联系小张说因业务需求要紧急向一个账户汇入大额资金，因为昨天老板就和小张聊过这个业务的相关资金信息，所以没有过多的犹豫马上向提供的账号进行汇款。</p><p>后面在进行业务确认的时候发现被骗，报警后经过排查发现小张下载的&#34;PDF转换器&#34;就是臭名昭著的&#34;<span style="letter-spacing: 0.578px;">银狐</span>&#34;病毒，电脑感染后就一直监控着小张的一举一动，在看到小张和老板因业务资金进行讨论后一步步引导小张落入陷阱，资金也在汇入对方账户后马上通过国外某奢饰品商店进行消费导致追回无望。</p><p><br/></p><p>具体行为分析请看：</p><p><a target="_blank" href="http://mp.weixin.qq.com/s?__biz=MzU2OTcxNjE4Mw==&amp;mid=2247485897&amp;idx=1&amp;sn=c43f35736500b954468eaaf6d60bfa2c&amp;chksm=fcfb3571cb8cbc6727589dbc2bdd85cfdf24908dc521a891c580fd6b883708110b2dd7ec0e37&amp;scene=21#wechat_redirect" textvalue="利用Python启动远控，&#34;银狐&#34;对抗又升级" linktype="text" imgurl="" imgdata="null" data-itemshowtype="0" tab="innerlink" data-linktype="2">利用Python启动远控，&#34;银狐&#34;对抗又升级</a><br/></p><p><a target="_blank" href="http://mp.weixin.qq.com/s?__biz=MzU2OTcxNjE4Mw==&amp;mid=2247485869&amp;idx=1&amp;sn=19e71de4295410a198fdb7c947e2ac2c&amp;chksm=fcfb3515cb8cbc03e731fc000b1cb196a472e68f6217a05d18e7dfd5867370875da4d584ebf2&amp;scene=21#wechat_redirect" textvalue="“银狐”变&#34;隐狐&#34;,最新攻击透视" linktype="text" imgurl="" imgdata="null" data-itemshowtype="0" tab="innerlink" data-linktype="2">“银狐”变&#34;隐狐&#34;,最新攻击透视</a></p><p><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;"></span></p><p>近期，&#34;银狐&#34;黑客团伙精心打造了一个庞大的仿冒软件下载生态系统，专门针对各类常用软件：</p><p><strong>生活娱乐类：喜马拉雅、全民K歌、酷狗音乐、美图秀秀...</strong></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002279" data-ratio="0.5157407407407407" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=b9da32c6&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojvsCja3boFFPVg51JaxmgNxOVf0Xbanib8YLiaV4cF9lxq2icwcSYZjy5kRqRYicFERia3ZkaoSIyw9wnw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><strong>办公软件类：WPS、</strong><strong>飞书</strong><strong>、PDF转换器...</strong></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002280" data-ratio="0.5185378590078329" data-s="300,640" data-type="png" data-w="1915" style="" src="https://wechat2rss.xlab.app/img-proxy/?k=9dc24cc9&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojvsCja3boFFPVg51JaxmgNxib2icSo4bq0T5ibTmzhDDVa8yiabMd7DchOibL5KicdctRpibgM26D1G2pYFA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><strong>浏览器类：搜狗、谷歌浏览器...</strong></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002281" data-ratio="0.5138888888888888" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=37a17f25&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojvsCja3boFFPVg51JaxmgNxcUBNch6h35L2xBFiaCZFCFLN4DLF4DLxSDtnsRXghTICKhK8ULoC7Kw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><strong>财务软件类：用友、合思、管家婆...</strong></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002282" data-ratio="0.5194444444444445" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=c4410b2b&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojvsCja3boFFPVg51JaxmgNx0Ju6SSnauNdF5wmxibjkO1NpwbbeBZ8PwE6IQ6L87E44vLYsX6SUQqw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><strong>系统工具类：鲁大师、驱动精灵...</strong></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002283" data-ratio="0.5231481481481481" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=910270a9&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojvsCja3boFFPVg51JaxmgNxgojpicdCibm10mPlv9Szwic4WZribPY1AbzyIcXG1IJPUPkcibFX51KGWvw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><strong>远程办公</strong><strong>类：向日葵、TeamViewer...</strong></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002285" data-ratio="0.512962962962963" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=d034f644&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojvsCja3boFFPVg51JaxmgNxAicXwkDv4ianzTH2YsfIWvQkqTJEXfjIzvoQw7FficIlCkZzbqf3diakaw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><strong>投资理财：雪球、同花顺、东方财富...</strong></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002286" data-ratio="0.5138888888888888" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=e186127c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojvsCja3boFFPVg51JaxmgNx1UXhWk8VTnImzIdcYZqpLzfoT2XbNibQZs0YUxxjZGU0M8tDeEjcyrg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><strong>专业工具类：AutoCAD、Adobe </strong><strong>Photoshop</strong><strong>...</strong></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002287" data-ratio="0.5092592592592593" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=af7fdd0d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojvsCja3boFFPVg51JaxmgNx6d8iaibjhramleGxqKzfRc6qCP6v3lp9ibSicIWjc7ic6NElgjDcE3ib5iacA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><strong><br/></strong></p><p><strong>他们的套路有多深？</strong></p><ul start="1" class="list-paddingleft-1"><li><p>完美复制：仿冒页面与官方网站相似度达90%以上</p></li><li><p>虚假数据：伪造企业用户数量、下载量</p></li><li><p>搜索引擎竞价：花重金占据搜索首位</p></li><li><p>捆绑木马：安装包里藏着窃取信息的病毒</p><p><br/></p></li></ul><p><strong>如何避免中招？</strong></p><ul start="1" class="list-paddingleft-1"><li><p>始终从官方渠道下载</p></li><li style="text-align:left;"><p>通过软件官网（注意核实网址）</p></li><li style="text-align:left;"><p>企业统一采购的正版软件</p></li><li style="text-align:left;"><p>可信的企业应用商店</p><p><br/></p></li></ul><p><strong>下载前多留心</strong></p><ul start="1" class="list-paddingleft-1"><li style="text-align:left;"><p>网址是否正确（不要轻信搜索排名靠前的）</p></li><li style="text-align:left;"><p>界面是否有可疑之处</p></li><li style="text-align:left;"><p>用户数量、好评是否夸张</p></li><li style="text-align:left;"><p>安装包大小是否异常</p></li></ul><p><br/></p><p><strong>如果已经中招：</strong></p><ul start="1" class="list-paddingleft-1"><li style="text-align:left;"><p>立即断网隔离受感染设备</p></li><li style="text-align:left;"><p>使用安全软件彻底查杀</p></li><li style="text-align:left;"><p>紧急修改企业各类账号密码</p></li><li style="text-align:left;"><p>排查资金账户异常</p></li><li style="text-align:left;"><p>保存证据及时报警</p></li></ul><p><br/></p><p>作为老牌安全厂商，金山毒霸始终守护在网络安全第一线。</p><p>面对不断升级的网络威胁，我们将持续提供专业的安全防护，让每个企业都能专注业务发展，高枕无忧！</p><p>欢迎转发提醒身边的同事，防范风险从点滴做起~<span style="text-align: center;font-size: var(--articleFontsize);letter-spacing: 0.034em;"></span></p><p><span data-lark-record-format="docx/record"></span></p><p><br/></p><p style="display: none;"><mp-style-type data-value="3"></mp-style-type></p>



<p><a href="2247485941">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=825ef983&amp;r=1&amp;u=https%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzU2OTcxNjE4Mw%3D%3D%26mid%3D2247485941%26idx%3D1%26sn%3D121fec7e6f5f7733972733e59ed84d36%26subscene%3D0">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Mon, 18 Nov 2024 16:27:00 +0800</pubDate>
    </item>
    <item>
      <title>股市火热，当心&#34;杀猪盘&#34;！这些诈骗手法千万别中招</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzU2OTcxNjE4Mw==&amp;mid=2247485913&amp;idx=1&amp;sn=0308d53be2422c6076cb8b4cb3ce50ad</link>
      <description></description>
      <content:encoded><![CDATA[<p>
原创 <span>fm</span> <span>2024-10-08 17:39</span> <span style="display: inline-block;">广东</span>
</p>

<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=5fee5f62&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2FXia34Cufgojvy3hOyQlGVrbvC82u8BhtKw2SpmjCINq8oK6AanA2bQZyNmlJkGkvXQTHKPr2F2D6CM4OJsEtfhw%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<section style="text-indent: 2em;"><span style="font-size: 17px;">近期，A股市场持续走强，引发了广大投资者的热情。然而，在这片看似火热的投资环境中，一些不法分子也蠢蠢欲动，妄图利用投资者的热情大肆行骗。今天，我们就来揭露一下当前股市中最常见、最危险的诈骗手法——&#34;杀猪盘&#34;，希望大家擦亮眼睛，谨防上当！</span></section><h2><span style="font-size: 20px;"><strong><span style="font-size: 20px;color: rgb(36, 91, 219);">什么是&#34;杀猪盘&#34;？</span></strong></span></h2><section style="text-indent: 2em;"><span style="font-size: 17px;">&#34;杀猪盘&#34;是一种精心设计的诈骗模式，骗子通过各种手段取得受害者信任，诱导其投入大量资金，最终卷款跑路。这种骗局就像是养猪宰杀一样，先&#34;养肥&#34;再&#34;杀猪&#34;。</span></section><h2><span style="font-size: 20px;"><strong><span style="font-size: 20px;color: rgb(36, 91, 219);">当前流行的&#34;杀猪盘&#34;手法</span></strong></span></h2><ol start="1" class="list-paddingleft-1"><li><p><strong>假冒知名证券</strong><strong>、交易所</strong><strong>网站</strong></p></li></ol><section style="text-indent: 2em;"> 骗子制作与知名证券公司极为相似的网站，诱导投资者注册、入金。国庆假期期间，诈骗分子”加班加点“上线的假冒网站包括：</section><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002252" data-ratio="0.11087645195353749" data-s="300,640" style="" data-type="png" data-w="947" src="https://wechat2rss.xlab.app/img-proxy/?k=e71129f6&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvy3hOyQlGVrbvC82u8BhtKcyO6vibZDH71MeJsPzxtHfb0jF8SwaCqrVKfNNRakmUKhcubdJrl4AA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002255" data-ratio="1.3333333333333333" data-s="300,640" style="" data-type="jpeg" data-w="960" src="https://wechat2rss.xlab.app/img-proxy/?k=ac994d97&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2FXia34Cufgojvy3hOyQlGVrbvC82u8BhtKldHm2Bogsx1ThoKXPIHImGxwRSF0oibp4RgPdThectL2ibs00Xf1NyHg%2F640%3Fwx_fmt%3Djpeg%26from%3Dappmsg"/></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002256" data-ratio="1" data-s="300,640" style="" data-type="jpeg" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=36d28b85&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2FXia34Cufgojvy3hOyQlGVrbvC82u8BhtKiavg4JjPQaXtZYTKxJt3Piat23KbP3drXHcQ2CNiaau1DQ3HE9AQORpXQ%2F640%3Fwx_fmt%3Djpeg%26from%3Dappmsg"/></p><p><br/></p><ol start="2" class="list-paddingleft-1"><li><p><strong>冒充公司高管或内部员工</strong></p></li></ol><section style="text-indent: 2em;">骗子会伪造身份，声称是某证券公司的高管或内部员工，以下面的理由取得信任：</section><ul start="1" class="list-paddingleft-1"><li><p>高管租房：假装是来某地出差的公司高管，需要租房。</p></li><li><p>内部测试：谎称正在进行系统内部测试，需要&#34;配合&#34;。</p><p><br/></p></li></ul><ol start="3" class="list-paddingleft-1"><li><p><strong>许诺高回报，诱导加大投资</strong></p></li></ol><section style="text-indent: 2em;">骗子会通过各种手段让受害者在初期获得一定收益，进而诱导其加大投资力度。等到投资金额达到一定程度时，就会突然失联或让受害者无法提现。</section><h2><strong><span style="color: rgb(36, 91, 219);font-size: 20px;">诈骗套路情景复现</span></strong></h2><section style="text-indent: 2em;">为了让大家更好地识别这些诈骗手法，我们来看一个典型的&#34;杀猪盘&#34;诈骗过程。以下是一段模拟对话，展示了诈骗分子如何一步步取得受害者的信任：</section><section style="line-height: normal;"><strong>系统</strong>：您好，有位先生想租您的房子，需要您加他微信直接沟通。</section><section style="line-height: normal;"><strong>房东</strong>：好的，麻烦告诉我他的微信号。</section><section style="line-height: normal;">[房东添加了&#34;张经理&#34;的微信]</section><section style="line-height: normal;"><strong>张经理</strong>：您好，我是某某证券股份有限公司的张经理。我们公司最近在您那边开展业务，需要租一套房子。</section><section style="line-height: normal;"><strong>房东</strong>：您好张经理，很高兴认识您。我这边确实有套房子在出租，不知道您有什么具体要求吗？</section><section style="line-height: normal;"><strong>张经理</strong>：房子具体情况不重要，主要是要方便办公。我们准备租一年，可以先付一年的房租。</section><section style="line-height: normal;"><strong>房东</strong>：哦，这么爽快啊。那房子的位置您不用看看吗？离您们公司远不远？</section><section style="line-height: normal;"><strong>张经理</strong>：不用了，我相信您的房子不错。位置也无所谓，反正我们刚来深海市，哪里都不熟。</section><section style="line-height: normal;"><strong>房东</strong>：好的...那房租和押金的事我们详细谈谈？</section><section style="line-height: normal;"><strong>张经理</strong>：房租按您说的来就行，押金我们需要5天后才能申请下来，到时再给您。</section><section style="line-height: normal;"><strong>房东</strong>：这样啊...那您方便发一下您的身份证照片吗？我需要登记一下。</section><section style="line-height: normal;"><strong>张经理</strong>：没问题，稍等。[发送了一张身份证照片]</section><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002254" data-ratio="1.144642857142857" data-s="300,640" style="" data-type="png" data-w="560" src="https://wechat2rss.xlab.app/img-proxy/?k=d63d087f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvy3hOyQlGVrbvC82u8BhtKISQq5VPKcyUuEgGUdUibdu83gQficSaErkGGS7MAxskzG2ghtxVFCwJg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><section style="line-height: normal;"><strong><br/></strong></section><section style="line-height: normal;"><strong>房东</strong>：(查看照片后)张经理，这身份证是不是少了些什么？我记得身份证上应该有水印的。</section><section style="line-height: normal;"><strong>张经理</strong>：哦，可能是拍摄角度问题。对了，我是84年的，有个女儿，平时喜欢健身。最近刚离异，所以才会到深海市发展。</section><section style="line-height: normal;"><strong>张经理</strong>：这是我的工作证。[发送了一张工作证照片]</section><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002253" data-ratio="1.3375" data-s="300,640" style="" data-type="png" data-w="560" src="https://wechat2rss.xlab.app/img-proxy/?k=ca43d729&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvy3hOyQlGVrbvC82u8BhtKZFwqjgVgQn785HIInCQUM2TVictvqWy40qyGMBQFeOwlXBZqp0aC6Gg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><section style="line-height: normal;"><strong><br/></strong></section><section style="line-height: normal;"><strong>房东</strong>：张经理，您之前说从没来过深海市，84年的话应该有不少机会来深海市才对啊。</section><section style="line-height: normal;"><strong>张经理</strong>：呃...我是说没有长期在深海市工作过。</section><section style="line-height: normal;">(经过几天的闲聊，获取被害人信任之后，诈骗开始...)</section><section style="line-height: normal;"><strong>张经理</strong>：对了，我们公司最近有个很好的投资项目，要不要我介绍给您？保证稳赚不赔。</section><section style="line-height: normal;">诈骗分子谎称内部系统故障需要测试、或者有内部消息，发送仿冒网址或者假冒APP给被害人，开始进行诈骗。</section><p><span data-lark-record-format="docx/record"></span></p><h2><span style="font-size: 20px;"><strong><span style="font-size: 20px;color: rgb(36, 91, 219);">识破诈骗的关键点</span></strong></span></h2><p>在这段对话中，我们可以发现几个明显的诈骗迹象：</p><ol start="1" class="list-paddingleft-1"><li><p>沟通方式异常：拒绝电话沟通，坚持使用微信。</p></li><li><p>对房屋细节不关心：正常租客会关注房屋位置、条件等。</p></li><li><p>爽快答应条件：不讨价还价，直接同意支付一年房租。</p></li><li><p>押金延期：要求押金延后支付，这很不寻常。</p></li><li><p>身份证问题：提供的身份证照片缺少常见的安全特征(如水印)。</p></li><li><p>个人信息矛盾：年龄与经历不符，对深海市的描述前后矛盾。</p></li><li><p>过分热情：不像是在租房，而更像是要交友。</p><p><br/></p></li></ol><h2><strong><span style="color: rgb(36, 91, 219);font-size: 20px;">如何防范&#34;杀猪盘&#34;？</span></strong></h2><ol start="1" class="list-paddingleft-1"><li><p><strong>警惕高回报承诺</strong>：任何承诺&#34;稳赚不赔&#34;或&#34;超高回报&#34;的投资都值得怀疑。</p></li><li><p><strong>核实网站</strong><strong>真实性</strong>：仔细核对网址，确保是官方网站。可以拨打官方客服电话进行确认。</p></li><li><p><strong>不轻信陌生人</strong>：对于突然出现的&#34;贵人&#34;保持警惕，特别是那些主动提供&#34;内幕消息&#34;的人。</p></li><li><p><strong>保护个人信息</strong>：不要轻易向他人透露银行卡号、验证码等敏感信息。</p></li><li><p><strong>选择正规渠道</strong>：只通过官方认可的APP或网站进行交易，不要使用来路不明的平台。</p></li><li><p><strong>注意沟通方式</strong>：警惕那些拒绝正常沟通方式(如电话)的人，特别是坚持使用特定app或平台的要求。</p></li><li><p><strong>验证身份</strong><strong>真实性</strong>：如果对方提供身份证明，仔细检查其真实性，包括水印、照片质量等细节。</p></li><li><p><strong>理性判断</strong>：对方如果表现出对重要细节(如租房位置)不关心，或行为模式不符合常理(如不讨价还价)，要提高警惕。</p></li><li><p><strong>及时止损</strong>：如果发现可能上当受骗，要及时报警并冻结相关账户。</p></li></ol><p>投资本就是一件需要慎重对待的事情，面对&#34;杀猪盘&#34;这样的陷阱，我们更要提高警惕。希望大家都能够理性投资，远离诈骗，在金融市场中稳健前行！</p><h2><span style="font-size: 20px;"><strong>记住：天上不会掉馅饼，稳妥投资才是王道。让我们一起，守护好自己的&#34;钱袋子&#34;！</strong></span></h2><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;FZF9dcUloocTuIxk26Tcb5wtnzo&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;记住：天上不会掉馅饼，稳妥投资才是王道。让我们一起，守护好自己的\&#34;钱袋子\&#34;！&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0*1+12&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006285747716100&#34;],&#34;1&#34;:[&#34;bold&#34;,&#34;true&#34;]},&#34;nextNum&#34;:2}},&#34;type&#34;:&#34;heading2&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;pasteRandomId&#34;:&#34;f8e660b6-6bb8-453d-ba59-71c2e44387d9&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:68,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:38},&#34;recordId&#34;:&#34;JPD4djgimoJWP9xs6ikcwiF0nMb&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p><span data-lark-record-format="docx/record"></span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;FZF9dcUloocTuIxk26Tcb5wtnzo&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;假冒知名证券、交易所网站&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0*1+6*2*1+4*0*1+2&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006285747716100&#34;],&#34;1&#34;:[&#34;bold&#34;,&#34;true&#34;],&#34;2&#34;:[&#34;author&#34;,&#34;7405879902891212801&#34;]},&#34;nextNum&#34;:3}},&#34;type&#34;:&#34;ordered&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;pasteRandomId&#34;:&#34;44314a8e-d110-4f44-8e99-2788d7567185&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:8,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:12},&#34;recordId&#34;:&#34;L6MCdVJ1noXAnCxphdWcEa7InPc&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;FZF9dcUloocTuIxk26Tcb5wtnzo&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;当前流行的\&#34;杀猪盘\&#34;手法&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0*1+c&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006285747716100&#34;],&#34;1&#34;:[&#34;textHighlight&#34;,&#34;rgb(36,91,219)&#34;]},&#34;nextNum&#34;:2}},&#34;type&#34;:&#34;heading2&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;pasteRandomId&#34;:&#34;6bb45763-bc6c-48d9-996b-8d00cc6f7f1e&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:7,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:12},&#34;recordId&#34;:&#34;ANtEdU3eBo3HGIxXid6cFrE3nFf&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;FZF9dcUloocTuIxk26Tcb5wtnzo&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;\&#34;杀猪盘\&#34;是一种精心设计的诈骗模式，骗子通过各种手段取得受害者信任，诱导其投入大量资金，最终卷款跑路。这种骗局就像是养猪宰杀一样，先\&#34;养肥\&#34;再\&#34;杀猪\&#34;。&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+24&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006285747716100&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;pasteRandomId&#34;:&#34;6a81412c-0223-4d95-a14a-939e87228d66&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:5,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:76},&#34;recordId&#34;:&#34;HN0sd84EboI3LDxpgfRcDYT4nEd&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;FZF9dcUloocTuIxk26Tcb5wtnzo&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;什么是\&#34;杀猪盘\&#34;？&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0*1+9&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006285747716100&#34;],&#34;1&#34;:[&#34;textHighlight&#34;,&#34;rgb(36,91,219)&#34;]},&#34;nextNum&#34;:2}},&#34;type&#34;:&#34;heading2&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;pasteRandomId&#34;:&#34;7154c992-d4ec-4aba-a60f-80ae71fef474&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:4,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:9},&#34;recordId&#34;:&#34;Mm22doTexotZKJxVjE4cdUymnpX&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;FZF9dcUloocTuIxk26Tcb5wtnzo&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;近期，A股市场持续走强，引发了广大投资者的热情。然而，在这片看似火热的投资环境中，一些不法分子也蠢蠢欲动，妄图利用投资者的热情大肆行骗。今天，我们就来揭露一下当前股市中最常见、最危险的诈骗手法——\&#34;杀猪盘\&#34;，希望大家擦亮眼睛，谨防上当！&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+3a&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006285747716100&#34;]},&#34;nextNum&#34;:1}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;channel&#34;:&#34;saas&#34;,&#34;pasteRandomId&#34;:&#34;50e65324-3ec1-40cf-9566-dbe087e7f689&#34;,&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:2,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:118},&#34;recordId&#34;:&#34;QuKvd17PXoysp3xqr4Zc2xWwnLd&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"></span></p><p><br/></p><p style="display: none;"><mp-style-type data-value="3"></mp-style-type></p>



<p><a href="2247485913">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=b5d0ec35&amp;r=1&amp;u=https%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzU2OTcxNjE4Mw%3D%3D%26mid%3D2247485913%26idx%3D1%26sn%3D0308d53be2422c6076cb8b4cb3ce50ad%26subscene%3D0">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Tue, 08 Oct 2024 17:39:00 +0800</pubDate>
    </item>
    <item>
      <title>利用Python启动远控，&#34;银狐&#34;对抗又升级</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzU2OTcxNjE4Mw==&amp;mid=2247485897&amp;idx=1&amp;sn=c43f35736500b954468eaaf6d60bfa2c</link>
      <description></description>
      <content:encoded><![CDATA[<p>
原创 <span>db</span> <span>2024-09-25 11:28</span> <span style="display: inline-block;">广东</span>
</p>

<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=531a62c6&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2FXia34CufgojtmI2iaTic1UbPgSA5lKFx3oxKcJpbK9wBN4fP9Fv9V6b4IMpjpVo9pGDjDzFjsKcJ80GdOlzFKPicBw%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p><strong style="mso-bidi-font-weight:normal;"><span style="font-size:14.0pt;font-family:宋体;">事件概述：<o:p></o:p></span></strong></p><section style="text-indent: 2em;"><span style="font-family:宋体;">近期毒霸安全团队再次检测到“银狐”变种大范围传播，主要途径来自于搜索引擎的广告页投放，页面仿冒其他公司的推广下载站，另一方面通过感染后的用户微信群发病毒文件，实现裂变传播。其中一个仿冒投放页如下。<o:p></o:p></span></section><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002237" data-ratio="0.7175925925925926" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=44ba7856&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsHHCibhKC8SicugVP8JBGNU2kSdsk0C5Cy7O7L0T7ibF2OkzvTSpm6dFJCPloxRicPvZYZ0cP7Sao9ibA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><section style="text-indent: 2em;"><span style="font-family:宋体;">经过深入分析，这是“银狐”家族的又一个新变种，与之前披露的攻击手法不同，本次感染链在复杂和对抗度上进一步提升，加入UAC绕过，线程池注入结束安全软件进程，并利用python驻留系统，BoxedAppSDK加载加密压缩的恶意dll等。最终执行winos远控木马，操控用户电脑。winos是基于Gh0st的远控变种在黑产圈大量传播使用。整个攻击流程如下。<o:p></o:p></span></section><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002236" data-ratio="0.7657407407407407" data-s="300,640" style="" data-type="jpeg" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=5bd982c4&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2FXia34CufgojsHHCibhKC8SicugVP8JBGNU2Zn3L8aM9Xrf84StNW87oTIKt28LrotsaQ96kacsy78qVfWibyqRFPvQ%2F640%3Fwx_fmt%3Djpeg%26from%3Dappmsg"/></p><p><strong><span style="font-size:14.0pt;font-family:宋体;">详细分析：<o:p></o:p></span></strong></p><section style="text-indent: 2em;"><span style="font-family: 宋体;font-size: 17px;">母体样本大部分命名为：“<span style="font-family: 宋体;color: rgb(25, 25, 25);">安装包_Setup.exe，软件包安装程序.exe，安装包5.2.3-doc-uninsta.exe等</span>”。</span></section><p><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;font-family: 宋体;">母体样本为增强免杀能力，</span><span style="font-size: var(--articleFontsize);letter-spacing: 0.578px;font-family: 宋体;">使用</span><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;font-family: 宋体;">了多个开源库：</span><span lang="EN-US" style="font-size: var(--articleFontsize);letter-spacing: 0.034em;font-family: 宋体;color: rgb(25, 25, 25);">ZeroMQ，Curl，Openssl等，其中执行逻辑使用ZeroMQ异步消息库框架封装了起来，通过注册事件回调异步执行，使得恶意代码隐藏在了庞大的库代码之中。</span></p><p><span lang="EN-US" style="font-size: var(--articleFontsize);letter-spacing: 0.034em;font-family: 宋体;color: rgb(25, 25, 25);">如上图所述的执行流程，共注册了4个有效的异步回调功能，“A”功能用于隐藏控制台窗口。“CHK”用于检测沙箱和虚拟机，通过枚举系统ACPI固件表识别。检测通过后执行“DLS”和“EC”，这两个步骤组合执行，先通过“<span style="letter-spacing: 0.578px;">DLS</span>”下载payload解密后再传入“EC”执行shellcode。</span></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002238" data-ratio="0.5722222222222222" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=9093677e&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsHHCibhKC8SicugVP8JBGNU2Xp4Gzo0bUwAvyKCl1dTyuGgK5cmGVTWbfXHwHb6TywyLMpGd95bH4Q%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><section style="text-indent: 2em;"><span style="font-family:宋体;">第一个阶段Payload有两个，其中带gif格式的利用了语雀云文档存储。另一个利用了aliyun存储。</span><span style="font-family: 宋体;font-size: var(--articleFontsize);letter-spacing: 0.034em;">解密方式为AES256 CFB模式，前16字节为IV，后32字节为KEY,如果有gif头的需要移除gif头部。</span></section><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002233" data-ratio="0.0824074074074074" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=6cb4858d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsHHCibhKC8SicugVP8JBGNU2AnSibttQicBRra8LT4c0fGEib6pUKvZCRG1pT9m5X8C5GGFibD2OkpLbdA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002239" data-ratio="0.4301675977653631" data-s="300,640" style="" data-type="png" data-w="895" src="https://wechat2rss.xlab.app/img-proxy/?k=8bf88eab&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsHHCibhKC8SicugVP8JBGNU2QGibiayofr2JWCZONCCic69tC4CpJnxziclu6Jp4NtIjcic1SGn5tKgCcibA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><section style="text-indent: 2em;"><span style="font-size: 17px;"><span lang="EN-US" style="font-family: 宋体;">Payload1解出后是一段经过两次自解密处理的shellcode，该shellcode主要功能是内存加载内嵌的pe模块</span><span lang="EN-US" style="font-family: 宋体;color: rgb(25, 25, 25);">PoolParty</span><span style="font-family: 宋体;">，此模块利用了blackhat2023大会上公布的线程池隐蔽注入技术(详见文末参考)，注入系统关键进程“lsass.exe”，并在lsass.exe进程中结束安全软件进程，相关进程名单有136个，涵盖了国内外多个安全软件。</span></span></section><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002235" data-ratio="0.9058473736372646" data-s="300,640" style="" data-type="png" data-w="1009" src="https://wechat2rss.xlab.app/img-proxy/?k=b505baa5&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsHHCibhKC8SicugVP8JBGNU2mpqu5XTM5sVP87UvLUUhEwyr6vdicTUmJtRlrnpbshNOWN6UUCbajww%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><section style="text-indent: 2em;"><span style="font-size: 17px;"><span lang="EN-US" style="font-family: 宋体;">Payload2内部名称“</span><span lang="EN-US" style="font-family: 宋体;background: white;">Stage2Code.dll</span><span lang="EN-US" style="font-family: 宋体;">”，加载后首先patch ETW，再检测是否管理员权限，如果没有则下载BypassUAC模块重新启动自身。BypassUAC方式来自开源项目UACME。有管理员权限则继续下载后续4个payload文件。各功能名称对应关系如下：</span></span></section><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002234" data-ratio="0.24166666666666667" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=b4cef4ab&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsHHCibhKC8SicugVP8JBGNU2loXoCjXxpxeib39dnO6WCfIeOh3gMmiaeBicRALticUj042RLSohwpbAWQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><section style="text-indent: 2em;"><span style="font-size: 17px;font-family: 宋体;">Adobe.zip中打包了python运行环境，解压释放到用户如下目录:</span><span style="color: black;font-family: 宋体;letter-spacing: 0.034em;">“C:\Program Files (x86)\Common Files\随机名\1\”或“C:\Users\username\AppData\Local\Programs\Python\”其中“officehelper.py” 和 “scriptforge.py”是编译成python字节码的pyc脚本。</span></section><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002240" data-ratio="0.7200811359026369" data-s="300,640" style="" data-type="png" data-w="986" src="https://wechat2rss.xlab.app/img-proxy/?k=0e689a61&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsHHCibhKC8SicugVP8JBGNU2kECn4p1A1oEhpMzBtcqibNgbtltLfsgVJ5RfBJES6KXXTZDMJhJHLsQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><section style="text-indent: 2em;"><span style="font-size: 17px;font-family: 宋体;color: rgb(25, 25, 25);">SchTask.x64.dll模块通过直接RPC调用注册pythoncopy.exe到计划任务,命令行为“officehelper.py”。后续任务由计划任务执行。</span></section><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002241" data-ratio="0.7027777777777777" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=f3d03a42&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsHHCibhKC8SicugVP8JBGNU2GRYIVbnWxue62kStVqHW9JerKz5aw8VzeR1wjxPMp2TZOZUcRzmvmA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><section style="text-indent: 2em;"><span style="font-size: 17px;"><span style="font-family: 宋体;color: rgb(25, 25, 25);">“officehelper.py”与</span><span style="font-family: 宋体;color: black;">“scriptforge.py”会互相启动形成守护，</span><span style="font-family: 宋体;color: rgb(25, 25, 25);"> officehelper利用BoxeAppSdk的虚拟文件系统加载加密压缩的hello.dll(密码“nsvbdfrga”)并执行导出函数startRun。BoxeAppSdk原理是hook系统Api实现的虚拟文件系统，使得在LoadDll时无须触摸磁盘文件。这样避开了要加载的文件被安全软件扫描。</span></span></section><p><span style="font-size: 17px;font-family: 宋体;color: rgb(25, 25, 25);"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002242" data-ratio="0.7379629629629629" data-s="300,640" style="letter-spacing: 0.578px;text-align: center;text-wrap: wrap;" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=a788e78f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsHHCibhKC8SicugVP8JBGNU2icHPjo72Xx3sia5yaJllEib8fMjNpnRlia6kib5r2D450v3TUicHNZF8kyJg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></span></p><section style="text-indent: 2em;"><span style="font-size: 17px;font-family: 宋体;color: rgb(25, 25, 25);"><span style="text-wrap: wrap;letter-spacing: 0.034em;text-align: justify;font-family: 宋体;">“hello.dll”是最终加载器，负责解密加载前面下载的“s.dat”和“a.dat”。“s.dat”解密后的shellcode执行后会从c2拉取最终远控“上线模块.dll”，shellcode尾部存储的是winos远控配置，使用双上线配置模式，上线分组&#34;666888&#34;，C2:8.218.198.10:7001和8.218.198.10:7002。“a.dat”解开后与前面的<span lang="EN-US" style="color: rgb(25, 25, 25);">PoolParty工具一致，用于结束安全软件进程</span></span><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;text-wrap: wrap;font-family: 宋体;">。</span></span></section><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002243" data-ratio="0.7512116316639742" data-s="300,640" style="" data-type="png" data-w="619" src="https://wechat2rss.xlab.app/img-proxy/?k=1bfec3f3&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsHHCibhKC8SicugVP8JBGNU2uFv3e0UusH4Q7pmY2Ckqxt7Q7cYO9g869UnmdxkRdGEqibpGVH4iau2w%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002248" data-ratio="0.5657407407407408" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=d833596d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojtmI2iaTic1UbPgSA5lKFx3oxqwWqdwPVVsW9uib5rqklUmxKE1rHpQLpaH1DqbHuaWXpv7Nia5Ln3Q6A%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><strong><span lang="EN-US" style="mso-bidi-font-size:10.5pt;font-family:宋体;">IOC：</span></strong><span lang="EN-US" style="mso-bidi-font-size:10.5pt;font-family:宋体;"><o:p></o:p></span></p><p><span style="font-family: 宋体;font-size: 14px;">1e9ccf31bb24a3514171c3dcb19078ef<o:p></o:p></span></p><p><span style="font-family: 宋体;font-size: 14px;">31eedd8d089ede700293719349f05d19<o:p></o:p></span></p><p><span style="font-family: 宋体;font-size: 14px;">2b740ac0d2410d5f0bab45a3b3abbaf8<o:p></o:p></span></p><p><span style="font-family: 宋体;font-size: 14px;">8870064f7582692e18fab0f400a1712a</span></p><p><span style="font-family: 宋体;font-size: 14px;">78d8676c7142848aadfbd83a79284408</span></p><p><span style="font-family: 宋体;font-size: 14px;">7b5798ffeb106b976f5afbd2c9fd774c<o:p></o:p></span></p><p><span style="font-family: 宋体;font-size: 14px;">a1.jiesheng18[.]com</span></p><p><span style="font-family: 宋体;font-size: 14px;">https[:]//cdn.nlark[.]com/yuque/0/2024/gif/48190910/1725488215950-f5cc8160-597e-4065-9afd-06bebb8ad56c.gif</span></p><p><span style="font-family: 宋体;font-size: 14px;">https[:]//jockeraaa.oss-cn-beijing.aliyuncs[.]com/27_$92_</span></p><p><span style="font-family: 宋体;font-size: 14px;">https[:]//dddxas.oss-cn-beijing.aliyuncs[.]com/commen2/c/static/0</span></p><p><span style="font-family: 宋体;font-size: 14px;">https[:]//dddxas.oss-cn-beijing.aliyuncs[.]com/commen2/c/static/1</span></p><p><span style="font-family: 宋体;font-size: 14px;">https[:]//dddxas.oss-cn-beijing.aliyuncs[.]com/commen2/pf/3</span></p><p><span style="font-family: 宋体;font-size: 14px;">https[:]//dddxas.oss-cn-beijing.aliyuncs[.]com/commen2/psc/29_$10_</span></p><p><span style="font-family: 宋体;font-size: 14px;">https[:]//dddxas.oss-cn-beijing.aliyuncs[.]com/commen2/c/static/a</span></p><p><span lang="EN-US" style="mso-bidi-font-size:10.5pt;font-family:宋体;">8.218.198[.]10<o:p></o:p></span></p><p><strong><span lang="EN-US" style="mso-bidi-font-size:10.5pt;font-family:宋体;">References：</span></strong><span lang="EN-US" style="mso-bidi-font-size:10.5pt;font-family:宋体;"><o:p></o:p></span></p><p><span style="font-size: 12px;"><a href="https://www.blackhat.com/eu-23/briefings/schedule/#the-pool-party-you-will-never-forget-new-process-injection-techniques-using-windows-thread-pools-35446" target="_blank">https://www.blackhat.com/eu-23/briefings/schedule/#the-pool-party-you-will-never-forget-new-process-injection-techniques-using-windows-thread-pools-35446</a></span></p><p><span style="font-size: 12px;"><a href="https://github.com/SafeBreach-Labs/PoolParty" target="_blank">https://github.com/SafeBreach-Labs/PoolParty</a></span></p><p><span style="font-size: 12px;"><a href="https://github.com/hfiref0x/UACME/blob/ce6fb5ffe5dc33e5918d7512df558720d46890a0/Source/Akagi/methods/tyranid.c#L514" target="_blank">https://github.com/hfiref0x/UACME/blob/ce6fb5ffe5dc33e5918d7512df558720d46890a0/Source/Akagi/methods/tyranid.c#L514</a></span></p><p><strong><span lang="EN-US" style="mso-bidi-font-size:10.5pt;font-family:宋体;"><br/></span></strong></p><p style="text-align: center;"><br/></p><p><br/></p><p><br/></p><p style="display: none;"><mp-style-type data-value="3"></mp-style-type></p>



<p><a href="2247485897">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=117bbd9d&amp;r=1&amp;u=https%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzU2OTcxNjE4Mw%3D%3D%26mid%3D2247485897%26idx%3D1%26sn%3Dc43f35736500b954468eaaf6d60bfa2c%26subscene%3D0">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Wed, 25 Sep 2024 11:28:00 +0800</pubDate>
    </item>
    <item>
      <title>CrowdStrike故障引发全球多国Windows系统蓝屏</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzU2OTcxNjE4Mw==&amp;mid=2247485877&amp;idx=1&amp;sn=1f81d8032ba8b5f661329c680e6456fb</link>
      <description>7月19日全球多国Windows系统出现蓝屏，已对多国包括航空、铁路、银行、企业、媒体等在内的多领域造成影响。</description>
      <content:encoded><![CDATA[<p>
<span>db</span> <span>2024-07-19 20:54</span> <span style="display: inline-block;">广东</span>
</p>

<p>7月19日全球多国Windows系统出现蓝屏，已对多国包括航空、铁路、银行、企业、媒体等在内的多领域造成影响。</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=e7b59fb5&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2FXia34CufgojuBJrUuQv08qEUcGrb0vCyuDeq6Fty8jzxk5OBd4YbiaS1LcsMKyujluO6ft0fJS1DyJQ1ficicWBO6w%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p><span style="font-family: system-ui, -apple-system, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;letter-spacing: 0.544px;text-wrap: wrap;background-color: rgb(255, 255, 255);">7月19日全球多国Windows系统出现蓝屏，<span style="outline: 0px;font-family: system-ui, -apple-system, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;text-wrap: wrap;background-color: rgb(255, 255, 255);letter-spacing: 0.578px;">已对</span>多国包括航空、铁路、银行、企业、媒体等在内的多领域造成影响<span style="outline: 0px;font-family: system-ui, -apple-system, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;text-wrap: wrap;background-color: rgb(255, 255, 255);letter-spacing: 0.578px;">。</span></span></p><p style="margin-bottom: 0px;outline: 0px;font-family: system-ui, -apple-system, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;letter-spacing: 0.544px;text-wrap: wrap;background-color: rgb(255, 255, 255);">据悉，故障是由于全球知名安全厂商CrowdStrike的EDR产品一次错误更新或错误配置导致了此次全球范围的技术故障问题。<span style="font-family: system-ui, -apple-system, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;letter-spacing: 0.544px;text-wrap: wrap;background-color: rgb(255, 255, 255);">CrowdStrike已在其官网发布公告表示正在全力以赴保障客户的安全性和稳定性。</span></p><p style="margin-bottom: 0px;outline: 0px;font-family: system-ui, -apple-system, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;letter-spacing: 0.544px;text-wrap: wrap;background-color: rgb(255, 255, 255);"><br/></p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002225" data-ratio="0.7111111111111111" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=c6d0410d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuBJrUuQv08qEUcGrb0vCyuzhRCXXldZTb50Frf0UUa8VRa3xhfRL8KCHCjBLgcia1Pt5iaf0EFC0zA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p style="margin-bottom: 0px;outline: 0px;font-family: system-ui, -apple-system, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;letter-spacing: 0.544px;text-wrap: wrap;background-color: rgb(255, 255, 255);">目前的解决方案：</p><p style="text-align: left;"><span style="font-size: 15px;">1.将Windows 启动到安全模式（Safe Mode）或 Windows 恢复环境（Windows Recovery Environment）</span></p><p style="text-align: left;"><span style="font-size: 15px;">2.进入到 C:\Windows\System32\drivers\CrowdStrike 目录</span></p><p style="text-align: left;"><span style="font-size: 15px;">3.找到与 C-00000291*.sys 匹配的文件，并删除它</span></p><p style="text-align: left;"><span style="font-size: 15px;">4.重新启动主机</span></p><p style="margin-bottom: 0px;outline: 0px;font-family: system-ui, -apple-system, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;letter-spacing: 0.544px;text-wrap: wrap;background-color: rgb(255, 255, 255);"><br/></p><p style="margin-bottom: 0px;outline: 0px;font-family: system-ui, -apple-system, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;letter-spacing: 0.544px;text-wrap: wrap;background-color: rgb(255, 255, 255);"><br/></p><p style="margin-bottom: 0px;outline: 0px;font-family: system-ui, -apple-system, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;letter-spacing: 0.544px;text-wrap: wrap;background-color: rgb(255, 255, 255);">References：<br/></p><p style="margin-bottom: 0px;outline: 0px;font-family: system-ui, -apple-system, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;letter-spacing: 0.544px;text-wrap: wrap;background-color: rgb(255, 255, 255);text-align: left;"><span style="font-size: 14px;">Statement on Windows Sensor Update - crowdstrike.com </span></p><p style="margin-bottom: 0px;outline: 0px;font-family: system-ui, -apple-system, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;letter-spacing: 0.544px;text-wrap: wrap;background-color: rgb(255, 255, 255);text-align: left;"><span style="font-size: 12px;"><a href="https://www.crowdstrike.com/blog/statement-on-windows-sensor-update/" target="_blank">https://www.crowdstrike.com/blog/statement-on-windows-sensor-update/</a></span></p><p style="display: none;"><mp-style-type data-value="3"></mp-style-type></p>



<p><a href="2247485877">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=6adb10bb&amp;r=1&amp;u=https%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzU2OTcxNjE4Mw%3D%3D%26mid%3D2247485877%26idx%3D1%26sn%3D1f81d8032ba8b5f661329c680e6456fb%26subscene%3D0">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Fri, 19 Jul 2024 20:54:00 +0800</pubDate>
    </item>
    <item>
      <title>“银狐”变&#34;隐狐&#34;,最新攻击透视</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzU2OTcxNjE4Mw==&amp;mid=2247485869&amp;idx=1&amp;sn=19e71de4295410a198fdb7c947e2ac2c</link>
      <description></description>
      <content:encoded><![CDATA[<p>
原创 <span>db</span> <span>2024-07-12 15:43</span> <span style="display: inline-block;">广东</span>
</p>

<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=b29f1f83&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2FXia34CufgojsvwZPGiaPHrKrz596MFY030FDuFlXbUCsicibYicX5B57QQmoo9Nf2oYKSUCMXldib54rQUICNns1iat9A%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<h2><strong><span style="font-size: 18px;">事件概述：</span></strong></h2><p><span style="font-size: 14px;">近期毒霸安全团队在日常威胁狩猎过程中发现”银狐“组织正利用搜索引擎推广广告页投递远控后门，该团伙在投放落地页时异常狡猾，这些下载页面<span style="font-size: 14px;letter-spacing: 0.578px;text-wrap: wrap;">只</span>会在特定时间，特定ip地域才会激活，其它时候无法打开或下载都是正常投放的推广包，且下载地址和页面域名基本每天都在更换，躲避审查和防止安全人员追踪分析。以下为其中一个投放页面。</span></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002200" data-ratio="0.55859375" data-s="300,640" data-type="png" data-w="1280" style="" src="https://wechat2rss.xlab.app/img-proxy/?k=b1f60b5d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojt3kO3mC3xBiaSpMXwib3CUsQnnicNDmFcHGbaoFzx9FJqCvHgdmyfs7VP66fVmlxDcbOiajedcZibCK9Q%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><span style="font-size: 14px;">下载后样本多以 &#34;安装包_xxx.exe&#34;,&#34;SETUP_xxx.exe&#34;命名，文件版本信息伪装多个知名软件信息且附加了无效的数字签名。在分析中发现该样本具备高度的隐蔽性、对抗性和复杂性，内部多层次内存加载，涉及各类模块和shellcode接近20个，且多个模块使用vmp加壳并对入口点和导出函数使用指令虚拟化保护，阻止安全人员分析。同时在杀软的特征扫描，模拟引擎，云查，主动防御方面都有规避措施，在技术上相较于先前的银狐样本又有了新的提升。下图为样本的整个攻击流程。</span></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002220" data-ratio="1.071512309495897" data-s="300,640" style="" data-type="png" data-w="853" src="https://wechat2rss.xlab.app/img-proxy/?k=3f9487df&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsvwZPGiaPHrKrz596MFY0309qz47gric85Wdxo0JGwkKQCWBN48gLjh2f2rQyTPdIEol44ickI3ticQw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><h2><strong><span style="font-size: 18px;">详细分析：</span></strong></h2><p><span style="font-size: 14px;">母体样本经过膨胀，大小在10~15M之间，膨胀方式有文件末尾附加数据填充0字节或”.data“区段填充</span></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002203" data-ratio="0.644880174291939" data-s="300,640" style="" data-type="png" data-w="918" src="https://wechat2rss.xlab.app/img-proxy/?k=ba76077e&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsvwZPGiaPHrKrz596MFY030jiadjTEnXcNibok1tupTFgERicgmXYBPPou60lXnoMrbfSfHMT9kx8OMA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><span style="font-size: 14px;">母体主要代码是分配可执行内存，执行内嵌的一段自解密shellcode。在shellcode中会使用多种方式检查自身是否运行在真实环境，并对ETW NtTraceEvent函数和AMSI AmsiScanBuffer函数进行patch。反调试方面使用GetTickCount64 和_rdtsc指令检查执行时间。以上检测到异常则退出运行。以下是对模拟环境或沙盒的检测部分。</span></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002204" data-ratio="1.422705314009662" data-s="300,640" style="" data-type="png" data-w="828" src="https://wechat2rss.xlab.app/img-proxy/?k=0b2605ef&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsvwZPGiaPHrKrz596MFY030BrIqpeW98leFfZHTPmxFYria3WIxTCmOnKPucBZlSyZHCgZysVa0XzQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><span style="font-size: 14px;">检测通过后会判断是否存在360相关杀软进程和窗口类名，如果存在则尝试投递线程消息关闭窗口，如果无法关闭会继续下载一组反杀软组件，针对国内主流的杀软。再无法关闭就会弹出窗口诱骗用户退出杀软。最后会下载后门远控组件运行。</span></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002202" data-ratio="0.29372623574144485" data-s="300,640" style="" data-type="png" data-w="1052" src="https://wechat2rss.xlab.app/img-proxy/?k=ec4fd2db&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsvwZPGiaPHrKrz596MFY030Kyg4MVocgx3W34oSI7zCtibdt1RGBX9Qe0ia7QdAMicD5KSJaLMPenq5g%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><h2><strong><span style="font-size: 18px;">反杀软组件分析：</span></strong></h2><p><span style="font-size: 14px;">首先需要获取一份组件下载链接配置表 ”https[:]//557o.oss-cn-hangzhou.aliyuncs[.]com/i.dat“ <span style="letter-spacing: 0.034em;">解密后得到后续需要下载文件的链接，如下图，这些存储链接有效期只有2~3天，新的链接会随着新样本的更新而更新。</span></span></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002201" data-ratio="0.41883116883116883" data-s="300,640" style="width: 492px;height: 206px;" data-type="png" data-w="616" src="https://wechat2rss.xlab.app/img-proxy/?k=3f1df916&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsvwZPGiaPHrKrz596MFY030ZYSgkl5uCYl40CAiaMcjOBpkEyHichUm04WVEAPOFf9Sk6IZVRPTkrzA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><span style="font-size: 14px;">下载这些文件具有特殊的结构，并且落地的文件会在特定偏移处填充随机值修改hash，这样每个用户每次下载的文件<span style="font-size: 14px;letter-spacing: 0.578px;text-wrap: wrap;">hash值</span>都不一致。在这些下载文件中大部分会使用如下两种加密文件格式，由文件头+加密payload+解密偏移+解密key组成，或搜索特定起始标记确定payload位置。解密方式使用末尾的key循环异或或者RC4算法。</span></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002206" data-ratio="0.7718120805369127" data-s="300,640" style="font-size: var(--articleFontsize);letter-spacing: 0.034em;text-align: center;width: 487px;height: 376px;" data-type="png" data-w="596" src="https://wechat2rss.xlab.app/img-proxy/?k=11daa0cf&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsvwZPGiaPHrKrz596MFY0309k1cMLTVn996ric01hPibyic6XwmZU4AAxcedPbGKOnb41eiane2LVJ8Pw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><span style="font-size: 14px;">文件下载完成后需要另外一个组件添加到计划任务执行。下载地址&#34;https[:]//557o.oss-cn-hangzhou.aliyuncs[.]com/s.jpg&#34;。“s.jpg”解密出一段shellcode，shellcode内嵌一个压缩后的PE模块，解压后在内存中加载，调用导出函数”RegisterTask“添加计划任务</span></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002210" data-ratio="1.1580578512396693" data-s="300,640" style="width: 578px;height: 669px;" data-type="png" data-w="968" src="https://wechat2rss.xlab.app/img-proxy/?k=c47fe756&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsvwZPGiaPHrKrz596MFY030tWSXJLsJZKl3Fn9gXef2hbZiayIhulGONDuZUicoEWkiaATCzJBvlSAcA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><span style="font-size: 14px;">与普通COM方式添加计划任务不同，此处通过RPC命名管道”ncacn_np:[\\pipe\\atsvc]“，再构建出需要添加计划任务的xml，直接调用底层API&#34;NdrClientCall3&#34; 发起调用添加计划任务，绕过一些AV或EDR对计划任务的拦截。计划任务在添加后立即执行，并且每分钟触发一次。被添加的反杀软组件是一组白+黑 但是exe和dll以及后续payload被分开在两个目录存放，所以在计划任务中设置工作目录在Pictures目录。</span></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002207" data-ratio="1.0110236220472442" data-s="300,640" style="" data-type="png" data-w="635" src="https://wechat2rss.xlab.app/img-proxy/?k=d9567266&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsvwZPGiaPHrKrz596MFY030b85mVlZtjFRpGGHmCGtZcTvibWuJRWytIWiczbKGMcicmf8dBTt6n3Oaw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><span style="font-size: 14px;">计划任务启动后会加载&#34;KOBDrvAPIIFFax.dll&#34;模块，该模块使用VMP加壳保护，并对入口点和导出函数使用指令虚拟化。模块加载后会读取“1.gif”并搜索特征“0x96 0x3B 0x47 0x5f 0x66”确定payload起始，使用RC4算法解密，key为：0xAFCDA6C9E7A22EAB。解密后的payload会覆盖当前主进程从OEP开始往下的代码，这样当模块全部加载完成后主进程的OEP得到执行时机。</span></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002209" data-ratio="0.4722222222222222" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=7be58d74&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsvwZPGiaPHrKrz596MFY030zib2dDUXNWnGwKqrEhf8SZRTUMgPx75uAs7djIHfT3xoAQeicJqVlibCg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><span style="font-size: 14px;">执行覆盖后的shellcode继续解密&#34;2.jpg&#34;，解出模块后内存加载并调用导出函数“run”执行，该模块依然是VMP保护，模块内部导出dll名“bp360.dll”，核心功能就是结束杀软进程。</span></p><p><span style="font-size: 14px;">方式1：下载驱动结束杀软。源于github项目“TrueSightKiller”，这是国外一款反恶意软件工具驱动，可以在内核结束指定pid的进程。由于没有有效的鉴权导致被滥用。下载地址“https[:]//557o.oss-cn-hangzhou.aliyuncs.com/s.dat”,解密后存放到&#34;C:\Windows\System32\drivers\torpl.sys&#34;路径下。驱动加载后会循环检测如下图杀软进程，发送控制码结束对应的进程。</span></p><p><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002208" data-ratio="0.7050290135396519" data-s="300,640" style="text-align: center;font-size: var(--articleFontsize);letter-spacing: 0.034em;" data-type="png" data-w="1034" src="https://wechat2rss.xlab.app/img-proxy/?k=792bedf3&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsvwZPGiaPHrKrz596MFY030GeoxqREz06NXRExpw0xlO30WicEgcwvPhBnxHFPwGDePpCyd08nnjIQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/><br/></p><p><span style="font-size: 14px;">方式2：在应用层实现，通过NtQuerySystemInformation枚举全局进程句柄寻找指定杀软进程的EPROCESS对象指针，判断拥有该指针的句柄的进程是否有进程读写权限，如果找到则构建一段shellcode注入指定进程(一般为系统关键进程)，并创建远程线程执行。这段shellcode在目标进程内用高权限打开杀软进程并调用TerminateProcess结束进程。</span></p><p><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002215" data-ratio="0.5010504201680672" data-s="300,640" style="text-align: center;font-size: var(--articleFontsize);letter-spacing: 0.034em;" data-type="png" data-w="952" src="https://wechat2rss.xlab.app/img-proxy/?k=ae065624&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsvwZPGiaPHrKrz596MFY0304Bdic5g8iaicic8vXcLiaubJ5SOGTZ6SttsQEnbdsS5Z3A5rTiaJXaleuKpg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><h2><strong><span style="font-size: 18px;">后门组件分析：</span></strong></h2><p><span style="font-size: 14px;">在上步完成后开始下载后门组件，与前面一致先下载一份配置表 ”https[:]//3o6.oss-cn-beijing.aliyuncs[.]com/f.dat&#34;,解密后得到后续需要下载文件的链接，如下图，与上文一致下载文件落地全部会更改hash。</span></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002211" data-ratio="0.4185667752442997" data-s="300,640" style="" data-type="png" data-w="614" src="https://wechat2rss.xlab.app/img-proxy/?k=90e24505&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsvwZPGiaPHrKrz596MFY030F0aNy0iaa5GYtpY64u3ZoUGCyIBHxnw4icJqp8RLVMGyLBnta3D3YvrQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><span style="font-size: 14px;">dPE4LV.exe 和hpbcfgui.dll是一组白+黑利用，其中dPE4LV.exe是惠普某打印机驱动组件，具有有效数字签名，hpbcfgui.dll被vmp壳保护。为了保证文件填充随机数后数字签名仍然有效，数字签名区段被扩充，随机值被填充在此区域。证书区段设置了一个标记“0xFB 0xAD 0xFC 0xEF 0xFE 0xCF 0xDA 0xBF” 此标记前两字节填充随机数，此标记后的数据是隐藏的加密shellcode。hpbcfgui.dll被加载后会解密该区域的shellcode执行，加密算法RC4密钥:&#34;9`MGQm6NNijRond&#34;。</span></p><p><span style="font-size: 14px;">shellcode执行后继续解密“log.src”文件，解密出的模块依然是vmp保护模块，该模块内部导出dll名“S.dll”。内存加载后调用导出函数CLRCreateInstance执行。</span></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002213" data-ratio="0.4701492537313433" data-s="300,640" style="" data-type="png" data-w="1072" src="https://wechat2rss.xlab.app/img-proxy/?k=a42a7cd1&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsvwZPGiaPHrKrz596MFY030arYKellFN9FmuK1laJ1Q1MUiccjp7sTv7BmFPqbDqrHNHB7pZDzqHCw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><span style="font-size: 14px;">“S.dll”模块中包含上文中的绝大部分反杀软功能，此外还包括注册表禁用UAC，添加到Windows Defend排除目录，拷贝自身目录文件添加计划任务和利用重启管理器结束“360tray.exe”进程。</span></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002212" data-ratio="0.36666666666666664" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=d9467363&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsvwZPGiaPHrKrz596MFY030jTYylhV4LxhHmiaQJiaK36KsGMMPjicTE5zSND2icomxopLH0cjEVogJlA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><span style="font-size: 14px;">最后解密“utils.vcxproj” 文件，解密出的模块是Gh0st变种远控后门</span><span style="font-size: 14px;letter-spacing: 0.034em;">，</span><span style="font-size: 14px;letter-spacing: 0.034em;">并在内存中加载调用导出函数edge执行。</span><span style="font-size: 14px;letter-spacing: 0.034em;">与使用主控端直接在生成后门时填充地址不同的是，此处把上线地址配置化了，读取“utils.vcxproj” 文件头部中指定偏移处的C2填充到远控中特定位置。</span><span style="font-size: 14px;letter-spacing: 0.034em;">使用IP+域名双上线方式, &#34;47.76.172.225:7000&#34; 和&#34;rasewx[.]net:7073&#34;</span></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002214" data-ratio="0.4934010152284264" data-s="300,640" style="" data-type="png" data-w="985" src="https://wechat2rss.xlab.app/img-proxy/?k=2735a19c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsvwZPGiaPHrKrz596MFY030ictZzk3lDE3THP9lZHuVhgyyOpxdFtqxIib3GqvGaIoJib5N3IWfgAIicQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><h2><strong><span style="font-size: 18px;">总结</span></strong></h2><p><span style="font-size: 14px;">在本次深入分析中，我们全面揭示了该黑产组织的攻击策略、规避手段及其对抗杀毒软件的能力。显然该组织在技术层面已经展现出与高级持续性威胁（APT）相当的攻击能力。从搜索页面SEM投放直至攻击行为，以及对抗杀毒软件的全过程，均显示出背后有专业技术支持团队。在攻防战中“知己知彼,百战不殆”，安全厂商与该组织的较量也将会长期持续。我们强烈建议广大用户和企业提高网络安全意识，通过官方渠道下载应用，避免运行未知程序，从而保护自身数据安全。</span></p><p><span style="font-size: 14px;"><br/></span></p><h2><strong><span style="font-size: 18px;">IOC</span></strong></h2><p><span style="font-size: 14px;">df2f4aad13fb6d08332e09fd47cd0c98</span></p><p><span style="font-size: 14px;">f1b23b111e25b07d395e489c52eeeb40</span></p><p><span style="font-size: 14px;">https[:]//557o.oss-cn-hangzhou.aliyuncs[.]com</span></p><p><span style="font-size: 14px;">https[:]//3o6.oss-cn-beijing.aliyuncs[.]com</span></p><p><span style="font-size: 14px;">47.76.172.225</span></p><p><span style="font-size: 14px;">103.207.167.4</span></p><p><span style="font-size: 14px;">rasewx.net</span></p><p><br/></p><p><br/></p><p><br/></p><p style="display: none;"><mp-style-type data-value="3"></mp-style-type></p>



<p><a href="2247485869">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=1d2171ad&amp;r=1&amp;u=https%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzU2OTcxNjE4Mw%3D%3D%26mid%3D2247485869%26idx%3D1%26sn%3D19e71de4295410a198fdb7c947e2ac2c%26subscene%3D0">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Fri, 12 Jul 2024 15:43:00 +0800</pubDate>
    </item>
    <item>
      <title>捆绑陷阱：警惕仿冒软件的远控威胁</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzU2OTcxNjE4Mw==&amp;mid=2247485845&amp;idx=1&amp;sn=1a66f4dd4c9fbe2d585fa706293a057d</link>
      <description>近期，鹰眼情报中心监测到一批通过仿冒&#34;快连VPN&#34;的恶意安装包攻击事件。</description>
      <content:encoded><![CDATA[<p>
原创 <span>aw</span> <span>2024-05-21 17:49</span> <span style="display: inline-block;">广东</span>
</p>

<p>近期，鹰眼情报中心监测到一批通过仿冒"快连VPN"的恶意安装包攻击事件。</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=7547a193&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2FXia34CufgojuCPGFxgHbTDYQgdTEonHbChribKmFrBpHEwupPtNiam98FDZfFRFkrzV8acOgolYzOxMib6FvHEvJYA%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p><strong><span style="font-size: 20px;">事件概述</span></strong></p><section style="text-indent: 2em;"><span style="text-indent: 2em;letter-spacing: 0.034em;font-size: 17px;">近期，鹰眼情报中心监测到一批通过仿冒&#34;快连VPN&#34;的恶意安装包攻击事件。攻击者将恶意模块和正常软件捆绑在一起，伪装成正常软件并通过仿冒网站、下载站等方式传播，同时通过在搜索引擎投递广告扩大仿冒网站的传播范围。用户执行携带恶意模块的安装包后，便会被攻击者下发远控模块和命令，执行关闭杀毒软件操作，获取QQ、Telegram软件信息，对用户电脑进行鼠标、键盘、剪贴板等进行全面监控和窃密。</span></section><p><br/></p><p><strong><span style="font-size: 20px;">流程分析</span></strong></p><section style="text-indent: 2em;"><span style="font-size: 17px;">安装包运行后会先释放正常的原始软件并运行，然后释放第一组白(YP.exe)加黑(zf_cef.dll)，zf_cef.dll从服务器(<a href="https://14-22a.oss-cn-beijing.aliyuncs[.]com)拉取多个文件，其中包括第二组白(KU.exe)加黑(KwModConfig.dll)和tgp_gamead.exe。tgp_gamead.exe是WeGame的一个模块，该模块运行时一些杀软为了兼容性会退出部分防御功能，因此攻击者利用此机制结合其它手段来强制关闭杀毒软件。" target="_blank">https://14-22a.oss-cn-beijing.aliyuncs[.]com)拉取多个文件，其中包括第二组白(KU.exe)加黑(KwModConfig.dll)和tgp_gamead.exe。tgp_gamead.exe是WeGame的一个模块，该模块运行时一些杀软为了兼容性会退出部分防御功能，因此攻击者利用此机制结合其它手段来强制关闭杀毒软件。</a></span></section><section style="text-indent: 2em;"><span style="font-size: 17px;">KwModConfig.dll是一个Loader，从自身数据中解密出攻击载荷(.dll)并加载，该攻击载荷是一个gh0st变种，可以和远程服务器交互，获取主机硬件信息、系统版本等，且具有剪贴板窃密、控制鼠标、监控键盘等功能。该攻击载荷还会释放&#34;QAssist.sys&#34;驱动文件，注册服务并启动，&#34;QAssist.sys&#34;主要用来隐藏攻击过程中生成的文件、注册表项和值。</span></section><p><img class="rich_pages wxw-img" data-imgfileid="100002182" data-ratio="1.28134110787172" style="width: 578px;height: auto;" data-type="png" data-w="686" src="https://wechat2rss.xlab.app/img-proxy/?k=bbc92725&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuCPGFxgHbTDYQgdTEonHbCtQxJ0ib3Xd8KBc2QOxoD4TvRocGWdlHFy6qDuwAoa4oAEdcGlx0ibf8w%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><br/></p><h3><span style="font-size: 20px;"><strong>详细分析</strong></span></h3><section style="text-indent: 2em;"><span style="font-size: 17px;">恶意安装包释放白(YP.exe)加黑(zf_cef.dll)，YP.exe是一个正常文件，该文件启动后会加载zf_cef.dll，攻击者利用此机制，使用黑模块替换了正常的 zf_cef.dll，通过白文件进程加载黑文件模块的方式规避杀软的主动防御。</span></section><p><img class="rich_pages wxw-img" data-height="121" data-imgfileid="100002183" data-ratio="0.16759002770083103" data-width="722" data-type="png" data-w="722" src="https://wechat2rss.xlab.app/img-proxy/?k=bea5d64a&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuCPGFxgHbTDYQgdTEonHbCFZjlh3604UcdufdphsYojcJAibiagt6lrGvbaHmYxnhgSU2pPpOwP6pg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><br/></p><section style="text-indent: 2em;"><span style="font-size: 17px;">zf_cef.dll是64位程序，通过导出函数&#34;cef_api_hash&#34;执行恶意代码。&#34;cef_api_hash&#34;被调用后会从远程服务器(<a href="https://14-22a.oss-cn-beijing.aliyuncs[.]com)下载多个文件到本地。下载的文件主要分为两个部分，第一部分是单独的文件Client.exe。第二部分是一组白加黑文件，白文件是有" target="_blank">https://14-22a.oss-cn-beijing.aliyuncs[.]com)下载多个文件到本地。下载的文件主要分为两个部分，第一部分是单独的文件Client.exe。第二部分是一组白加黑文件，白文件是有</a>&#34;BEIJING KUWO TECHNOLOGY CO.,LTD.&#34;签名的KU.exe和依赖的DLL，黑文件是KwModConfig.dll。</span></section><p><img class="rich_pages wxw-img" data-height="364" data-imgfileid="100002184" data-ratio="0.4631043256997455" data-width="786" data-type="png" data-w="786" src="https://wechat2rss.xlab.app/img-proxy/?k=f1db41c8&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuCPGFxgHbTDYQgdTEonHbClJrEsgPKVG5Zhjia9MsR0Z7GAj24BjHyhm3dbbXKUKI58hxFmagJUUA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><br/></p><section style="text-indent: 2em;"><span style="font-size: 17px;">下图是zf_cef.dll下载的部分文件信息。</span></section><p><img class="rich_pages wxw-img" data-height="161" data-imgfileid="100002185" data-ratio="0.16180904522613065" data-width="995" data-type="png" data-w="995" src="https://wechat2rss.xlab.app/img-proxy/?k=bcf8abcb&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuCPGFxgHbTDYQgdTEonHbCK81xoFhJn4sdPXKyj2lvTPdTibEWmkRfP2ibpxZwzHiaavXKcLHlVq0dg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><br/></p><section style="text-indent: 2em;"><span style="font-size: 17px;">zf_cef.dll下载文件成功后首先运行Client.exe，该文件的原始文件名为&#34;tgp_gamead.exe&#34;，是WeGame的一个模块。一些杀毒软件会对游戏运行做兼容，在Client.exe运行后退出部分防御功能，攻击者利用此机制削弱杀软的防护能力。</span></section><p><img class="rich_pages wxw-img" data-height="45" data-imgfileid="100002186" data-ratio="0.062154696132596686" data-width="724" data-type="png" data-w="724" src="https://wechat2rss.xlab.app/img-proxy/?k=0aeb1a3e&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuCPGFxgHbTDYQgdTEonHbCeFnmhDBiblm1F2oqGnduviczVpwIjKopH9dbsib4h00qlGASic9fzS8Dpg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><br/></p><section style="text-indent: 2em;"><span style="font-size: 17px;">zf_cef.dll运行Client.exe后开始遍历内置的杀软进程名单，同时遍历当前系统中的进程，匹配到杀软进程后在当前系统寻找可利用的系统进程，之后会注入ShellCode到系统进程，并创建远程线程执行ShellCode来关闭杀软。到此zf_cef.dll的主要功能执行完毕，接下来就是运行第二组白加黑，然后zf_cef.dll会循环执行下图的关闭杀毒软件操作。</span></section><p><img class="rich_pages wxw-img" data-height="790" data-imgfileid="100002187" data-ratio="0.7027777777777777" data-width="1124" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=dbfe67ea&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuCPGFxgHbTDYQgdTEonHbCxPxyrEEeKK9zFHSwvUg4jwqJ2ua5M2Azz2rCHsSU4Sib2YmEorWRMHQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><br/></p><section style="text-indent: 2em;"><span style="font-size: 17px;">第二组白(KU.exe)加黑(KwModConfig.dll)，KU.exe只用来调用黑模块，除此之外没有其它作用。KwModConfig.dll是32位程序，从自身数据段中解密出新的攻击载荷(.dll)并加载，下图是解密代码和解密前后的数据。</span></section><p><img class="rich_pages wxw-img" data-height="525" data-imgfileid="100002188" data-ratio="0.5043227665706052" data-width="1041" data-type="png" data-w="1041" src="https://wechat2rss.xlab.app/img-proxy/?k=b8e77dfa&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuCPGFxgHbTDYQgdTEonHbCkYvjqaKhfIutJS4Z9GiaQFz0OkiaTUk1HO52IvZaqozKicsxPUmT0SiaUg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><br/></p><section style="text-indent: 2em;"><span style="font-size: 17px;">解密出来的攻击载荷是一个32位Dll，是gh0st的变种，恶意代码在导出函数&#34;Shellex&#34;中，该模块和服务端&#34;14.128.50.22&#34;通信，接收远控指令。</span></section><section style="text-indent: 2em;"><span style="font-size: 17px;">下图是该模块的控制码和功能表(部分)。 </span></section><p><img class="rich_pages wxw-img" data-height="882" data-imgfileid="100002189" data-ratio="1.1682119205298014" data-width="755" data-type="png" data-w="755" src="https://wechat2rss.xlab.app/img-proxy/?k=58514cd4&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuCPGFxgHbTDYQgdTEonHbCibg9gl4ebHqjvQEvtBU1aESkUZ5TMNk2JMiajuv2nloVelULGlcpOdsA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><br/></p><section style="text-indent: 2em;"><span style="font-size: 17px;">下图是攻击载荷收集主机信息的代码。包括获取系统版本信息、用户公网IP、CPU频率和处理器数量、物理内存大小、可用磁盘大小、网卡的速率、系统架构、杀软进程id、Telegram进程id、QQ号等信息，并发送到服务端。</span></section><p><img class="rich_pages wxw-img" data-height="1124" data-imgfileid="100002190" data-ratio="1.4673629242819843" data-width="766" data-type="png" data-w="766" src="https://wechat2rss.xlab.app/img-proxy/?k=f104f931&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuCPGFxgHbTDYQgdTEonHbCUTQzKFwf0zCKOsP9miaWNrwibiaTsWXZ12vZD7f1bIicUlZRgV5jufHadA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><br/></p><section style="text-indent: 2em;"><span style="font-size: 17px;">判断当前系统版本，决定释放32位或者64位的驱动文件，64位系统下从自身数据段释放驱动文件到&#34;C:\Windows\System32\drivers\QAssist.sys&#34;，为<span style="letter-spacing: 0.578px;text-indent: 34px;text-wrap: wrap;">驱动</span>文件创建服务&#34;QAssist&#34;并写入服务的配置到注册表中，该服务的启动方式为跟随系统启动。</span></section><p><img class="rich_pages wxw-img" data-height="530" data-imgfileid="100002191" data-ratio="0.7350901525658807" data-width="721" data-type="png" data-w="721" src="https://wechat2rss.xlab.app/img-proxy/?k=778f56f3&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuCPGFxgHbTDYQgdTEonHbCqhcSMKh6RovZt4LIDtsw8VVcZXOLPAAayul68dXadDRg3hJic7hVahA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><br/></p><section style="text-indent: 2em;"><span style="font-size: 17px;">在QAssist.sys 中发现pdb路径&#34;F:\hidden-master\Debug\QAssist.pdb&#34;，经过比对我们认为QAssist.sys修改自开源项目&#34;hidden&#34;，该项目可以隐藏注册表项和值、隐藏文件和目录、保护进程，在本次攻击活动中被用来隐藏恶意文件、注册表。</span></section><section style="text-indent: 2em;"><span style="font-size: 17px;">下图左侧是项目&#34;hidden&#34;的开源代码，右侧是攻击者修改后的代码，流程和代码逻辑基本一致。</span></section><p><img class="rich_pages wxw-img" data-height="924" data-imgfileid="100002192" data-ratio="0.8222222222222222" data-width="1124" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=6e72b599&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuCPGFxgHbTDYQgdTEonHbCfJcJbgQaRgAjoDtYEkROJO6LqMLmsFZbmzJQGfDiaicFrSrfGx558RZQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><br/></p><h3><strong><span style="font-size: 20px;">总结</span></strong></h3><section style="text-indent: 2em;"><span style="font-size: 17px;">该攻击者利用多重白加黑，一层层加载恶意模块，同时利用杀毒软件的兼容性机制结合其它手段来关闭杀软，在攻击载荷中不仅收集主机系统信息，还可以针对QQ等聊天软件窃密，给用户的信息安全带来巨大安全威胁。</span></section><section style="text-indent: 2em;"><span style="font-size: 17px;">仿冒软件捆绑恶意模块的方式现在已经很常见，针对的是网络安全意识薄弱的人群，面对真假难辨的钓鱼网站、与原版软件相差无几的恶意安装包，点击安装带来的就是攻击者的监视和个人隐私的泄露。我们对此类攻击事件的防范建议：去官网下载软件，下载文件时仔细核对文件来源，不要点击不明来源的下载链接，提高识别钓鱼网站的能力，安装杀毒软件并及时处理病毒威胁。</span></section><p><img class="rich_pages wxw-img" data-height="557" data-imgfileid="100002193" data-ratio="0.6979949874686717" data-width="798" data-type="png" data-w="798" src="https://wechat2rss.xlab.app/img-proxy/?k=1826d0b0&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuCPGFxgHbTDYQgdTEonHbCiarexLJUG6JhQeSqf3XY9OdyibZrrjXuFribzYxeia9TibbDSvfUyqWp5Bg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><br/></p><h3><strong><span style="font-size: 20px;">IOC</span></strong></h3><h4><span style="font-size: 17px;"><strong>MD5</strong></span></h4><p><span style="font-size: 17px;">55AC90618D7D966C9DBAC56918669028</span></p><p><span style="font-size: 17px;">52EA01A560C104A2BFE5873051C2CA04</span></p><p><span style="font-size: 17px;">0D92B5F7A0F338472D59C5F2208475A3</span></p><p><span style="font-size: 17px;">4E34C068E764AD0FF0CB58BC4F143197</span></p><h4><span style="font-size: 17px;"><strong>C2</strong></span></h4><p><span style="font-size: 17px;">14.128.50.22</span><span style="letter-spacing: 0.034em;"></span></p><p><a href="https://14-22a.oss-cn-beijing.aliyuncs[.]com/zishiying.dll" target="_blank">https://14-22a.oss-cn-beijing.aliyuncs[.]com/zishiying.dll</a></p><p><a href="https://14-22a.oss-cn-beijing.aliyuncs[.]com/qqwbclient.dll" target="_blank">https://14-22a.oss-cn-beijing.aliyuncs[.]com/qqwbclient.dll</a></p><p><a href="https://14-22a.oss-cn-beijing.aliyuncs[.]com/ccenter.dll" target="_blank">https://14-22a.oss-cn-beijing.aliyuncs[.]com/ccenter.dll</a></p><p><a href="https://14-22a.oss-cn-beijing.aliyuncs[.]com/dns2.dll" target="_blank">https://14-22a.oss-cn-beijing.aliyuncs[.]com/dns2.dll</a></p><p><a href="https://14-22a.oss-cn-beijing.aliyuncs[.]com/DuiLib.dll" target="_blank">https://14-22a.oss-cn-beijing.aliyuncs[.]com/DuiLib.dll</a></p><p><a href="https://14-22a.oss-cn-beijing.aliyuncs[.]com/KwHttp.dll" target="_blank">https://14-22a.oss-cn-beijing.aliyuncs[.]com/KwHttp.dll</a></p><p><a href="https://14-22a.oss-cn-beijing.aliyuncs[.]com/KwHttpRequestMgr.dll" target="_blank">https://14-22a.oss-cn-beijing.aliyuncs[.]com/KwHttpRequestMgr.dll</a></p><p><a href="https://14-22a.oss-cn-beijing.aliyuncs[.]com/KwLib.dll" target="_blank">https://14-22a.oss-cn-beijing.aliyuncs[.]com/KwLib.dll</a></p><p><a href="https://14-22a.oss-cn-beijing.aliyuncs[.]com/KwLog.dll" target="_blank">https://14-22a.oss-cn-beijing.aliyuncs[.]com/KwLog.dll</a></p><p><a href="https://14-22a.oss-cn-beijing.aliyuncs[.]com/KwMusicCore.dll" target="_blank">https://14-22a.oss-cn-beijing.aliyuncs[.]com/KwMusicCore.dll</a></p><p><a href="https://14-22a.oss-cn-beijing.aliyuncs[.]com/libcurl.dll" target="_blank">https://14-22a.oss-cn-beijing.aliyuncs[.]com/libcurl.dll</a></p><p><a href="https://14-22a.oss-cn-beijing.aliyuncs[.]com/msvcp120.dll" target="_blank">https://14-22a.oss-cn-beijing.aliyuncs[.]com/msvcp120.dll</a></p><p><a href="https://14-22a.oss-cn-beijing.aliyuncs[.]com/msvcr120.dll" target="_blank">https://14-22a.oss-cn-beijing.aliyuncs[.]com/msvcr120.dll</a></p><p><a href="https://14-22a.oss-cn-beijing.aliyuncs[.]com/Zlib.dll" target="_blank">https://14-22a.oss-cn-beijing.aliyuncs[.]com/Zlib.dll</a></p><p><a href="https://14-22a.oss-cn-beijing.aliyuncs[.]com/KwModConfig.dll" target="_blank">https://14-22a.oss-cn-beijing.aliyuncs[.]com/KwModConfig.dll</a><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;"></span></p><p style="display: none;"><mp-style-type data-value="3"></mp-style-type></p>



<p><a href="2247485845">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=895d59a5&amp;r=1&amp;u=https%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzU2OTcxNjE4Mw%3D%3D%26mid%3D2247485845%26idx%3D1%26sn%3D1a66f4dd4c9fbe2d585fa706293a057d%26subscene%3D0">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Tue, 21 May 2024 17:49:00 +0800</pubDate>
    </item>
    <item>
      <title>&#34;树狼&#34;来袭，针对企事业单位的新攻击</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzU2OTcxNjE4Mw==&amp;mid=2247485828&amp;idx=1&amp;sn=97f30a445529ff70c72371fac89080fa</link>
      <description>&#34;树狼&#34;来袭，针对企事业单位的新攻击</description>
      <content:encoded><![CDATA[<p>
<span></span> <span>2024-01-26 11:58</span> <span style="display: inline-block;">广东</span>
</p>

<p>"树狼"来袭，针对企事业单位的新攻击</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=ec91221f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2FXia34CufgojtclBAbaict1mH8xE3KbaQeOF6yPt023aCxBictsZl84n3ib9XExOSQUtHF4C2oE66uU4d5DLMPPnERg%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<h2><strong><span style="font-size: 24px;">事件概述</span></strong></h2><p>近期毒霸安全团队监测到一系列通过社交软件和电子邮件传播的税务、医疗保险等相关钓鱼链接，或文档的攻击活动，攻击者使用hfs搭建文件存储服务，存放钓鱼文档和后阶段PayLoad。诱导用户点击下载后的文档中的链接。</p><p><img class="rich_pages wxw-img" data-imgfileid="100002166" data-ratio="0.6342592592592593" data-w="1080" data-type="png" src="https://wechat2rss.xlab.app/img-proxy/?k=20f7aaca&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojtclBAbaict1mH8xE3KbaQeOicDic8VnwkwHboamoPTHz1RDLxicdIdLu7U3VBxdKuD2v4FicIiaqtHxA4A%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p>通过hfs页面的点击次数可以看出受影响用户广泛，以下是我们近期监测到近期树狼远控攻击活动趋势，首次发现于2023年11月中旬，根据其pdb名称命名为”树狼“。</p><p><span data-lark-record-data="{&#34;rootId&#34;:&#34;Ux5BdBTLNoiu1Jx8ppbcdb4qnQd&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;通过hfs页面的点击次数可以看出受影响用户广泛，以下是我们近期监测到近期树狼远控攻击活动趋势，首次发现于2023年11月中旬，根据其pdb名称命名为”树狼“&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+y*1+1*0+1*1+2*0+11*1+2*0+1&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006010576289796&#34;],&#34;1&#34;:[&#34;author&#34;,&#34;7079005927596097537&#34;]},&#34;nextNum&#34;:2}},&#34;type&#34;:&#34;text&#34;,&#34;referenceRecordMap&#34;:{},&#34;extra&#34;:{&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;isFromCode&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:189,&#34;type&#34;:&#34;text&#34;,&#34;selection&#34;:{&#34;start&#34;:0,&#34;end&#34;:78},&#34;recordId&#34;:&#34;KfwZduMkgouIm5x7Rg4ccSzPnYb&#34;}],&#34;payloadMap&#34;:{},&#34;isCut&#34;:false}" data-lark-record-format="docx/text"><img class="rich_pages wxw-img" data-imgfileid="100002167" data-ratio="0.4861111111111111" data-w="1080" data-type="png" src="https://wechat2rss.xlab.app/img-proxy/?k=00da097f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojtclBAbaict1mH8xE3KbaQeOXDrXsaDia00uIqV7KQBwJ7aKghVrejVZ8aJrwoYiahlnIZFxF5homM6g%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></span></p><p><br/></p><h2><strong><span style="font-size: 24px;">执行流程</span></strong></h2><p>用户下载后的文件一般以&#34;查询端口-客户端&#34;，&#34;查询入口&#34;，&#34;电脑端查询入口&#34;等命名，并伪装WinRAR的图标，诱导用户执行。当用户执行后将会联网拉取&#34;树狼&#34;远控模块，这是一种基于gh0st的远控变种，后在内存加载执行，后续远控端操作人员会根据目标下发多个功能插件模块进行定向攻击。</p><p><span data-lark-record-format="docx/record"><img class="rich_pages wxw-img" data-imgfileid="100002169" data-ratio="0.8186440677966101" data-w="590" data-type="png" src="https://wechat2rss.xlab.app/img-proxy/?k=60692af5&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojtclBAbaict1mH8xE3KbaQeONJM2hrvialiaC1JyCQFfyHUNVSeg1HibhACq8XuFGRuZIOqwYSric6qMAg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></span></p><p><br/></p><h2><strong><span style="font-size: 24px;">详细分析</span></strong></h2><p>该样本使用MFC编写，仅在对话框初始化函数中加入了少量的代码以降低被查杀的概率，启动后无界面显示，创建线程使用TCP连接到206.238.220.90:16037，连接后发送HEX &#34;33 32 00&#34;后，使用recv进行接收一段Shellcode并调用。</p><p><img class="rich_pages wxw-img" data-height="321" data-imgfileid="100002170" data-ratio="0.5836363636363636" data-width="550" data-type="png" data-w="550" src="https://wechat2rss.xlab.app/img-proxy/?k=58da70fd&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojtclBAbaict1mH8xE3KbaQeOAmQT6vqTTdnM9va8HVupKIuuZ7rNPXk6qAmyiag0BQ9Hnzx0xvFfNgA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p>接收的ShellCode中含有一个dll文件，在执行到shellcode后，使用内存加载，该dll在内存中加载起来，最终调用dll的<span style="letter-spacing: 0.578px;">导出</span><span style="letter-spacing: 0.578px;">函数</span>&#34;run&#34;。pdb全路径为：&#34;D:\HPWolftree+验证\Plugins\Release\online.pdb&#34;。</p><p><img class="rich_pages wxw-img" data-height="160" data-imgfileid="100002171" data-ratio="0.2841918294849023" data-width="563" data-type="png" data-w="563" src="https://wechat2rss.xlab.app/img-proxy/?k=11fc778e&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojtclBAbaict1mH8xE3KbaQeOdFlZHI9sa4q5MTTbdicTX7x9rJ2tk7vJpGwSqf8NWDIwoANRYkUa7cA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p>在run导出函数内，攻击者根据判断启动参数，准备了两个分支。</p><p style="text-align: left;">在无参数分支中将自身文件复制到 %USERPROFILE%\Documents\msedge.exe 中，并将系统文件的 %SystemRoot%\System32\msiexec.exe 复制到 %PROGRAMFILES%\msiexec.exe，利用系统文件msiexec本身也会合法进行加载其他模块的特性，以试图逃避用户和安全系统的检测。最终使用&#34; -Puppet&#34;参数进行运行并挂起进程，使用 APC 早鸟注入把 msiexec 变为傀儡进程，注入的shellcode执行后会进行自反射加载执行。</p><p><img class="rich_pages wxw-img" data-height="423" data-imgfileid="100002172" data-ratio="0.46179039301310043" data-width="916" data-type="png" data-w="916" src="https://wechat2rss.xlab.app/img-proxy/?k=6cb83d3c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojtclBAbaict1mH8xE3KbaQeOFK7g94HO6KLGGgfPXUmib9ABRLiccKicvy97uuk92ZoP0oZEwfziaKWbAQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p>此外run函数内会进行调用打开常见的杀毒软件进程，并对其的程序Token权限进行降权，后对杀软进程中的所有线程投递WM_QUIT信息，尝试关闭以规避杀毒软件的监控。</p><p><img class="rich_pages wxw-img" data-height="1100" data-imgfileid="100002173" data-ratio="1.103309929789368" data-width="997" data-type="png" data-w="997" src="https://wechat2rss.xlab.app/img-proxy/?k=6d325d67&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojtclBAbaict1mH8xE3KbaQeO5YIgtdSibMSpkayt3ia8ia3TybZSR5pz2vJiamauB496Yza8oyEWNMc0ew%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p>添加注册表开启启动项&#34;IsSystemUpgradeComponentRegistered&#34;，项内容为：&#34;%USERPROFILE%\Documents\msedge.exe&#34; 以实现持久化。</p><p><img class="rich_pages wxw-img" data-height="621" data-imgfileid="100002174" data-ratio="0.36203703703703705" data-width="1716" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=b6a906ae&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojtclBAbaict1mH8xE3KbaQeOJnKEOJwHL5UYt6auKYRhSRPp6uMDmdx8cQn2BjJn0icwWCrtNrib3Yng%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p>当在被早鸟注入的 msiexec.exe 执行后，与前文提到的shellcode加载dll执行流程相同，不同点在于此次运行时会根据参数为&#34; -Puppet&#34;而进入远控加载的逻辑，上线地址同样为：206.238.220.90:16037，在上线后访问 &#34;<a href="http://whois.pconline.com.cn/ipJson.jsp" target="_blank">http://whois.pconline.com.cn/ipJson.jsp</a>&#34; 获取本机外网ip发送给服务器，后续会循环等待攻击发送的控制指令和模块。根据我们的内存防护监测还发现下发了以下模块：&#34;Dialogbar&#34;, &#34;File&#34;, &#34;HideScreen&#34;, &#34;List&#34;, &#34;online&#34;, &#34;Screen&#34;, &#34;shell&#34;, &#34;System&#34;, &#34;Tools&#34;等，对应键盘监听，文件监控，屏幕监控，Shell命令执行等攻击模块。</p><p><img class="rich_pages wxw-img" data-height="843" data-imgfileid="100002175" data-ratio="0.7148148148148148" data-width="1179" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=38bb54c7&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojtclBAbaict1mH8xE3KbaQeO2I0pertYVBuUq0SedKw2fwywbOiaWZZkUO58KxsWbq4J0uI2smmesnQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><p><span data-lark-record-format="docx/record"></span></p><h1><strong><span style="font-size: 24px;">总结</span></strong></h1><p>如今在复杂的网络环境下，网络钓鱼攻击不断增加和本身不断演变的性质，钓鱼手段也越来越真实和有针对性。利用压缩软件的图标吸引用户打开，并利用系统的机制攻击杀毒软件。目前这些钓鱼攻击策略的隐蔽性和多样性提醒大家，作为网络用户保持警惕和提高安全意识至关重要。我们也建议用户采取必要的预防措施，比如定期更新软件、避免打开不明链接和附件，目前毒霸已支持查杀。</p><p><img class="rich_pages wxw-img" data-height="556" data-imgfileid="100002176" data-ratio="0.6958698372966208" data-width="799" data-type="png" data-w="799" src="https://wechat2rss.xlab.app/img-proxy/?k=bbafc92f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojtclBAbaict1mH8xE3KbaQeOAkVEoob3ueXYMdLTPN35jv51WF8K74HagibSsMvibOjGOT3ibfML37E4g%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></p><h2><span style="font-size: 20px;"><strong>IOCs</strong><strong>(部分)</strong></span></h2><p>A3FD043C364D24FCE08095727AE115D0</p><p>E6A868C16B8CB2B7690D5ABB0486D7B8</p><p>9D5B13ECA172701C0F84EBC2D2CC2DBE</p><p>A68DA897C3A7AC8FF432170FF816DA27</p><p>206.238.220.90</p><p>https[:]//instq.libabacloud.com</p><p>http[:]//fyp-cn-jiagang.zxnaea.com:8002</p><p>https[:]//instq.libabacloud.com/</p><p>http[:]//fyp-cn-jiagang.zxnaea.com:8002/</p><p>http[:]//154.39.251.128/</p><p>http[:]//fdgdf.xyz:808/</p><p>http[:]//liutaoqpod.com:808/</p><p><span data-lark-record-format="docx/record"></span></p><p><br/></p><p><br/></p><p style="display: none;"><mp-style-type data-value="3"></mp-style-type></p>



<p><a href="2247485828">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=ded4d06e&amp;r=1&amp;u=https%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzU2OTcxNjE4Mw%3D%3D%26mid%3D2247485828%26idx%3D1%26sn%3D97f30a445529ff70c72371fac89080fa%26subscene%3D0">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Fri, 26 Jan 2024 11:58:00 +0800</pubDate>
    </item>
    <item>
      <title>Higaisa 组织近期活动分析，利用仿冒页面进行钓鱼攻击</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzU2OTcxNjE4Mw==&amp;mid=2247485811&amp;idx=1&amp;sn=4687ee21c8cf7693ce58ba8e880b68c7</link>
      <description>近期，毒霸安全团队留意到 Cyble 研究情报实验室最新发布的 Higaisa APT 威胁活动报告，并通过鹰眼威胁情报中心又发现了该组织的其他多个钓鱼活动。</description>
      <content:encoded><![CDATA[<p>
原创 <span>Mo</span> <span>2023-12-06 17:58</span> <span style="display: inline-block;">广东</span>
</p>

<p>近期，毒霸安全团队留意到 Cyble 研究情报实验室最新发布的 Higaisa APT 威胁活动报告，并通过鹰眼威胁情报中心又发现了该组织的其他多个钓鱼活动。</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=9a24cee3&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2FXia34CufgojsCty76kO2FGOaXyIB2HuZ3WTk1IiaLRXGT8LMYFXxavpVV3XRxNut4g5ic10gbAN1GzA9tgO81icbuw%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<section style="text-align: center;line-height: 1.75em;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002147" data-ratio="0.5703703703703704" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=9ceb498f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsCty76kO2FGOaXyIB2HuZ3XQa4AMKMmLkE3CEVlYKqSMBReK3eTvscB9EQB43pGBveju7LoldmNg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><h2 style="text-align: left;line-height: 1.75em;margin-top: 16px;margin-bottom: 8px;"><strong><span style="font-size: 24px;">攻击事件介绍</span></strong></h2><section style="text-indent: 2em;line-height: 1.75em;">近期，毒霸安全团队留意到 Cyble 研究情报实验室最新发布的 Higaisa APT 威胁活动报告。根据报告内容，该组织采用了仿冒 OpenVPN 官网的手段，在针对中国网民的钓鱼网站上传送了恶意安装包。我们通过鹰眼威胁情报中心又发现了该组织的其他多个钓鱼活动，如图所示，攻击主要将恶意模块与多个常规软件进行捆绑，伪装成正常安装包并通过钓鱼网站、下载站等途径传播。这些安装包在外观设计上与正规软件极为相似，从而有效地诱使用户进行下载安装。用户一旦在本地设备执行，攻击者便可以植入恶意模块并建立后门，再通过后门远程控制受害者计算机、部署木马软件等操作。</section><section style="text-align: center;line-height: 1.75em;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002148" data-ratio="0.21666666666666667" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=2e5196f2&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsCty76kO2FGOaXyIB2HuZ3zompN022TJnABqaYBeiafRK2waZMnwMjSBMP2CITwHUJibInial88gI3g%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><section style="text-indent: 2em;line-height: 1.75em;">Higaisa 的威胁活动在 2019 年首次被公开披露，该组织的攻击目标多元化，涵盖了政府机构、商业实体以及参与国际贸易的<span style="letter-spacing: 0.578px;text-indent: 34px;text-wrap: wrap;">公司和</span>个人。Higaisa 通过精心设计的钓鱼邮件和鱼叉式网络攻击来传播恶意软件，其主要的恶意操作是通过 Shellcode 执行的，包括但不限于白加黑动态加载技术、代码解密机制、反调试措施，以及利用密钥加密技术来保护其通信数据。尽管该组织的活动已被广泛曝光，Higaisa 依旧保持着相当高的活跃度。</section><h2 style="line-height: 1.75em;margin-bottom: 8px;margin-top: 16px;"><strong><span style="font-size: 24px;">流程概要</span></strong></h2><section style="text-indent: 2em;line-height: 1.75em;">该攻击主要通过伪装成正常的安装程序来诱导用户下载恶意文件。用户在执行这些看似合法的安装程序时，实际上激活了隐藏的恶意模块，该模块负责搜寻并执行资源中的加密 Shellcode。这些恶意代码还包含反调试检测代码、加密了接口和关键字符，旨在阻止调试和静态分析。完成上述步骤后，攻击者将建立一个加密通信通道，通过生成密钥，与 C&amp;C 服务器进行进一步的通信和部署。</section><section style="text-align: center;line-height: 1.75em;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002149" data-ratio="0.5722222222222222" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=a65c890d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsCty76kO2FGOaXyIB2HuZ3F4dqelHMkic4LkqQTftokjCCVsWDHw9B2BhCAXZNKWC8oBibGy7a4WSQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><h2 style="line-height: 1.75em;margin-bottom: 8px;margin-top: 16px;"><strong><span style="font-size: 24px;">详细分析</span></strong></h2><h3 style="line-height: 1.75em;margin-top: 8px;margin-bottom: 8px;"><span style="font-size: 20px;"><strong>1. 初始执行</strong></span></h3><p style="line-height: 1.75em;text-indent: 2em;">此次捕获的恶意模块由伪装成 “PassGuard（密码卫士）” 的诱饵安装包释放。安装包具有数字签名 “Chengdu Nuoxin Times Technology Co., Ltd.”。在执行后，恶意安装程序释放了一个合法软件的安装包，以及一个基于 Rust 编写的 64 位恶意可执行文件 “rom.exe”，该文件的数字签名为 “Zhiya Yunke (Chengdu) Finance and Tax Service Co., Ltd.”。</p><section style="text-align: center;line-height: 1.75em;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002150" data-ratio="0.7305555555555555" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=fabbfd91&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsCty76kO2FGOaXyIB2HuZ3ISuJUaFPthLyj1wDYzw0HicE7I2k6Y6AKl5I55bJhzdND9u14fY3wuw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/><span style="font-size: 20px;letter-spacing: 0.034em;text-align: justify;"></span></section><h3 style="line-height: 1.75em;margin-bottom: 8px;margin-top: 16px;"><strong><span style="font-size: 20px;">2. 对抗手段</span></strong></h3><h4 style="line-height: 1.75em;margin-top: 8px;margin-bottom: 8px;"><strong><span style="font-size: 18px;">(1) 资源解密</span></strong></h4><p style="line-height: 1.75em;text-indent: 2em;">当恶意模块被加载后，它会从自身的资源中提取一段大小为 0xE2A1 的二进制数据。然后将这些资源数据复制到内存中，并执行解密操作以获取一段 Shellcode 。最后通过间接调用 Shellcode 代码段。这个过程涉及资源加载、内存解密和动态执行 Shellcode 的操作。</p><section style="text-align: center;line-height: 1.75em;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002151" data-ratio="0.5888888888888889" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=23808a1c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsCty76kO2FGOaXyIB2HuZ3nKTgxMQtqlfpNiaXuGFaq0ykNiaugm5PPiaPhC5AWibrRLMVJVhjfh8iciag%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><h4 style="line-height: 1.75em;margin-bottom: 8px;"><strong><span style="font-size: 18px;">(2) 反调试检查</span></strong></h4><p style="line-height: 1.75em;text-indent: 2em;">恶意代码段中穿插使用了反调试机制，以增加对动态分析的对抗性。这一机制基于当前执行的代码段计算哈希值 (<code>computedHash1</code>)，并将其用于控制程序执行的流程。如果动态调试器介入并干扰了循环，导致哈希值不正确，程序将会退出函数，跳过关键步骤。</p><section style="text-align: center;line-height: 1.75em;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002152" data-ratio="0.6018518518518519" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=173d2395&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsCty76kO2FGOaXyIB2HuZ3VLyJhf5ib8fTeUApWbOj7S2zKcBW8J856yMCVDh7Sr39ibA6H8lgLCJg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><h4 style="line-height: 1.75em;margin-bottom: 8px;"><strong><span style="font-size: 18px;">(3) 字符串、接口加密</span></strong></h4><p style="line-height: 1.75em;text-indent: 2em;">Shellcode 中采用了关键字符加密和内存中的动态函数调用等技术。如 URL、函数名和 IP 地址等关键字符都经过了加密存储，从而增加了静态分析的难度。此外，代码在运行时动态导入了库函数，并通过内存中的函数指针来调用这些函数，进一步增加了静态分析和反编译的复杂性。这些措施的目的在于提高动态对抗性，从而提高了分析难度。</p><section style="text-align: center;line-height: 1.75em;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002153" data-ratio="0.7555555555555555" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=fd97302d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsCty76kO2FGOaXyIB2HuZ3icqMuicTBgF446icN3pZxbI5ib3svgDgyQQn6P5siaAKvv3icicZzCjKOt9pQ%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><h3 style="line-height: 1.75em;margin-bottom: 8px;margin-top: 16px;"><strong><span style="font-size: 20px;">3. 网络通讯</span></strong></h3><h4 style="line-height: 1.75em;margin-top: 8px;margin-bottom: 8px;"><strong><span style="font-size: 18px;">(1) 通讯密钥</span></strong></h4><p style="line-height: 1.75em;text-indent: 2em;">Shellcode 通过创建 UUID 计算其哈希值，在哈希的基础上生成一个 AES 密钥并保存，用于与 C&amp;C 服务器之间的通信。</p><section style="text-align: center;line-height: 1.75em;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002154" data-ratio="0.967741935483871" data-s="300,640" style="" data-type="png" data-w="992" src="https://wechat2rss.xlab.app/img-proxy/?k=4250fb1b&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsCty76kO2FGOaXyIB2HuZ3YOsYNRl65wO3VVtTS6rI7VR8jJdsfyPKVcY0IfUXaWXRCmCl0bBgag%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><h4 style="line-height: 1.75em;margin-bottom: 8px;margin-top: 16px;"><strong><span style="font-size: 18px;">(2) 获取信息</span></strong></h4><p style="line-height: 1.75em;text-indent: 2em;">通过配置获取代理服务器信息，检验是否可以通过代理服务器进行网络通信。</p><section style="text-align: center;line-height: 1.75em;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002155" data-ratio="0.4722222222222222" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=0162b7cc&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsCty76kO2FGOaXyIB2HuZ3CTSzOBCbnqAyXCgkLfwxGKt6XUy3G31VKNiaO2UrSu9nFd7YJL3nlzg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><h4 style="line-height: 1.75em;margin-bottom: 8px;margin-top: 16px;"><strong><span style="font-size: 18px;">(3) 建立通讯</span></strong></h4><p style="line-height: 1.75em;text-indent: 2em;">通过内存解密后获取到服务器地址。检测网络正常连通后与指定 IP 建立正式通讯。在分析过程中，由于服务器已关闭，因此无法确定这次攻击的最终目标。</p><section style="text-align: center;line-height: 1.75em;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002156" data-ratio="0.9056603773584906" data-s="300,640" style="" data-type="png" data-w="1060" src="https://wechat2rss.xlab.app/img-proxy/?k=fd5fe85d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsCty76kO2FGOaXyIB2HuZ3fqJNM4T3JkO5LFkENrHRDA5hrxGAW6I4NXnNpP5dA0ziaUf5ywqxOrg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><h2 style="line-height: 1.75em;margin-top: 16px;margin-bottom: 8px;"><strong><span style="font-size: 24px;">同源性分析</span></strong></h2><p style="line-height: 1.75em;text-indent: 2em;">经分析发现，本次捕获的恶意 Shellcode 与 2020 年传播的 Higaisa APT 在代码结构上存在高度相似。值得注意的是，此次传播样本直接将 Shellcode 嵌入程序的资源段中，并进行了加密处理，而过去的样本则将 Shellcode 存储为独立文件，并通过白文件进行调用。</p><section style="text-align: center;line-height: 1.75em;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002157" data-ratio="0.7018518518518518" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=c1469c85&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsCty76kO2FGOaXyIB2HuZ33E9ZRPxVaT7qiavl9X48tFG74XfIfWZLwoZKRGjfR65lYYAUD457RSg%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><p style="line-height: 1.75em;text-indent: 2em;">更多样本信息可登录鹰眼情报中心（<a href="https://ti.duba.net）搜索或者上传样本后查看分析出的" target="_blank">https://ti.duba.net）搜索或者上传样本后查看分析出的</a> C2 配置，通过 IP 地址查看所属家族和地区等详细信息，在“关联情报”里点击相关通信文件等选项即可获取关联的同源家族样本。</p><section style="text-align: center;line-height: 1.75em;"><img class="rich_pages wxw-img js_insertlocalimg" data-imgfileid="100002158" data-ratio="0.8342592592592593" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=9343ba88&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsCty76kO2FGOaXyIB2HuZ3MOGTt8YIQEXkYTtDkYdY8gSFTz0qA1kQEHGGiacZpF5X1WxXRV8WwdA%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><h2 style="line-height: 1.75em;margin-top: 16px;margin-bottom: 8px;"><strong><span style="font-size: 24px;">总结</span></strong></h2><p style="line-height: 1.75em;text-indent: 2em;">近期网络钓鱼的攻击手法的仍在不断进化和复杂化。攻击者通过将恶意软件伪装成正常的安装包发布在下载链接中，利用图标和数字签名提高可信度，让用户难以区分真伪。这使得普通用户在判断软件的安全性时面临更大挑战。防范建议：优先在正规官方网站下载软件，避免使用外部或不明来源的链接。对于制作粗糙或设计不专业的类官方网站，应提高警惕。在处理电子邮件、社交媒体消息或网站上的下载链接时，若来源不明确或不可信，尽量避免点击或下载，以减少受到网络钓鱼攻击的风险。同时，安装金山毒霸可以有效检测和清除此类威胁。</p><section style="text-align: center;line-height: 1.75em;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002159" data-ratio="0.6987951807228916" data-s="300,640" style="" data-type="png" data-w="996" src="https://wechat2rss.xlab.app/img-proxy/?k=b576751b&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsCty76kO2FGOaXyIB2HuZ3sLTX93XicfY55BVaLzzY8J9FuhB1vrJPWibwaeCv06EmDG7LFibiaQ7liaw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><section style="text-align: center;line-height: 1.75em;"><img class="rich_pages wxw-img" data-galleryid="" data-imgfileid="100002160" data-ratio="0.6981891348088531" data-s="300,640" style="" data-type="png" data-w="994" src="https://wechat2rss.xlab.app/img-proxy/?k=a564662c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsCty76kO2FGOaXyIB2HuZ3cttjMoFAH7jdwSDkKiaiaSAxkicbicttibLXWnk5UprJBWIm7S16Hef1CIw%2F640%3Fwx_fmt%3Dpng%26from%3Dappmsg"/></section><h2 style="line-height: 1.75em;margin-top: 16px;margin-bottom: 8px;"><strong><span style="font-size: 24px;">IOCs</span></strong></h2><h3 style="line-height: 1.75em;margin-bottom: 8px;margin-top: 8px;"><strong><span style="font-size: 20px;">MD5（部分）</span></strong></h3><p style="line-height: 1.75em;margin-bottom: 0px;">E7CF8B4C6BF416020929A3E7469A84CC</p><p style="line-height: 1.75em;margin-bottom: 0px;">12E2D0FC11B2C788C09B187B3D632459</p><p style="line-height: 1.75em;margin-bottom: 0px;">FB08395645BA9DA02224101AD25E06D3</p><p style="line-height: 1.75em;margin-bottom: 0px;">33CA9B7FC670837EC5B4F16007AE4689</p><p style="line-height: 1.75em;margin-bottom: 0px;">48CE6EF579AC746FF2E74595301B4D75</p><p style="line-height: 1.75em;margin-bottom: 0px;">D4B3C1D38C0ADC4FD5111A38B50E2106</p><p style="line-height: 1.75em;margin-bottom: 0px;">C5592864F343C9C9C7E47B80FB6C6313</p><p style="line-height: 1.75em;margin-bottom: 0px;">AEC9716853A0814B3BF974314542B999</p><p style="line-height: 1.75em;margin-bottom: 0px;">E84197A347F7E2AD59A2396F6C3D1F9C</p><p style="line-height: 1.75em;margin-bottom: 0px;">33DC5AC694D7C8E48FE23452DD5309A2</p><p style="line-height: 1.75em;margin-bottom: 0px;">C4A6CD3B485986F44AA151CC0305B3DB</p><p style="line-height: 1.75em;margin-bottom: 0px;">7E2E211E27BE9D63C86392761BBCAB06</p><p style="line-height: 1.75em;margin-bottom: 0px;">1E76771744BA85AE91D35756DD3D5EBD</p><p style="line-height: 1.75em;margin-bottom: 0px;">67836F4B378BFB3B424E4CF548B6D5FE</p><p style="line-height: 1.75em;margin-bottom: 0px;">35C83FF8AA2415DC96B134E63A8100FF</p><section style="line-height: 1.75em;margin-bottom: 8px;">7BA7E9090C789F3CC10285CD70FBA8F0</section><h3 style="line-height: 1.75em;margin-top: 8px;margin-bottom: 8px;"><strong><span style="font-size: 20px;">C&amp;C</span></strong></h3><p style="line-height: 1.75em;margin-bottom: 0px;">43.246.209.83</p><p style="line-height: 1.75em;margin-bottom: 0px;">59.120.199.98</p><p style="line-height: 1.75em;margin-bottom: 0px;">61.222.50.236</p><p style="display: none;"><mp-style-type data-value="3"></mp-style-type></p>



<p><a href="2247485811">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=df8a5537&amp;r=1&amp;u=https%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzU2OTcxNjE4Mw%3D%3D%26mid%3D2247485811%26idx%3D1%26sn%3D4687ee21c8cf7693ce58ba8e880b68c7%26subscene%3D0">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Wed, 06 Dec 2023 17:58:00 +0800</pubDate>
    </item>
    <item>
      <title>&#34;物尽其用&#34;，新瓶装旧酒的套路</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzU2OTcxNjE4Mw==&amp;mid=2247485793&amp;idx=1&amp;sn=1cca702748cb4252229c5cc267730926</link>
      <description>新瓶装旧酒，一款另辟蹊径的木马与杀软的博弈。</description>
      <content:encoded><![CDATA[<p>
原创 <span>PL</span> <span>2023-11-02 12:29</span> <span style="display: inline-block;">广东</span>
</p>

<p>新瓶装旧酒，一款另辟蹊径的木马与杀软的博弈。</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=efd19887&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2FXia34CufgojuIeHTQuYV95sp11jgKq0nN5wicCzvcfUqwib7RgqSkWptHpELXL9dnyibEvh7dth6tibvcdnvGiaWGQkw%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<h2><strong>概述</strong></h2><p>近期，鹰眼情报中心在内存防护数据中监测到一款针对中国网民的钓鱼攻击。该木马伪装相对隐蔽，通过钓鱼下载站伪装成输入法、驱动等程序。每个IP仅可访问一次下载页面，再次访问服务端不会返回恶意钓鱼链接。诱骗用户下载“双击安装.exe”运行后释放pro.exe和dess.exe，其中pro.exe另辟蹊径使用WFP对各大安全产品云查IP进行过滤屏蔽，<span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;">为</span><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;">后续木马做环境铺垫。</span><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;">dess.exe负责内存加载Gh0st远控木马，对目标实施监控。</span></p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.5370370370370371" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=e9420fdb&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuIeHTQuYV95sp11jgKq0nNLKFLXcFbKjFibjiaCAItxgmZ0F24WXhGkYDnQM4HV9ersX8Piadjxdn4Q%2F640%3Fwx_fmt%3Dpng"/></p><p><br/></p><h2><strong>正文</strong></h2><p>以往钓鱼类远控均以免杀方案为主，通常是加载器根据不同安全软件，加载针对绕过型payload，以达到绕过安全软件对目标实施监控的目的。随着攻防进一步深入，越来越多的木马另辟蹊径采取主动对抗杀软方案，本文所述木马通过WFP网络过滤对各大安全厂商云安全进行屏蔽以求得更长的生存周期，真可谓是八仙过海各显神通。<span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;">下文将对此木马的落地模块做简要分析，其主要攻击流程如下图所示。</span><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;"></span><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;"></span></p><p><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.496875" data-s="300,640" style="text-align: center;font-size: var(--articleFontsize);letter-spacing: 0.034em;" data-type="png" data-w="960" src="https://wechat2rss.xlab.app/img-proxy/?k=18bb46ff&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuIeHTQuYV95sp11jgKq0nNuBVQiaBMCSJib2mXBicy4t3pgm2pYKiadQYFRtyEKJpOmlicQvRg3NwybCQ%2F640%3Fwx_fmt%3Dpng"/></p><h3><strong>点击安装</strong></h3><h3><span data-lark-record-format="docx/record"></span></h3><p>此模块充当加载器角色，诱导用户下载执行后，其通过访问<a href="http://164.155.212.251/a121.41.21.197.txt获取后续payload，通过加密加载内存模块，调用其导出函数yourfucn执行后续流程，如下图。" target="_blank">http://164.155.212.251/a121.41.21.197.txt获取后续payload，通过加密加载内存模块，调用其导出函数yourfucn执行后续流程，如下图。</a><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;"></span></p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.494750656167979" data-s="300,640" style="" data-type="png" data-w="762" src="https://wechat2rss.xlab.app/img-proxy/?k=c54c159e&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuIeHTQuYV95sp11jgKq0nNLMibcsunYG7Kmt0wiaz2a7ia8WhqGBDCPA8V7mwCWjVP32icHsibvsD4Log%2F640%3Fwx_fmt%3Dpng"/></p><p>其中内存模块yourfucn导出函数，该模块使用了Code Virtualizer对代码进行虚拟化保护，以干扰静态分析。通过对后续流程跟踪，当进程位置不满足要求时，会拷贝自身到C:\Users\Public\pro.exe并尝试提升权限启动。<span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;"></span></p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.5831099195710456" data-s="300,640" style="" data-type="png" data-w="746" src="https://wechat2rss.xlab.app/img-proxy/?k=7a276767&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuIeHTQuYV95sp11jgKq0nNy8RqGHPPdd91fJPTjCotc6wAib1Df3GLWKRUYqxSBlSnah9Hkibstemw%2F640%3Fwx_fmt%3Dpng"/></p><h3><strong>pro.exe</strong></h3><p>该模块为上文点击安装的副本，当其以pro.exe进行运行时，内存模块会触发特定分支，进行下一步部署。首先其通过远控获取一份数量近5000的ip列表，下载地址为<a href="http://164.155.212.251/ipcode.dat，保存成1.dat，通过解密获取ip信息列表，并将此列表加入WFP过滤，以阻断各大厂商云查、病毒库升级等操作。部分IP列表如下：" target="_blank">http://164.155.212.251/ipcode.dat，保存成1.dat，通过解密获取ip信息列表，并将此列表加入WFP过滤，以阻断各大厂商云查、病毒库升级等操作。部分IP列表如下：</a><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;"></span></p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.8090128755364807" data-s="300,640" style="" data-type="png" data-w="466" src="https://wechat2rss.xlab.app/img-proxy/?k=5683a201&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuIeHTQuYV95sp11jgKq0nNjE0vJU9XZNic2etVtViaLcylQaQfQpVKN6TUIeVnlatwuccJXibloGG5g%2F640%3Fwx_fmt%3Dpng"/></p><p>与此同时循环对杀软进程(金山毒霸、windows defender、360、腾讯管家、火绒)进行枚举，如果存在，则获取其相关网络连接信息，加入WFP过滤。<span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;"></span></p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="1.0752475247524753" data-s="300,640" style="" data-type="png" data-w="505" src="https://wechat2rss.xlab.app/img-proxy/?k=a0226d44&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuIeHTQuYV95sp11jgKq0nNH6yMFbxWWZVuGeWJUsMl1Ejj2CgKGry1aicdXV0TbcVqY4fDWfgGqHQ%2F640%3Fwx_fmt%3Dpng"/></p><p>同时注册服务执行命令关闭UAC弹窗为后续流程铺路。<span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;"></span></p><section class="code-snippet__fix code-snippet__js"><ul class="code-snippet__line-index code-snippet__js"><li></li><li></li><li></li></ul><pre class="code-snippet__js" data-lang="cs"><code><span class="code-snippet_outer">cmd /c  reg <span class="code-snippet__keyword">add</span> <span class="code-snippet__string">&#34;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System&#34;</span> /v <span class="code-snippet__string">&#34;ConsentPromptBehaviorAdmin&#34;</span> /t reg_dword /d <span class="code-snippet__number">0</span> /F</span></code><code><span class="code-snippet_outer"><br/></span></code><code><span class="code-snippet_outer">reg ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d <span class="code-snippet__number">0</span> /f</span></code></pre></section><p><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;">至</span><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;">此，准备阶段基本完成，通过WFP过滤阻断杀软通讯，可有效打击对云查强依赖的杀软，为后续远控进程赢得更长的生存周期。</span><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;">最终</span><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;">pro.exe会通过访问<a href="http://164.155.212.251/a121.41.21.197.txt下载并解密释放dess.exe，并伪装成QQ安全中心进行持久化。" target="_blank">http://164.155.212.251/a121.41.21.197.txt下载并解密释放dess.exe，并伪装成QQ安全中心进行持久化。</a></span><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;caret-color: transparent;"></span></p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.07592592592592592" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=ce31b050&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuIeHTQuYV95sp11jgKq0nNK8tvR7TQp65a9EicHY8vIlOAnG0Fr9IvYmSsrl1USoiczftX9ypq55aQ%2F640%3Fwx_fmt%3Dpng"/></p><h3><strong>dess.exe</strong></h3><p>该模块由pro.exe释放部署，主要用来加载最终远控payload，dess.exe启动后访问<a href="http://121.41.21.197/m1.txt下载并解密内存模块，并调用其导出函数fuckyou。" target="_blank">http://121.41.21.197/m1.txt下载并解密内存模块，并调用其导出函数fuckyou。</a></p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.2" data-s="300,640" style="" data-type="png" data-w="675" src="https://wechat2rss.xlab.app/img-proxy/?k=dffa5336&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuIeHTQuYV95sp11jgKq0nNEOw5sYcsiarribZm3ibZejsxAGpzG9Im9E6pwn6LJqTlx2kVMcekyYicFg%2F640%3Fwx_fmt%3Dpng"/></p><p>此内存模块为标准的Gh0st RAT变种，如下图，内存马Gh0st和Cobalt Strike属于老生常谈的话题，此处就不在过多赘述远控自身功能。上线地址为121.41.21.197:3004。</p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.5886287625418061" data-s="300,640" style="" data-type="png" data-w="598" src="https://wechat2rss.xlab.app/img-proxy/?k=243c4df1&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojuIeHTQuYV95sp11jgKq0nNuqWibRIFrbHSL8IAhn1GyXGtNXVgCwWiabn1DL6bp2ONibrl0U5bmMvaA%2F640%3Fwx_fmt%3Dpng"/></p><h2><strong>总结</strong></h2><p>近些年来钓鱼攻击越来越频发，手法也越来越隐蔽，对抗手法也逐渐日新月异。远控还是那个远控，利用系统机制和杀软特点去博弈，新瓶装旧酒的加载方式有效的为其赢得了生存周期。安全厂商也应针对性查缺补漏避免防御体系被钻空子。防范建议：不要轻易点击陌生邮件中的链接或下载附件，尤其是来自不信任或不熟悉的发件人。下载文件时要仔细核对文件和来源信息，同时开启毒霸的内存防护也可有效阻断此类攻击。</p><h2><strong>IOC</strong></h2><p>164.155.212.251</p><p>121.41.21.197</p><p>y1.whwis.cn</p><p>y2.whwis.cn</p><p>x2.whchl.cn</p><p>x1.whchl.cn</p><p>z1.whyss.cn</p><p>y1.whzcm.cn</p><p><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;">soft.uniqtest.cn</span></p><p><br/></p><p><br/></p><p style="display: none;"><mp-style-type data-value="3"></mp-style-type></p>



<p><a href="https://ti.duba.net/">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=4e3ce8d1&amp;r=1&amp;u=https%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzU2OTcxNjE4Mw%3D%3D%26mid%3D2247485793%26idx%3D1%26sn%3D1cca702748cb4252229c5cc267730926%26subscene%3D0">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Thu, 02 Nov 2023 12:29:00 +0800</pubDate>
    </item>
    <item>
      <title>黑产团伙利用SEM渠道投放CS远控木马</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzU2OTcxNjE4Mw==&amp;mid=2247485773&amp;idx=1&amp;sn=b44645084e4462f9cfc93dd910180589</link>
      <description>近期毒霸安全团队监测到Cobalt Strike远控告警激增，数小时内高达百起。</description>
      <content:encoded><![CDATA[<p>
<span></span> <span>2023-08-07 20:47</span> <span style="display: inline-block;">广东</span>
</p>

<p>近期毒霸安全团队监测到Cobalt Strike远控告警激增，数小时内高达百起。</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=4b2959e8&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2FXia34CufgojsSBkDg1GxUpgVVBviaGULM9BE5yKC5jaPRj0nztZLSWRiaWmfQhAb4DZlQCfzVeuOZqRfjzV2ewenA%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p style="text-align: justify;"><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;text-align: justify;">近期毒霸安全团队监测到Cobalt Strike远控告警激增，数小时内高达百起。</span><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;text-align: justify;">Cobalt Strike作为一款后渗透工具，一般用于定向攻击特定目标，较少出现大范围感染。</span><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;text-align: justify;">溯源发现这些用户从仿冒的SEM落地页：</span><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;text-align: justify;">&#34;<a href="http://zky[.]hfyswlkj[.]top" target="_blank">http://zky[.]hfyswlkj[.]top</a>&#34;下载了名为：</span><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;text-align: justify;">&#34;百度云盘安装包.exe&#34;,&#34;网盘安装包.exe&#34;,&#34;钉钉安装包.exe&#34;的恶意程序。</span><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;text-align: justify;">通过关键字：</span><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;text-align: justify;">&#34;百度网盘下载&#34;，&#34;钉钉下载&#34;，&#34;office&#34;, &#34;pdf&#34;等在搜索引擎上找到多个页面一致的最新SEM仿冒站点，且排行在第一位置，下载的都为携带远控的恶意程序，但未发现包含Cobalt Strike。</span><br/></p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.5027777777777778" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=9bead347&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsSBkDg1GxUpgVVBviaGULM9tAM3jPaLhV7DSsLicP0fCjDBU4wTwrAGITAylhzpDvfbIeu5pNTTa0A%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">深入告警数据挖掘发现存在时间点的聚集，当时用户访问的SEM落地页只在特定的时间段才能下载到携带Cobalt Strike的恶意程序。传播时间点共出现3次，每次持续时间在1~2小时左右，可以看出黑产团伙在小范围测试。</p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.4798206278026906" data-s="300,640" style="" data-type="png" data-w="446" src="https://wechat2rss.xlab.app/img-proxy/?k=b13ef3f6&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsSBkDg1GxUpgVVBviaGULM9hkDNbiavjWqiaoP13c6Ff78wrkyXIVspee7uluEWmpXejxNxLyzA6v6g%2F640%3Fwx_fmt%3Dpng"/></p><p>下载的恶意程序<span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;">使用pyinstaller打包器打包，并使用vmprotect和themida强壳保护，解包后的核心pyd模块也同样使用强壳保护对抗分析。</span><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;">原始安装包还拥有有效的数字签名，这也使得它的免杀效果大幅提升。</span><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;">运行后最终会执行Cobalt Strike 的Http Stager Shellcode，再拉取beacon后门模块在内存中执行，</span><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;">最新版本还同时携带了”大灰狼“远控模块。</span><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;"></span></p><h2 style="white-space-collapse: preserve;"><span style="font-size: 18px;"><strong>样本分析</strong></span></h2><p>7月27日传播的样本使用themida加壳，且添加无效签名。</p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.6577825159914712" data-s="300,640" style="" data-type="png" data-w="938" src="https://wechat2rss.xlab.app/img-proxy/?k=8edac1b6&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsSBkDg1GxUpgVVBviaGULM9xk6Lrt9QMlSlt5vI7yJSW8VERd1kECfD4ALLpzCUGib7Sic6LIgrFPvQ%2F640%3Fwx_fmt%3Dpng"/></p><p>7月31日和8月1日传播的具有有效数字签名：&#34;CleverSoar Electronic Technology Co., Ltd.&#34;</p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.6602357984994641" data-s="300,640" style="" data-type="png" data-w="933" src="https://wechat2rss.xlab.app/img-proxy/?k=471c8b4c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsSBkDg1GxUpgVVBviaGULM9yhv74CPNiallevjJ1JkHUUAj7Jq6qtiboIIHNpdibZxT3ibSiaNBHt0cz3g%2F640%3Fwx_fmt%3Dpng"/></p><p>以有签名为例，样本使用pyinstaller打包，解包后内部核心功能编译成pyd，并使用vmp加壳保护。运行后会复制自身到临时目录下为&#34;d2dAdawdc30u9ex.exe&#34;再执行，随后在内存中释放出两段shellcode, 一个用于加载CS beacon, 另一个加载&#34;大灰狼&#34;远控。整个流程如下:</p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.3235294117647059" data-s="300,640" style="" data-type="png" data-w="782" src="https://wechat2rss.xlab.app/img-proxy/?k=c5973e20&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsSBkDg1GxUpgVVBviaGULM9PgPdSd6IMpAGTmOzkt4R4zdzepRMBFunqXwrtwJ2VvDD97wthBuzyw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">CS stager与C2:&#34;<a href="http://update[.]youjucan[.]com:2271/jquery-3.3.1.slim.min.js" target="_blank">http://update[.]youjucan[.]com:2271/jquery-3.3.1.slim.min.js</a>&#34;通讯下载beacon模块，CS服务端配置了staging process(分段过程)模仿jQuery请求，Beacon payload被混合到jQuery javascript文本块中。</p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.6621160409556314" data-s="300,640" style="" data-type="png" data-w="879" src="https://wechat2rss.xlab.app/img-proxy/?k=0e949800&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsSBkDg1GxUpgVVBviaGULM9k4VibhDOOLgQhto0PVLBWPvGxHZNZibIo84rYekicLZpmkFf0Dd15IYpQ%2F640%3Fwx_fmt%3Dpng"/></p><p>payload执行后自解密出beacon模块，但beacon模块被特殊处理，代码段、导入表函数名和导入dll名都被异或加密，加载器加载时会动态解密修复，并去除pe头，防止内存扫描。</p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.39285714285714285" data-s="300,640" style="" data-type="png" data-w="700" src="https://wechat2rss.xlab.app/img-proxy/?k=bc6797be&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsSBkDg1GxUpgVVBviaGULM9LvWo7lbiaCYlvibJCO5SuFsF6l8GWtvbibYXl2Q1k11eJMXzGyyJxZLcA%2F640%3Fwx_fmt%3Dpng"/></p><p>除了加载CS外还有一个分支负责内存加载&#34;大灰狼&#34;远控变种，而在7月25日的版本中并未发现。<span style="letter-spacing: 0.578px;text-wrap: wrap;">&#34;大灰</span><span style="letter-spacing: 0.578px;text-wrap: wrap;">狼&#34;</span>使用的是外部流传较广的 &#34;V9.5&#34;版本，通讯C2:&#34;xy1.youjucan[.]com&#34;。</p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.5832492431886983" data-s="300,640" style="" data-type="png" data-w="991" src="https://wechat2rss.xlab.app/img-proxy/?k=61b34b88&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsSBkDg1GxUpgVVBviaGULM98V645T1RXZ6yv7ttFElGVxsPpEiaoibnC7FLYqiakE5rv7SDc3icNlaYaw%2F640%3Fwx_fmt%3Dpng"/></p><p><br/></p><h2 style="white-space-collapse: preserve;"><span style="font-size: 18px;"><strong>IOC：</strong></span></h2><p><span style="font-size: 18px;"><strong>    </strong>C2:<strong><br/></strong></span></p><p>     zky.hfyswlkj[.]top</p><p>     update.youjucan[.]com:2271</p><p>     xy1.youjucan[.]com</p><p>    143.92.53.167</p><p>    md5:<br/></p><p>    e242ca6cc42037a611704d1a3d44aa6a</p><p>    cf275313b61ff8a499b7b663edad1571</p><p>    117164443ecd1475bd76b22b32eb7012</p><p>    aca89aff6f48217465078cb4105bdc67</p><p><br/></p><p><br/></p><p style="display: none;"><mp-style-type data-value="3"></mp-style-type></p>



<p><a href="2247485773">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=08dac79e&amp;r=1&amp;u=https%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzU2OTcxNjE4Mw%3D%3D%26mid%3D2247485773%26idx%3D1%26sn%3Db44645084e4462f9cfc93dd910180589%26subscene%3D0">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Mon, 07 Aug 2023 20:47:00 +0800</pubDate>
    </item>
    <item>
      <title>以发票之名，盘踞境外黑产组织发起的钓鱼活动分析</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzU2OTcxNjE4Mw==&amp;mid=2247485754&amp;idx=1&amp;sn=6b0afc3e6a45001a3a09c065f6cdab87</link>
      <description>近期毒霸安全团队监测到大量利用电子发票为诱饵的钓鱼攻击活动，攻击者通过发送大量钓鱼诱饵引导用户进入钓鱼站点。</description>
      <content:encoded><![CDATA[<p>
<span></span> <span>2023-04-18 19:33</span> <span style="display: inline-block;">广东</span>
</p>

<p>近期毒霸安全团队监测到大量利用电子发票为诱饵的钓鱼攻击活动，攻击者通过发送大量钓鱼诱饵引导用户进入钓鱼站点。</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=40b4ae8a&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2FXia34CufgojsYn7mToz77M8LVHuWQq1U2uWlXvQiaW0Z2OPUH019hrUdbwKib8sx704xibuAONn0vwdyx2JFaEESkA%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p style="text-align: left;">近期毒霸安全团队监测到大量利用电子发票为诱饵的钓鱼攻击活动，攻击者通过发送大量钓鱼诱饵引导用户进入钓鱼站点。这些钓鱼站伪装成发票下载站，与平常人们开发票站点相似，稍有不注意很容易上当。这些钓鱼木马最终会在内存中执行gh0st远控木马，监视并操控用户电脑。</p><p style="text-align: left;">在对钓鱼站深入分析后发现，网站开设有30多个后台账号，这些账号不断上传木马文件，并保持持续更新，甚至一天更新多次，上传成功后可以生成分享链接，这些链接被用作钓鱼诱饵分发，其中单个诱饵最多的一天下载量达3000多次，受影响用户甚广。通过对攻击者使用的钓鱼平台源码、C2服务器操作日志、恶意代码归因以及攻击技术手法等维度综合判定，我们认为幕后组织为一群盘踞在境外东南亚地区的黑产组织，具有中文语言背景，长期针对国内企事业单位，发动定向钓鱼、电信诈骗等网络攻击活动。</p><p style="text-align: left;">其中一个钓鱼页面：</p><p style="text-align: left;"><a href="http://www.siyike[.]work/#/share/69cc0f49b08f4a4a9e86" target="_blank">http://www.siyike[.]work/#/share/69cc0f49b08f4a4a9e86</a></p><p style="text-align: left;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.40925925925925927" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=f85c294c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsYn7mToz77M8LVHuWQq1U2npb2PnibrwDR3q0pib4Jaqy32oKseCvA73ibz0LNDVsjCZfBP5vdyZaNA%2F640%3Fwx_fmt%3Dpng"/></p><h2 style="white-space: pre-wrap;text-align: left;"><span style="font-size: 20px;"><strong>攻击流程</strong></span></h2><p style="text-align: left;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.5965714285714285" data-s="300,640" style="" data-type="png" data-w="875" src="https://wechat2rss.xlab.app/img-proxy/?k=0f1486d8&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsYn7mToz77M8LVHuWQq1U2Kcjm3tP4edwXKXkKhgVjqxJevaySiaeRMYPzibckjNAQU4VL1SgwB8VQ%2F640%3Fwx_fmt%3Dpng"/></p><h2 style="white-space: pre-wrap;text-align: left;"><span style="font-size: 20px;"><strong>详细分析</strong></span></h2><p style="text-align: left;">钓鱼样本23554001.rar 打包了一个可执行程序23554001.exe。该样本执行后调用UrlDownloadToFile函数下载后阶段payLoad，并存放对应目录，最后执行“C:\programdata\thunderupdate\LiveUpdate.exe”。</p><p style="text-align: left;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.1299093655589124" data-s="300,640" style="" data-type="png" data-w="662" src="https://wechat2rss.xlab.app/img-proxy/?k=f0e47a9e&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsYn7mToz77M8LVHuWQq1U2RU64dCTicSiap8gFtJFSoATFicPFiascY744exUxdDI3q4ib9qgkDDmhIhg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">下载文件对应关系如下。</p><p style="text-align: left;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.2883435582822086" data-s="300,640" style="" data-type="png" data-w="815" src="https://wechat2rss.xlab.app/img-proxy/?k=2a1f2495&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsYn7mToz77M8LVHuWQq1U2XTEVjQwj964FJkPNpUnU12ltlbZposVQWmPeHcm9piaDibVWNAicqDv2A%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">LiveUpdata.exe 是利用LOLBins免杀技术，这个文件是一个XShell、Xftp、系列工具的更新程序，它运行后会读取当前目录下同名的LiveUpdate.dat文件。LiveUpdate.dat是zip压缩文件使用内置密码解压。压缩包中包含一个_TUProj.dat文件，该文件实际是一个包含Lua脚本的文件。攻击者在lua中嵌入了shellcode，当LiveUpdata.exe对LiveUpdate.dat解析成功后Lua脚本得到执行。</p><p style="text-align: left;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.7368421052631579" data-s="300,640" style="" data-type="png" data-w="874" src="https://wechat2rss.xlab.app/img-proxy/?k=6c3e63a5&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsYn7mToz77M8LVHuWQq1U2z9X8Z6GzuQkV2ANguWaZNTSH4mfMQibZjUrP7fCiaqNP3QrZzVwKXtaQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">shellcode执行后会读取同目录下的xml，实际为修改了pe头的dll文件，对pe头修补后在内存中加载执行。在Thunderupdate目录和Thunder目录下各有一个xml文件分别为两个不同payload。Thunder目录下的导出名为libe.dll, Thunderupdate下的为Server22.dll</p><p style="text-align: left;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.6252676659528907" data-s="300,640" style="" data-type="png" data-w="934" src="https://wechat2rss.xlab.app/img-proxy/?k=d4a16151&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsYn7mToz77M8LVHuWQq1U23BV5vUodCpxibKgngERGW019RJ2pmqeSwzUJHP7ZIPe1K8mmOiaZtQ4w%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">libe.dll的功能比较简单主要是把c:\programdata\thunder\LiveUpdate.exe 通过COM接口注册计划任务。Server22.dll为修改版gh0st远控，C2地址从c:\programdata\setting.ini 文件读取。该远控功能强大有接近70个控制码，除了常规的文件、注册表操作, 截屏, 远程控制，键盘记录，录音外，命令执行外，还会强制清理用户浏览器数据让用户重新输入网站凭证，以便截取用户输入。部分控制功能如下：</p><p style="text-align: left;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.8662790697674418" data-s="300,640" style="" data-type="png" data-w="688" src="https://wechat2rss.xlab.app/img-proxy/?k=ba9ef0c8&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsYn7mToz77M8LVHuWQq1U26OD1a8NJLy33Js0icMIASrGIfaDfqdw4SkFEdb1h56bibubnHpgA9Zicw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">从URL“<a href="http://my.xindajiema[.]info/picturess/2023/221.100.txt”中发现下载的内容中”61[.]160.221.100“的IP后两段与文件名" target="_blank">http://my.xindajiema[.]info/picturess/2023/221.100.txt”中发现下载的内容中”61[.]160.221.100“的IP后两段与文件名</a>&#34;221.100.txt&#34;相同，我们推测还存在大量其他的C2地址，对ip地址后两段生成字典对该路径爆破，共获取到有效C2地址203个，这些C2在ti.duba.net平台中查询可以关联到大量同类型样本。据此我们可以看出该组织的基础设施规模非常庞大。</p><p style="text-align: left;"><img class="rich_pages wxw-img" data-height="305" data-ratio="0.5565693430656934" data-width="548" data-type="png" data-w="548" src="https://wechat2rss.xlab.app/img-proxy/?k=75b2fc60&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsYn7mToz77M8LVHuWQq1U22F9RLV5RVcEgEl4adic3qYM07LumIhaoLAkdAmDMjClTmsC0UyiacZYQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.46111111111111114" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=6168a93f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsYn7mToz77M8LVHuWQq1U2BZj3UAGha77Uc1cxC07p3uGRVSZRhGxGOJ75kkPDldxrT2TBhsEBvw%2F640%3Fwx_fmt%3Dpng"/></p><h2 style="white-space: pre-wrap;text-align: left;"><strong><span style="font-size: 20px;">钓鱼站点分析</span></strong></h2><p style="text-align: left;">钓鱼站点使用网盘类web程序搭建，进入后台和数据库后发现，根据第一条上传记录推测站点创建于2023-01-25日前。</p><p style="text-align: left;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.05481283422459893" data-s="300,640" style="" data-type="png" data-w="748" src="https://wechat2rss.xlab.app/img-proxy/?k=c71f6aa1&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsYn7mToz77M8LVHuWQq1U2enN0dbsdicYfiaJLbyY25T2jSMicdVRjCoIKpORbCjHR4b4XuoTpnvh0g%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">钓鱼站点有30多个账户，不同的账户每日都在上传钓鱼文件，在其中一个账户后台可以看到近期的上传记录,点击分享便可以产生一个分享页也就是文章开始提到的钓鱼页面。</p><p style="text-align: left;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.5157407407407407" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=d94b5d25&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsYn7mToz77M8LVHuWQq1U2ACECVyTxiaKjIjgUebaXnxUYLWsekLIHwwb8mwGHse4dYNa28L0zNIw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">上传文件按下载量排序显示2023-03-15日上传的23554003.rar文件下载最高达3000次，该站点在两个月的时间里共上传了70多个诱饵文件。</p><p style="text-align: left;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.30462962962962964" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=46dae49c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsYn7mToz77M8LVHuWQq1U2Hia7r1OVZFNKgJNibKFAGGic2NCyAe3q4lic1sDAb5yL4icad6tORib7mC5g%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">在排查过程中还发现攻击者SSH连接IP来自老挝博胶省， 设备是中文环境语言 zh_CN.UTF-8 。</p><p style="text-align: left;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.17962962962962964" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=41c85a26&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsYn7mToz77M8LVHuWQq1U2PL1ocqEnhHNwmJvDmFDkuWViceJian27wRkjVvbeX8QENgNttVKQw4Ew%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;"><br/></p><p style="text-align: left;"><span style="font-size: 20px;"><strong>总结</strong></span><br/></p><p style="text-align: left;">近些年来钓鱼攻击越来越频发，个人信息的泄露也在一定程度上助推了这些活动更加具有针对性，发票类型钓鱼的目标大多都是企事业单位的财务人员，结合攻击者所在的东南亚地区，也让我们联想到诈骗活动。一旦攻击者发现是高价值目标便会持续监视用户的一举一动，那将毫无隐私可言，各种社交聊天信息和机密信息都将暴露，攻击者甚至可以操纵用户的微信、QQ为受害用户定制化诈骗场景。由于攻击组织在境外，一旦有资金损失要追溯也是非常困难。防范建议：不要轻易点击陌生邮件中的链接或下载附件，尤其是来自不信任或不熟悉的发件人。下载文件时要仔细核对文件和来源信息，同时开启毒霸的内存防护也可有效阻断此类攻击。</p><h2 style="white-space: pre-wrap;text-align: left;"><strong>IOC:</strong></h2><p style="text-align: left;">1f48ba6ce347cfba4882e70087ce6887</p><p style="text-align: left;"><a href="http://www.siyike[.]work" target="_blank">http://www.siyike[.]work</a></p><p style="text-align: left;"><a href="http://my.xindajiema[.]info" target="_blank">http://my.xindajiema[.]info</a></p><p style="text-align: left;">61.160.221.100</p><p style="text-align: left;"><br/></p><p style="text-align: left;"><br/></p><p style="display: none;"><mp-style-type data-value="3"></mp-style-type></p>



<p><a href="2247485754">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=1cda9bd0&amp;r=1&amp;u=https%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzU2OTcxNjE4Mw%3D%3D%26mid%3D2247485754%26idx%3D1%26sn%3D6b0afc3e6a45001a3a09c065f6cdab87%26subscene%3D0">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Tue, 18 Apr 2023 19:33:00 +0800</pubDate>
    </item>
    <item>
      <title>3CX Desktop App 遭供应链攻击，国内用户也未幸免。</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzU2OTcxNjE4Mw==&amp;mid=2247485734&amp;idx=1&amp;sn=8bbd90b94bf81819769a0aa1e8d25547</link>
      <description>上周知名企业电话系统3CX DeskTop App客户端软件遭遇供应链攻击，客户端安装包被植入恶意代码。</description>
      <content:encoded><![CDATA[<p>
<span></span> <span>2023-04-04 15:13</span> <span style="display: inline-block;">广东</span>
</p>

<p>上周知名企业电话系统3CX DeskTop App客户端软件遭遇供应链攻击，客户端安装包被植入恶意代码。</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=a82c3fc7&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2FXia34CufgojsNxA1NsIiaRaXDsqBAY0kz7hy6z1pZCu9p7BN0aaFFVTLIsmmXXV6wia98HWpx348NPVXekC4vrbgA%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p style="text-align: left;"><span style="font-size: 16px;">上周知名企业电话系统3CX DeskTop App客户端软件遭遇供应链攻击，客户端安装包被植入恶意代码。3CX Desktop App 是一款跨平台桌面电话应用程序，用户可以通过它进行聊天、消息、视频和语音交互。美国运通、可口可乐、麦当劳、宝马、本田、丰田、梅赛德斯-奔驰、宜家等都是他们的客户。依据3CX官网发布的公告，被注入恶意代码的客户端有多个版本，涉及MacOs和windows两个平台。在归因上各家安全公司都倾向于是朝鲜某APT组织策划了这次行动。</span></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.21139896373056996" data-s="300,640" style="" data-type="png" data-w="965" src="https://wechat2rss.xlab.app/img-proxy/?k=e30ae321&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsNxA1NsIiaRaXDsqBAY0kz7zicBSPgQFe6hGdEyPJfWm959zyOqFM5ib8dUWGC74oDqtDr6a7Yfu4dw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;"><span style="font-size: 16px;">根据SentinelOne 的安全报告显示他们于2023年3月22日首次收到告警并展开分析。毒霸安全团队也第一时间调查我们国内感染用户，介于初阶段样本时间戳是2022年11月12日，我们把调查时间线向前推进了半年，相较于国外的感染量，国内只有极少量用户感染，首例感染用户发生在2023年3月25日，且根据内存防护数据显示感染用户都只触发了第一阶段内存payload未见后续行为。使用毒霸扫描查杀和开启最高内存防护都可以有效拦截本次攻击。</span></p><p style="text-align: left;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.528169014084507" data-s="300,640" style="width: 422px;height: 223px;" data-type="png" data-w="568" src="https://wechat2rss.xlab.app/img-proxy/?k=9629570a&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsNxA1NsIiaRaXDsqBAY0kz7uP8l8jYZwvXaZ51cleHO7icG0iaeS4sy8ale567yGRqzuKianibliaZYE0Q%2F640%3Fwx_fmt%3Dpng"/></p><h2 style="white-space: pre-wrap;text-align: left;"><span style="font-size: 16px;">   </span></h2><h2 style="white-space: pre-wrap;text-align: left;"><span style="color: rgb(136, 136, 136);font-size: 24px;"><strong>攻击流程</strong></span></h2><p style="text-align: left;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.6585094549499444" data-s="300,640" style="" data-type="png" data-w="899" src="https://wechat2rss.xlab.app/img-proxy/?k=e3d6e839&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsNxA1NsIiaRaXDsqBAY0kz7gqHB5be2ChsTTJpfVfmXekC4yPnQwU84bxWPiaS0tWZPic7UJRQLAzibQ%2F640%3Fwx_fmt%3Dpng"/></p><h2 style="white-space: pre-wrap;text-align: left;"><span style="color: rgb(136, 136, 136);font-size: 24px;"><strong>详细分析</strong></span></h2><p style="text-align: left;"><span style="font-size: 16px;">以下分析基于windows平台18.12.416客户端版本。</span><span style="font-size: 16px;">母</span><span style="font-size: 16px;">体样本安装包3CXDesktopApp.msi具有3CX公司合法的数字签名。</span></p><p style="text-align: left;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.582441113490364" data-s="300,640" style="" data-type="png" data-w="934" src="https://wechat2rss.xlab.app/img-proxy/?k=53e807c6&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsNxA1NsIiaRaXDsqBAY0kz73Pz2qh2RUacECC1OJc21S8iad3nC2icHT5UJuhHkCXvpRreRzVkiamwTQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">安装后会释放如下文件，恶意代码存在于ffmpeg.dll 和 d3dcompiler_47.dll中，3CXDesktopApp.exe启动后会加载恶意模块ffmpeg.dll ，是一起典型的dll侧加载利用。</p><p style="text-align: left;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.9357638888888888" data-s="300,640" style="width: 488px;height: 457px;" data-type="png" data-w="576" src="https://wechat2rss.xlab.app/img-proxy/?k=65143f4e&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsNxA1NsIiaRaXDsqBAY0kz7RxicD9MxBOS4nZhcR4psxSuSKbZlsEW5fnmUVo4VxsUOgbKyicPtTDKQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">ffmpeg.dll 执行后创建互斥体”AVMonitorRefreshEvent“保证一个实例运行。随后读取同目录下的d3dcompiler_47.dll文件数据到内存，用特征码”0xfe 0xed 0xfa 0xce“从文件签名起始处开始搜索附加数据，此文件有正常的微软签名但是文件末尾被攻击者附加了加密的shellcode。</p><p style="text-align: left;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.5286129970902037" data-s="300,640" style="" data-type="png" data-w="1031" src="https://wechat2rss.xlab.app/img-proxy/?k=63a23044&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsNxA1NsIiaRaXDsqBAY0kz7HkhHicmS0adOCNP599ClKuX5Cn4fV3xtJiaicC1ePJiaRoqTQbGKgMEW7w%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">数据读取后用RC4进行shellcode解密，密钥”3jB(2bsG#@c7“，并修改执行权限跳转执行。shellcode中内嵌一个PE模块文件名&#34;samcli.dll&#34;，此shellcode的功能是在内存中反射装载samcli.dll，最后调用导出函数DllGetClassObject并传入以下参数执行。</p><p style="text-align: left;"><span style="background-color: rgb(178, 178, 178);">1200 2400 &#34;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) 3CXDesktopApp/18.11.1197 Chrome/102.0.5005.167 Electron/19.1.9 Safari/537.36&#34;</span></p><p style="text-align: left;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.3352007469654528" data-s="300,640" style="" data-type="png" data-w="1071" src="https://wechat2rss.xlab.app/img-proxy/?k=e3ee9bb2&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsNxA1NsIiaRaXDsqBAY0kz7v4aPbHd6bmkhKYHNJiawDeI2qiaD8tuNYfTvRwyKGS5NauTTBRWJqj3Q%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">在DllGetClassObject函数中，创建一个线程继续执行后续代码，攻击者创建了一个manifest文件，并写入了当前时间戳，每次启动进入到此处代码都会读取该值并与最新时间戳比较，如果大于才继续执行。根据代码设定潜伏期最短7天最长27天。</p><p style="text-align: left;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.8864774624373957" data-s="300,640" style="" data-type="png" data-w="599" src="https://wechat2rss.xlab.app/img-proxy/?k=25899437&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsNxA1NsIiaRaXDsqBAY0kz7pqlDLDXBtibCecXdGC7Eialn7icaTvbQq5RuBUM35JTpbsB6ANiaBmF6icw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">C2通讯地址托管在了github中。通过(rand() % 15 + 1）随机请求ico文件。https[:]//raw.githubusercontent[.]com/IconStorages/images/main/icon[1-15].ico</p><p style="text-align: center;"><img class="rich_pages wxw-img" data-height="208" data-ratio="0.22104144527098832" data-width="941" data-type="png" data-w="941" src="https://wechat2rss.xlab.app/img-proxy/?k=0bf4591c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsNxA1NsIiaRaXDsqBAY0kz7YCZv6vZEekElrs4EA52xEIWoxlHKBibCoVraqod7aYPAxjoGZS3297A%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">目前该项目已被删除。</p><p style="text-align: left;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.4324074074074074" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=16eabc40&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsNxA1NsIiaRaXDsqBAY0kz7F5YBjCvhiaayLFtC8xcEYuFPpO8Y7nSa57tibzo90gkNbmhthmibqIo5A%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">下载到的ico文件末尾被附加了加密的C2地址，通过特征码”$“倒序搜索定位到数据并进行解密。得到解密后的地址会继续请求下一阶段的payload。</p><p style="text-align: left;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.2944915254237288" data-s="300,640" style="" data-type="png" data-w="944" src="https://wechat2rss.xlab.app/img-proxy/?k=e388c191&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsNxA1NsIiaRaXDsqBAY0kz7OjAVib6HSQGdtwNomqVvJ4x3FQGh3VibRJicviaEibzaWcLc8PDUQ5njTCw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.47109207708779444" data-s="300,640" style="" data-type="png" data-w="934" src="https://wechat2rss.xlab.app/img-proxy/?k=30bc2f8b&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsNxA1NsIiaRaXDsqBAY0kz7tRXJX2OfWn2kUAqLmkbkXTQXZcm1LZwvfpFkrG1Bg1fcYeFXTI1FkQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">由于C2服务已经关闭无法获取到后续恶意模块，对于后续的代码从静态角度分析是可以直接在内存执行payload。</p><p style="text-align: left;"><img class="rich_pages wxw-img js_insertlocalimg" data-ratio="0.5248138957816377" data-s="300,640" style="" data-type="png" data-w="806" src="https://wechat2rss.xlab.app/img-proxy/?k=2f210e5f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsNxA1NsIiaRaXDsqBAY0kz7P42B6ZicKSvQSeBP8nBangfBWdDTFYVRd3KWKQdSuQK4xniaB1ntwYDQ%2F640%3Fwx_fmt%3Dpng"/></p><h2 style="white-space: pre-wrap;text-align: left;"><span style="font-size: 24px;"><strong><span style="font-size: 24px;color: rgb(136, 136, 136);">总结</span></strong></span></h2><p style="text-align: left;">每一次成功的供应链攻击都有其独特的特点和表现形式，这次的分析只是揭示了攻击的冰山一角，由于最终payload停止下发，并不清楚还有多少恶意功能，以及他们最终想要攻击的目标是谁。这次攻击非常隐秘，攻击者并不着急展开行动，而是等待合适的时机，静待猎物上钩。如果不能及时发现，由于3CX软件的广泛使用，将对多个行业带来巨大的威胁和损失。从样本的时间戳来看，攻击者很可能早在2022年11月前就开始行动了，这表明这是一场经过精心策划的攻击。事件发生后3CX公司的行动也是令人震惊，在3月22日发现软件被报毒后，被认为这是一起误报并在随后的数天内什么也没做，没有组织有效的内部调查错过了调查取证的关键时机，在收到多个安全厂商报告后，CEO试图将问题归咎到ffmpeg组织，随即ffmpeg组织发表声明他们不发布任何编译二进制文件，由此可以看出3CX公司在安全建设上存在严重问题。目前3CX公司已经聘请安全公司Mandiant介入调查，相信随着调查的深入，事件真相将很快水落石出。</p><h2 style="white-space: pre-wrap;text-align: left;"><strong><span style="font-size: 20px;">IOC：</span></strong></h2><p style="text-align: left;">74bc2d0b6680faa1a5a76b27e5479cbc</p><p style="text-align: left;">0eeb1c0133eb4d571178b2d9d14ce3e9</p><p style="text-align: left;">82187ad3f0c6c225e2fba0c867280cc9</p><p style="text-align: left;"><a href="https://msstorageazure[.]com/window" target="_blank">https://msstorageazure[.]com/window</a></p><p style="text-align: left;"><a href="https://officestoragebox[.]com/api/session" target="_blank">https://officestoragebox[.]com/api/session</a></p><p style="text-align: left;"><a href="https://visualstudiofactory[.]com/workload" target="_blank">https://visualstudiofactory[.]com/workload</a></p><p style="text-align: left;"><a href="https://azuredeploystore[.]com/cloud/services" target="_blank">https://azuredeploystore[.]com/cloud/services</a></p><p style="text-align: left;"><a href="https://msstorageboxes[.]com/office" target="_blank">https://msstorageboxes[.]com/office</a></p><p style="text-align: left;"><a href="https://officeaddons[.]com/technologies" target="_blank">https://officeaddons[.]com/technologies</a></p><p style="text-align: left;"><a href="https://sourceslabs[.]com/downloads" target="_blank">https://sourceslabs[.]com/downloads</a></p><p style="text-align: left;"><a href="https://zacharryblogs[.]com/feed" target="_blank">https://zacharryblogs[.]com/feed</a></p><p style="text-align: left;"><a href="https://pbxcloudeservices[.]com/phonesystem" target="_blank">https://pbxcloudeservices[.]com/phonesystem</a></p><p style="text-align: left;"><a href="https://akamaitechcloudservices[.]com/v2/storage" target="_blank">https://akamaitechcloudservices[.]com/v2/storage</a></p><p style="text-align: left;"><a href="https://azureonlinestorage[.]com/azure/storage" target="_blank">https://azureonlinestorage[.]com/azure/storage</a></p><p style="text-align: left;"><a href="https://msedgepackageinfo[.]com/microsoft-edge" target="_blank">https://msedgepackageinfo[.]com/microsoft-edge</a></p><p style="text-align: left;"><a href="https://glcloudservice[.]com/v1/console" target="_blank">https://glcloudservice[.]com/v1/console</a></p><p style="text-align: left;"><a href="https://pbxsources[.]com/exchange" target="_blank">https://pbxsources[.]com/exchange</a></p><p style="text-align: left;"><br/></p><p style="display: none;"><mp-style-type data-value="3"></mp-style-type></p>



<p><a href="2247485734">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=a0318c7f&amp;r=1&amp;u=https%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzU2OTcxNjE4Mw%3D%3D%26mid%3D2247485734%26idx%3D1%26sn%3D8bbd90b94bf81819769a0aa1e8d25547%26subscene%3D0">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Tue, 04 Apr 2023 15:13:00 +0800</pubDate>
    </item>
    <item>
      <title>“微马二代”：针对微信的大规模黑产活动</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzU2OTcxNjE4Mw==&amp;mid=2247485707&amp;idx=1&amp;sn=907e41e55ba2d5255ed50c8c7f4a9a90</link>
      <description>鹰眼威胁情报中心捕获一起针对微信的窃密攻击行动，并将其命名为“微马家族”。该木马利用流氓软件不仅窃密微信客户端用户Token，还进行定时暗刷引流。迄今为止导致全网受感染用户已达到百万级别。</description>
      <content:encoded><![CDATA[<p>
原创 <span>Mo</span> <span>2022-11-18 17:18</span> <span style="display: inline-block;">广东</span>
</p>

<p>鹰眼威胁情报中心捕获一起针对微信的窃密攻击行动，并将其命名为“微马家族”。该木马利用流氓软件不仅窃密微信客户端用户Token，还进行定时暗刷引流。迄今为止导致全网受感染用户已达到百万级别。</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=6d86afb7&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGWcZzzxCBcoyznibEhPmXZglzt6Ndiav4bahGulDSE3rt9HHxIwsS1iafg%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p style="text-align: center;"><img class="rich_pages wxw-img js_insertlocalimg" data-backh="282" data-backw="578" data-ratio="0.48671875" data-s="300,640" style="width: 100%;height: auto;" data-type="png" data-w="1280" src="https://wechat2rss.xlab.app/img-proxy/?k=abb958f6&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaG7O1g8IFzwJ0mU2PtwVHxOSAuiaBVRwsBfZzuKIBicS7GLFicGsdXfhwOw%2F640%3Fwx_fmt%3Dpng"/></p><h2 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-bottom: 8px;"><strong><span style="font-size: 20px;"></span></strong></h2><h2 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-bottom: 8px;"><strong><span style="font-size: 20px;">攻击事件介绍</span></strong></h2><p style="text-align: left;line-height: 1.75em;margin-bottom: 16px;">        鹰眼威胁情报中心团队于2021年4月披露了一起针对微信的窃密攻击行动（<a href="https://mp.weixin.qq.com/s?__biz=MzU2OTcxNjE4Mw==&amp;mid=2247485213&amp;idx=1&amp;sn=404b510db87e8ec992145e73bd87c541&amp;scene=21#wechat_redirect" data-linktype="2" style="color: rgb(0, 122, 170);text-decoration: underline;"><span style="color: rgb(0, 122, 170);">“微马来袭”：首例针对微信的大规模窃密攻击</span></a>），自披露以来我们对该家族的动向进行密切关注，发现其幕后团伙并没有收手，仍在不断发展壮大自己以攫取更多的利益。根据毒霸内存防护拦截数据显示，微马家族的感染规模、更新活跃度在众多针对微信客户端的黑产活动中位居前列。如下图所示，从2022至今为止“微马”的感染量持续攀升，平均月感染量在20万左右，可以预估该家族在近两年活跃的时间里导致全网受感染用户已达到百万级别。</p><section style="text-align: left;line-height: 1.75em;margin-bottom: 40px;"><img class="rich_pages wxw-img" data-backh="325" data-backw="578" data-height="1330" data-ratio="0.562037037037037" style="width: 100%;height: auto;" data-type="png" data-w="1080" data-width="2367" src="https://wechat2rss.xlab.app/img-proxy/?k=74cd1f5c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGibZdLkUSWWrS3biaqbgLpVHQ0icPwJzrpxSwq0enB8OMcT9fdpaxjYmNw%2F640%3Fwx_fmt%3Dpng"/></section><p style="text-align: left;line-height: 1.75em;margin-bottom: 16px;">        微马家族都是先通过流氓软件外壳伪装入驻用户系统，而后监控、注入微信进程并窃取用户授权令牌等敏感信息。此次捕获的木马在多个渠道传播，主要来源于以下几个流氓软件：</p><p style="text-align: left;line-height: 1.75em;margin-bottom: 40px;"><img class="rich_pages wxw-img" data-backh="231" data-backw="578" data-height="523" data-ratio="0.3990740740740741" style="width: 100%;height: auto;" data-type="png" data-w="1080" data-width="1311" src="https://wechat2rss.xlab.app/img-proxy/?k=0662705c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGMZDzE2MoY003dX3grsqpiaB5GhZcKia3zMAj0Ric1xLXeZqt1f0wGUicjg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;line-height: 1.75em;margin-bottom: 16px;">    在捕获的新一代&#34;微马&#34;样本中我们发现，除了收集用户关键的微信token外，还定时暗刷广告营销类公众号文章进行引流，让大量的微信用户成为他们牟利的工具。在分析过程中我们拉取了上百条配置链接，经过对内容分类统计发现其中暗刷对象主要涉及美食、购物、汽车、房产、美妆等广告营销类文章。</p><section style="margin-bottom: 40px;text-align: left;line-height: 1.75em;"><img class="rich_pages wxw-img" data-backh="400" data-backw="578" data-height="2631" data-ratio="0.6925925925925925" style="width: 100%;height: auto;" data-type="png" data-w="1080" data-width="3800" src="https://wechat2rss.xlab.app/img-proxy/?k=7ae3e683&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGQu5gMaQjoWrCfV9lh36EFWibrsVBkyf8yeAoZFjxx6fCyiaGN6Bt3vNw%2F640%3Fwx_fmt%3Dpng"/></section><p style="text-align: left;line-height: 1.75em;margin-bottom: 40px;">    综上可见发展壮大后的“微马”家族产业链已更加完善、分发渠道更加丰富，样本攻击更为活跃。</p><h2 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-bottom: 8px;"><strong><span style="font-size: 20px;">流程概要</span></strong></h2><p style="text-align: left;line-height: 1.75em;margin-bottom: 16px;">        攻击者为了提高用户感染率，将微马模块藏匿在流氓软件的安装包内。一旦在用户计算机安装成功则会将该模块注册成恶意服务实现持久化驻留。服务通过远控服务器下拉攻击载荷，该载荷启动后解密出窃密模块，对微信进程进行检测和反射式DLL注入，在内存中使用正则匹配暴力搜索访问链接的关键位置并且安装Hook，实时监控窃取用户令牌数据、下载流量配置，从而实现&#34;流量暗刷&#34;、“广告引流”等真正目的。</p><p style="text-align: left;line-height: 1.75em;margin-bottom: 40px;"><img class="rich_pages wxw-img" data-backh="425" data-backw="578" data-height="4650" data-ratio="0.7361111111111112" style="width: 100%;height: auto;" data-type="png" data-w="1080" data-width="6316" src="https://wechat2rss.xlab.app/img-proxy/?k=c0cf8fac&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGFPDZaZZUVDD0NKIkPRB2X5dWBmmMyeBwT8tld18zGXBsgnlHoU2I2w%2F640%3Fwx_fmt%3Dpng"/></p><h2 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-bottom: 8px;"><strong><span style="font-size: 20px;">详细分析</span></strong></h2><h3 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-bottom: 8px;"><strong><span style="font-size: 18px;">1. 初始执行</span></strong></h3><p style="text-align: left;line-height: 1.75em;margin-bottom: 16px;">        此次捕获的微马模块由“整点播报”安装包释放。该程序具有数字签名“Wuhan Weizhinuo Network Technology Co., Ltd.”。该流氓软件被静默安装在用户计算机的同时释放注册了DrthServer服务，此服务对应落地文件DxpwServer.exe。</p><p style="text-align: left;line-height: 1.75em;margin-bottom: 40px;"><img class="rich_pages wxw-img" data-backh="325" data-backw="578" data-height="3970" data-ratio="0.562962962962963" style="width: 100%;height: auto;" data-type="png" data-w="1080" data-width="7049" src="https://wechat2rss.xlab.app/img-proxy/?k=0bf94429&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGrHDebzTAribjjHUTZaRL5GI1dR4wLygEEUytjEJKrJ7Csz1VDTjvCag%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;line-height: 1.75em;margin-bottom: 16px;">        为了增强对抗，安装包根据用户环境的差异会释放两种不同版本：在测试环境中，被安装包释放的服务只有对流氓软件进程自保的单一功能；而在用户环境中，我们捕捉到的则是携带恶意功能的服务模块。两个服务文件的签名一致，但是恶意服务的体积较大，通常为400KB以上。</p><section style="text-align: center;margin-bottom: 40px;"><img class="rich_pages wxw-img js_insertlocalimg" data-backh="288" data-backw="578" data-ratio="0.4984375" data-s="300,640" style="width: 100%;height: auto;" data-type="png" data-w="1280" src="https://wechat2rss.xlab.app/img-proxy/?k=6f5a9db9&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGlOhJvGtl54icTDNrx2XjQnJYclUAWL8WdTaDicQONo7tKfhKjWbiam4Jg%2F640%3Fwx_fmt%3Dpng"/></section><h3 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-bottom: 8px;"><strong><span style="font-size: 18px;">2. 对抗手段</span></strong></h3><h4 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-bottom: 8px;"><strong><span style="font-size: 17px;">(1) 字符串加密</span></strong></h4><p style="text-align: left;line-height: 1.75em;margin-bottom: 16px;">        DxpwServer服务文件由易语言编写，且其中重要的字符串均被加密，以对抗杀软检测，加大安全人员分析的难度。</p><section style="text-align: center;margin-bottom: 40px;"><img class="rich_pages wxw-img js_insertlocalimg" data-backh="295" data-backw="578" data-ratio="0.51015625" data-s="300,640" style="width: 100%;height: auto;" data-type="png" data-w="1280" src="https://wechat2rss.xlab.app/img-proxy/?k=eeb22390&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGxoNeKfxQYnBtkyETIq5uDvfm0WgWPWCkYAJBxEx2bF1Po7AxHLHIfg%2F640%3Fwx_fmt%3Dpng"/></section><h4 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-bottom: 8px;"><strong><span style="font-size: 17px;">(2) 环境检查</span></strong></h4><p style="text-align: left;line-height: 1.75em;margin-bottom: 16px;">        在服务运行中有多处位置在执行到关键步骤之前，都会通过查询下列相关进程判断是否有杀软、调试工具、虚拟机或者同系列的木马服务进程已经启动，如果有则直接禁用当前服务。</p><p style="text-align: left;line-height: 1.75em;margin-bottom: 40px;"><img class="rich_pages wxw-img" data-backh="142" data-backw="578" data-height="355" data-ratio="0.2462962962962963" style="width: 100%;height: auto;" data-type="png" data-w="1080" data-width="1441" src="https://wechat2rss.xlab.app/img-proxy/?k=f47a61fb&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGYzNRIKNJpNpvO4HHgyCYL57LTEc38kAY754Uv8EzdJzJoVrFMhUQRw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;line-height: 1.75em;margin-bottom: 16px;">        同时，服务还会查询注册表判断是否有同系列的木马已经植入到用户系统，如果有相关注册信息则退出服务进程。相关注册表项如下：</p><p style="text-align: left;line-height: 1.75em;margin-bottom: 40px;"><img class="rich_pages wxw-img" data-backh="262" data-backw="578" data-height="661" data-ratio="0.4527777777777778" style="width: 100%;height: auto;" data-type="png" data-w="1080" data-width="1460" src="https://wechat2rss.xlab.app/img-proxy/?k=4e42daec&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGSgYxDjZUL3ibc3NJibqbEzvIV5nEpLUDr3LUWL00GbOQc1eXYPWRGJUQ%2F640%3Fwx_fmt%3Dpng"/></p><h4 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-bottom: 8px;"><strong><span style="font-size: 17px;">(3) 反射式DLL注入</span></strong></h4><p style="text-align: left;line-height: 1.75em;margin-bottom: 24px;">        恶意软件为了提高自身隐蔽性，利用DLL注入技术将恶意代码注入微信进程，注入完成后使用远程线程调用木马模块的DllEntryPoint函数执行初始化动作。从服务器下拉配置到启动恶意模块的期间无任何文件落地，同时增加了查杀检测难度。</p><h4 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-bottom: 8px;"><strong><span style="font-size: 17px;">(4) 持久化和更新模块</span></strong></h4><p style="text-align: left;line-height: 1.75em;margin-bottom: 40px;">        攻击者通过在用户计算机中注册服务，实现长期稳定地从远程服务器下载更新配置，其中包含注入微信进程的恶意载荷和广告暗刷的配置链接。</p><h3 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-bottom: 8px;"><strong><span style="font-size: 18px;">3. 下载服务配置</span></strong></h3><h4 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-bottom: 8px;"><strong><span style="font-size: 17px;">(1) 查询微信进程</span></strong></h4><p style="text-align: left;line-height: 1.75em;margin-bottom: 16px;">        通过查询wechat.exe、WeChatResource.dll进程是否存在来判断微信的运行状态，当微信启动时才会执行下一步骤。</p><p style="text-align: left;line-height: 1.75em;margin-bottom: 40px;"><img class="rich_pages wxw-img" data-backh="324" data-backw="578" data-height="771" data-ratio="0.5611111111111111" style="width: 100%;height: auto;" data-type="png" data-w="1080" data-width="1374" src="https://wechat2rss.xlab.app/img-proxy/?k=ed77a621&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGmZ0YwZfBwBujMgcEmzdPz2efXKEjzBvdOFPiak9UrY61j0ax3l6ZPIg%2F640%3Fwx_fmt%3Dpng"/></p><h4 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-bottom: 8px;"><strong><span style="font-size: 17px;">(2) 获取云控配置</span></strong></h4><p style="text-align: left;line-height: 1.75em;margin-bottom: 16px;">        当服务确保微信正在运行之后，则会与C2地址：<span style="color: rgb(0, 122, 170);">222.187[.]232.40 </span>的地址进行通讯，访问 <span style="text-decoration: underline;color: rgb(0, 122, 170);"><a href="http://yihuafence.com/dates.zip " target="_blank">http://yihuafence.com/dates.zip </a></span>将数据获取到内存中：</p><section style="text-align: center;margin-bottom: 40px;"><img class="rich_pages wxw-img js_insertlocalimg" data-backh="304" data-backw="578" data-ratio="0.52578125" data-s="300,640" style="width: 100%;height: auto;" data-type="png" data-w="1280" src="https://wechat2rss.xlab.app/img-proxy/?k=01822f63&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGVic1otlv4RsvtKQ8XM2HS3MVGAldWFNYz1HicwIQiafHTcicZewABpzC6A%2F640%3Fwx_fmt%3Dpng"/></section><p style="text-align: left;line-height: 1.75em;margin-bottom: 16px;">        通过将内存数据解密，我们捕获到真正的恶意载荷，模块名称是“发送统计.dll”，该文件是由易语言编写，其中重要的字符串仍然使用同一方式进行加密。</p><section style="text-align: center;margin-bottom: 40px;"><img class="rich_pages wxw-img js_insertlocalimg" data-backh="325" data-backw="578" data-ratio="0.5625" data-s="300,640" style="width: 100%;height: auto;" data-type="png" data-w="1280" src="https://wechat2rss.xlab.app/img-proxy/?k=3e7e49b0&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGhicBA7DQzSFxaLlsWicTC0HZ0swmuun8bbTV0kg7Gy0fYJt7ibj5qpzRw%2F640%3Fwx_fmt%3Dpng"/></section><p style="text-align: left;line-height: 1.75em;margin-bottom: 16px;">        “发送统计.dll”是微马的核心功能模块，根据内存防护引擎捕捉到的数据显示，该模块每隔数月就会更新一代，与微信版本更新基本保持同步，截止本报告完成微信11月10号发布最新版本为3.8.0，该团伙已在11月15号完成了核心模块更新。</p><p style="text-align: center;line-height: 1.75em;margin-bottom: 40px;"><img class="rich_pages wxw-img" data-height="865" data-ratio="0.9261241970021413" style="width: 338px;height: auto;" data-type="png" data-w="934" data-width="934" src="https://wechat2rss.xlab.app/img-proxy/?k=a6102293&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGYA7icUrANdxr40Ufk7eIDjd1PiaQAh9ZVE44pNl548yVkG7lFCqPicfaA%2F640%3Fwx_fmt%3Dpng"/></p><h3 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-bottom: 8px;"><strong><span style="font-size: 18px;">4. 反射式注入微信</span></strong></h3><h4 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-bottom: 8px;"><strong><span style="font-size: 17px;">(1) 注入恶意载荷</span></strong></h4><p style="text-align: left;line-height: 1.75em;margin-bottom: 16px;">        在确定用户计算机环境安全且正在运行微信进程之后，向WeChat.exe中注入解密后的“发送统计.dll”模块：</p><p style="text-align: center;margin-bottom: 40px;"><img class="rich_pages wxw-img js_insertlocalimg" data-backh="331" data-backw="578" data-ratio="0.5734375" data-s="300,640" style="width: 100%;height: auto;" data-type="png" data-w="1280" src="https://wechat2rss.xlab.app/img-proxy/?k=9b4b2356&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaG2xg5RJJxm9uia6WWcu3cZmgfKCFkUY8kR6pbBVNaOMEZQ9TayHrVHng%2F640%3Fwx_fmt%3Dpng"/></p><h4 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-bottom: 8px;"><strong><span style="font-size: 17px;">(2) 注入启动ReflectiveLoader</span></strong></h4><p style="text-align: left;line-height: 1.75em;margin-bottom: 16px;">        装载恶意载荷的ReflectiveLoader则是一段内嵌在服务文件“.data”段的shellcode，功能为内存展开模块并且调用库函数 ，木马服务将其写入Wechat.exe的内存，利用远程线程调用实现在微信进程中反射装载恶意DLL：</p><p style="text-align: left;line-height: 1.75em;margin-bottom: 40px;"><img class="rich_pages wxw-img" data-backh="342" data-backw="578" data-height="816" data-ratio="0.5916666666666667" style="width: 100%;height: auto;" data-type="png" data-w="1080" data-width="1379" src="https://wechat2rss.xlab.app/img-proxy/?k=c0952d74&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGjiavEA5sCIERSicBibl2hDlzzN7YFJMLpSyoaSHPia6AhwUVyMpt2D3HIw%2F640%3Fwx_fmt%3Dpng"/></p><h3 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-bottom: 8px;"><span style="font-size: 18px;"><strong>5. 分析恶意载荷</strong></span></h3><h4 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-bottom: 8px;"><strong><span style="font-size: 17px;">(1) 检查环境</span></strong></h4><p style="text-align: left;line-height: 1.75em;margin-bottom: 16px;">        攻击者在恶意载荷中仍会不断检查环境是否能够继续安全地执行恶意操作，比如：确认当前模块是否为微信的进程、验证微信是否登录、是否正在运行各类杀软、抓包工具、虚拟机及调试器等程序。</p><section style="text-align: center;margin-bottom: 40px;"><img class="rich_pages wxw-img js_insertlocalimg" data-backh="325" data-backw="578" data-ratio="0.56328125" data-s="300,640" style="width: 100%;height: auto;" data-type="png" data-w="1280" src="https://wechat2rss.xlab.app/img-proxy/?k=2923b0e9&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGlpdec8xY8Ou85fb3nSJW8RWMkfkCkRibJgDQFRibppCBu472w0B67bew%2F640%3Fwx_fmt%3Dpng"/></section><h4 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-bottom: 8px;"><strong><span style="font-size: 17px;">(2) 下拉暗刷配置</span></strong></h4><p style="text-align: left;line-height: 1.75em;margin-bottom: 16px;">        在检查环境之后若没有出现异常，则请求IP地址为 <span style="color: rgb(0, 122, 170);">216.83[.]45.51:4018 </span>的服务器 <span style="color: rgb(0, 122, 170);text-decoration: underline;">serviceswechat.com</span><span style="color: rgb(0, 122, 170);"> </span>下载加密配置，该链接是高仿微信的地址 <span style="color: rgb(0, 122, 170);text-decoration: underline;">servicewechat.com </span>（仅多了一个字母“s”），在流量分析时很容易混淆在海量的正常微信流量中。下载的配置经解密以json的格式呈现，其中url都是微信公众号文章链接。服务配置更新的周期为一小时，每次下发配置中的链接总量都是27条，且链接URL和文章内容均不相同。</p><section style="text-align: center;margin-bottom: 40px;"><img class="rich_pages wxw-img js_insertlocalimg" data-backh="256" data-backw="578" data-ratio="0.44296875" data-s="300,640" style="width: 100%;height: auto;" data-type="png" data-w="1280" src="https://wechat2rss.xlab.app/img-proxy/?k=678e1876&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaG3YZBxa4E9AOvNLmn4PbOseBvAibxa0t6UwSRDd9mlHKF2SvAkzm4aVg%2F640%3Fwx_fmt%3Dpng"/></section><h4 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-left: 8px;margin-right: 8px;"><strong><span style="font-size: 17px;">(3) 窃密用户Token</span></strong></h4><p style="text-align: left;line-height: 1.75em;margin-bottom: 16px;">        木马使用正则搜索定位到WechatWin.dll模块中与链接访问相关的目标位置，将需要HOOK的地址原汇编记录保存，跳转至新申请的内存空间安装钩子执行木马逻辑后返回原地址继续执行：</p><p style="text-align: left;line-height: 1.75em;margin-bottom: 40px;"><img class="rich_pages wxw-img" data-backh="356" data-backw="578" data-height="819" data-ratio="0.6157407407407407" style="width: 100%;height: auto;" data-type="png" data-w="1080" data-width="1330" src="https://wechat2rss.xlab.app/img-proxy/?k=8c999291&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaG6dXg5rSWmiarfKtx2rtnWCSBZHFGvicPTRlT9fapw349JVFKrFXWRictA%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;line-height: 1.75em;margin-bottom: 16px;">        当用户在正常访问链接时，微信进程会执行到钩子的位置，实现获取链接中用户令牌相关字段的数据：uin、key、pass_ticket、devicetype、version。</p><section style="text-align: center;margin-bottom: 40px;"><img class="rich_pages wxw-img js_insertlocalimg" data-backh="421" data-backw="578" data-ratio="0.72734375" data-s="300,640" style="width: 100%;height: auto;" data-type="png" data-w="1280" src="https://wechat2rss.xlab.app/img-proxy/?k=5b44d9af&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGvZvkibgyGcYVbxLtPTKQuQR1RD7Cu0dkdMec8SkZV8tGia54ZvEr8wJA%2F640%3Fwx_fmt%3Dpng"/></section><p style="text-align: left;line-height: 1.75em;margin-bottom: 16px;">        而后将关键数据与特殊字符进行拼接组合，使用base64的加密方法加密后再进行倒序产生了一个新的数据包，发送至云端恶意IP：<span style="color: rgb(0, 122, 170);">216.83[.]45.52</span> （<span style="color: rgb(0, 122, 170);text-decoration: underline;"><a href="http://serviceswechat.com:2837" target="_blank">http://serviceswechat.com:2837</a></span>）。被收集的用户关键令牌信息也极有可能被利用在其他黑产和恶意活动之中，值得微信用户警惕。</p><p style="text-align: left;line-height: 1.75em;margin-bottom: 40px;"><img class="rich_pages wxw-img" data-backh="399" data-backw="578" data-height="1312" data-ratio="0.6907407407407408" style="width: 100%;height: auto;" data-type="png" data-w="1080" data-width="1900" src="https://wechat2rss.xlab.app/img-proxy/?k=32ccb9ae&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGck5t3LUZlu9snGdxoJHQ1klwQ2WVibA7KVXNGYAgP5o7bYD2gYhYLeA%2F640%3Fwx_fmt%3Dpng"/></p><h4 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-bottom: 8px;"><strong><span style="font-size: 17px;">(4) 暗刷流量</span></strong></h4><p style="text-align: left;line-height: 1.75em;margin-bottom: 16px;">        访问链接的部分使用了双层循环嵌套，外部循环会确认“WechatBrowser.exe”以及微信窗口是否运行以保证能正常调用接口，内部循环通过内存定位wechatwin.dll中web访问的函数地址，将链接地址作为参数传入完成暗刷操作。</p><section style="text-align: center;margin-bottom: 40px;"><img class="rich_pages wxw-img js_insertlocalimg" data-backh="441" data-backw="578" data-ratio="0.76328125" data-s="300,640" style="width: 100%;height: auto;" data-type="png" data-w="1280" src="https://wechat2rss.xlab.app/img-proxy/?k=31c3ce08&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGRsDKiaC6PZqQFPfUD4VFomVanvarZMmcwkPV01dkjQ3CgbBETIXmPYA%2F640%3Fwx_fmt%3Dpng"/></section><p style="text-align: left;line-height: 1.75em;margin-bottom: 16px;">        如下图所示，源自配置链接的文章访问量可达到其他同类公众号文章的数倍之多。</p><section style="text-align: center;margin-bottom: 40px;"><img class="rich_pages wxw-img js_insertlocalimg" data-backh="208" data-backw="578" data-ratio="0.36015625" data-s="300,640" style="width: 100%;height: auto;" data-type="png" data-w="1280" src="https://wechat2rss.xlab.app/img-proxy/?k=55619196&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaG6e3mxnSibvhmPDA84StywbLABdciaic24NibjrOYDCLMq7FBDEIpxWUnFQ%2F640%3Fwx_fmt%3Dpng"/></section><h2 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-bottom: 8px;"><strong><span style="font-size: 20px;">关联同源样本</span></strong></h2><h2 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-bottom: 8px;">        登录鹰眼情报中心（<span style="font-size: 17px;color: rgb(0, 122, 170);text-decoration: underline;"><a href="https://ti.duba.net" target="_blank">https://ti.duba.net</a></span><span style="font-size: 17px;">）搜索或者上传样本后查看分析出的C2配置，通过IP地址查看所属家族和地区等详细信息，在“关联情报”里点击相关通信文件等选项即可获取关联的同源家族样本。</span></h2><p style="text-align: left;line-height: 1.75em;margin-bottom: 40px;"><img class="rich_pages wxw-img" data-backh="307" data-backw="578" data-height="1296" data-ratio="0.5305555555555556" style="width: 100%;height: auto;" data-type="png" data-w="1080" data-width="2443" src="https://wechat2rss.xlab.app/img-proxy/?k=4fa09d30&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGBBWJv9Co4m3NOLXlyxWcaXWiam5EIFx3Eyyz38MN3QXdDIMQJSb9LPg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;line-height: 1.75em;margin-bottom: 40px;"><img class="rich_pages wxw-img" data-backh="307" data-backw="578" data-height="1298" data-ratio="0.5314814814814814" style="width: 100%;height: auto;" data-type="png" data-w="1080" data-width="2441" src="https://wechat2rss.xlab.app/img-proxy/?k=47ce4423&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGUZ8Q4B959DSplvuCNYNBeE7ooayjiaUDFtdvVE5WB4kcf1RG8tN3mKg%2F640%3Fwx_fmt%3Dpng"/></p><h2 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;margin-bottom: 8px;"><strong><span style="font-size: 20px;">总结</span></strong></h2><p style="text-align: left;line-height: 1.75em;margin-bottom: 16px;">        在自媒体时代的洪流之下，用户个人流量已经成为商家的获利工具，与此同时必然会衍生出大量黑灰产业赚取红利。微马家族就是借助流氓软件易感染、难清除的“优势”潜伏在用户系统内，逐步形成了一条成熟的暗刷推广链。从溯源结果来看每个下放的微马服务中代码相似度很高，其中不仅有公众号相关的链接处理，还预留了视频号相关的处理逻辑，随着微信的产品功能升级，木马也会更新迭代加入新的黑产功能。而身为病毒携带传播者的流氓软件风险危害仍然不容小觑，需要及时做好检测清理和防范措施。目前毒霸已支持对该病毒的查杀：</p><p style="text-align: left;line-height: 1.75em;margin-bottom: 40px;"><img class="rich_pages wxw-img" data-backh="405" data-backw="578" data-height="702" data-ratio="0.7005988023952096" style="width: 100%;height: auto;" data-type="png" data-w="1002" data-width="1002" src="https://wechat2rss.xlab.app/img-proxy/?k=6f2a8003&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGGgfw5by3nFjBibEvwUsPMUhibibJEajk1rdbPbHHibUPexfSSusXibJvwyQ%2F640%3Fwx_fmt%3Dpng"/></p><h2 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;"><strong><span style="font-size: 20px;">IOCs</span></strong></h2><h3 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;"><strong><span style="font-size: 18px;">MD5（部分）</span></strong></h3><section style="text-align: left;line-height: 1.75em;"><img class="rich_pages wxw-img" data-height="721" data-ratio="0.9863201094391245" style="width: 382px;height: 377px;" data-type="png" data-w="731" data-width="731" src="https://wechat2rss.xlab.app/img-proxy/?k=4bc8980f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGFAqiaUEDETpz6kf2FcY1Ihl2icoXDx4IiattDtic9Jaw48ItwLg0GY7VRA%2F640%3Fwx_fmt%3Dpng"/></section><h3 style="white-space: pre-wrap;text-align: left;line-height: 1.75em;"><strong><span style="font-size: 18px;">C&amp;C</span></strong></h3><section style="text-align: left;line-height: 1.75em;"><img class="rich_pages wxw-img" data-height="148" data-ratio="0.2252663622526636" style="width: 471px;height: 106px;" data-type="png" data-w="657" data-width="657" src="https://wechat2rss.xlab.app/img-proxy/?k=d663c3b0&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvs3OsAjcgZFSSbsKMPufaGUia91TnC8lxS11tiaCvESyOoA1pYVUqibwF6ZrFpkjRjIlBGpbOzITcDg%2F640%3Fwx_fmt%3Dpng"/></section><section style="text-align: left;line-height: 1.75em;"><br/></section><section style="text-align: left;line-height: 1.75em;"><span data-lark-record-data="{&#34;isCut&#34;:false,&#34;rootId&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;parentId&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;blockIds&#34;:[3,4,98,6,7,99,105,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,109,108,107,44,45,46,47,48,49,50,51,52,53,54,55,56,110,93,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87],&#34;recordIds&#34;:[&#34;IWI8dq0KAoKEC4xmMnBcoFYNnmc&#34;,&#34;YYGKdMiMwogGSyx69CIcH9PXnkd&#34;,&#34;TCwad26kUoAUy6xyBBocU6v3nCB&#34;,&#34;WAA4d4CyuouSuOx6nhHcyB3Jn5F&#34;,&#34;Y4QWdiiG0oS80uxMZaecNeGUnAf&#34;,&#34;Jm2cdoEEioCKk6xmwaYcbLewnQc&#34;,&#34;BqkYd6u40ok44OxeQKqcRzVan3g&#34;,&#34;RaAUd2SMsoqyQ4xYtdZc2wjrnOg&#34;,&#34;QmeydAOiSomMgoxWKokcfGlcngh&#34;,&#34;TwO8dgw2Ooomg2xU3qFcXxybn6c&#34;,&#34;DmMWds2EIo6sMgxHZkNccz1jnh5&#34;,&#34;U2m0dgYG6oWaK0xw76WcJ7HZnDe&#34;,&#34;WYAQdsEkOoEwqix4Xq7cYrv2nIg&#34;,&#34;Fy0CdIwiio4S86xmI0HcVE0PnVc&#34;,&#34;Mogmdkai4ocUG4xoXhzcOfc4nug&#34;,&#34;M8aOd4QO4oSeW4x8fVscsjdcnQc&#34;,&#34;Sm4OdGyKQomYuoxm8ztcYBhwnIf&#34;,&#34;HMU0d4iYioMQmSxcRPtcS7Own2e&#34;,&#34;TYUkdSuayoyU0Wx2Dnscwf8Pnyf&#34;,&#34;C0cedmkGKosEIaxoNSmc91YJnjb&#34;,&#34;GsMidSE2MowAYaxcVf1cpi7Rnbf&#34;,&#34;Z8ukdYQ8Ko0ugOxKsiScVJf3nth&#34;,&#34;Gwa0dYomwomm8sxGSQhc93iInfd&#34;,&#34;HwUSduWEOomCysxc1OVcpWPynuf&#34;,&#34;ECscdgasYo6IGsxMX1qcDclpnye&#34;,&#34;Z86Md60yOoEEAsxkpXUctiI1nLg&#34;,&#34;Q2qmdCe8eoeIigxI7j2cUlcvnNg&#34;,&#34;Bygqd6SGGoyKuIx8QK9cZ6wgnag&#34;,&#34;Ayked0yoEoOmASxkjMJckM5ynNb&#34;,&#34;HyocduioIoIYaIxk37fcRXwsnRg&#34;,&#34;GqaIduU04oqEgYxEjb0c3FGAnZg&#34;,&#34;BaosdEcGSoIacWxUFUccER3Fnef&#34;,&#34;O82UdkgqqoMuUmxml8pcuxztnjQ&#34;,&#34;PUsydWMoCo8gyixm45HcLMUCnRd&#34;,&#34;BA8edK04uoE8SGxyymJcVVwrnBd&#34;,&#34;VsmodO4ewo2AOmxmCVBc3HHtnfe&#34;,&#34;EmOEdggEYoosIqxsvwvcnOpdnEK&#34;,&#34;NGImd22yMouS64xOE96ct1kwnAe&#34;,&#34;L66ydw2OsoIOg2xwz3Dc81p1npd&#34;,&#34;KM4Yd0OcsoO4myxEDFockw4tnpd&#34;,&#34;Cco4demoGou2oEx8blVcAZtQncf&#34;,&#34;EYS2d28qmoMO6ixs9xCc93A8nsb&#34;,&#34;PO6qdkAweowOqmx6nepcjinlnlc&#34;,&#34;II0GdYcwmokKO0xQpjycP13tnEf&#34;,&#34;KWiydCqYgoysQax6b8vccjB7nTe&#34;,&#34;RcGIdgGG4o0eQOxg7mBcLZMlnxd&#34;,&#34;VOQAdMyo2oyWyaxemtBcGhhmnEL&#34;,&#34;D8k8dUoyWokISUxCanmcQNd7n3f&#34;,&#34;SAa8dqYESoKQ40xMloHci3fNnvh&#34;,&#34;KQKKdAsWKo86qGx6oyeczjolnQf&#34;,&#34;EIo2diQMOoi8S8x6X4Dcx1wXnOe&#34;,&#34;TMG6dqYSyoIm8IxKM2QcvI1Unag&#34;,&#34;Hcood6Owkoa2uYxAp18cTciuntg&#34;,&#34;Eac8dY2ySocSWgxwj69cI6THnzb&#34;,&#34;ZWKqdiIuwoS0M6xc9yHc0dHBnKd&#34;,&#34;ZUWYdmSAOo26uExWg1ncSxicnGe&#34;,&#34;AkQudoMCmoOu0AxcPDdcSts0nxc&#34;,&#34;KeWydiqouoUKqOxv6zkc68LhnHV&#34;,&#34;MK4sdWswao4sGOxGgnwcaYzxn3e&#34;,&#34;AcoEdCySco0MuCx4GkqcRMHfnyc&#34;,&#34;YyGEd2sqyo2WqUxoT7pcdxB8nlc&#34;,&#34;ZuSidQUomo4Gm4xsbmqcWVeFnLg&#34;,&#34;EU0cdsYaCo2kqqxOOczcT1TVn6e&#34;,&#34;AuuKdKWO4o4Mc2xIxkucq4bKnUX&#34;,&#34;PsCmds8UmooEeqxKwmvclbgSnlh&#34;,&#34;Fg4admsKEoYaY8xGgt6chXkPn7b&#34;,&#34;No8WdoWUCouq0ax27IlcBBYfnUh&#34;,&#34;H4KOdgC4QoK4QUxq6dqcLgFOnAd&#34;,&#34;AAasdiC28oKyKWx29T3cwQFsnpb&#34;,&#34;R8qwdcaGUoC64OxCMAKcqWaEnyd&#34;,&#34;GSaAdyMMcoeKaGx21jIcZ6i2n8d&#34;,&#34;FS86dSA8CoqGQsxaSaYcZt7lnZd&#34;,&#34;J8SWd8g00o22CoxigltcLyyfnHf&#34;,&#34;Oyeody2Ymoe66WxQPeAcwrCJnVc&#34;,&#34;CekudwAUooUkEQx2tircbu19n4c&#34;,&#34;XUeqdgWEEoQ6EaxOmiKcVK8rn7g&#34;,&#34;J620dKessom6oIxmUyWcG5xhnth&#34;,&#34;QEM2d4I0MouMWcxCkWbcUycTn8f&#34;,&#34;HUQOdsKQuoQsOCxKOjPc8TfHnvb&#34;,&#34;Vuo2dAwucoam62xGmaCcNbITnhf&#34;,&#34;W8c2d08YiowKSoxC8BtcdGLEnRd&#34;,&#34;H6qOdo2g0oe4o4xhvyEcZZFinwc&#34;,&#34;PoimdSAwCowciqxaQJ2cI9SrnMd&#34;,&#34;OS4udeww4oKEGyxkNbmcdUu6nDg&#34;,&#34;CO0qdkwaKoeow6xGQHAcuiWnnQd&#34;,&#34;UEM4dAE22oOuiyxcbOQc4KMtnDe&#34;,&#34;QcModmIsMoi44wxei6ecFEPVn2y&#34;,&#34;VAumdA2i0oK2YYxSgaecY9t3nxf&#34;,&#34;RWiId64Q2ouACCx4j8bcEP15ntb&#34;],&#34;recordMap&#34;:{&#34;IWI8dq0KAoKEC4xmMnBcoFYNnmc&#34;:{&#34;id&#34;:&#34;IWI8dq0KAoKEC4xmMnBcoFYNnmc&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading2&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+6&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;攻击事件介绍&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;YYGKdMiMwogGSyx69CIcH9PXnkd&#34;:{&#34;id&#34;:&#34;YYGKdMiMwogGSyx69CIcH9PXnkd&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[&#34;7166889005601243164&#34;,&#34;7166884884983562244&#34;],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006010576289796&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;鹰眼威胁情报中心团队于2021年4月披露了一起针对微信的窃密攻击行动（“微马来袭”：首例针对微信的大规模窃密攻击），自披露以来我们对该家族的动向进行密切关注，发现其幕后团伙并没有收手，仍在不断发展壮大自己以攫取更多的利益。根据毒霸内存防护拦截数据显示，微马家族的感染规模、更新活跃度在众多针对微信客户端的黑产活动中位居前列。如下图所示，从2022至今为止“微马”的感染量持续攀升，平均月感染量在20万左右，可以预估该家族在近两年活跃的时间里导致全网受感染用户已达到百万级别。&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+b*1+a*0+2*1+c*1*2*3+l*1+d*0+7*1+3*0+3*1+a*0+2*1+h*0+e*1+w*0+c*1+4*0+9*1+8*1*4+c*0*4+1*1*5+7*0*5+2*1*5+2*0*5+3*1*5+2*0*5+3*1*5+7*0*5+3*1*5+5&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;],&#34;1&#34;:[&#34;author&#34;,&#34;7079006010576289796&#34;],&#34;2&#34;:[&#34;link&#34;,&#34;https%3A%2F%2Fmp.weixin.qq.com%2Fs%2F1RY0x5AXd23RzhcwJ7k5vA&#34;],&#34;3&#34;:[&#34;link-id&#34;,&#34;ef5a8f63-61ae-4181-8c62-40d6b84e9f1d&#34;],&#34;4&#34;:[&#34;comment-id-7166884884983562244&#34;,&#34;true&#34;],&#34;5&#34;:[&#34;comment-id-7166889005601243164&#34;,&#34;true&#34;]},&#34;nextNum&#34;:6}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;WAA4d4CyuouSuOx6nhHcyB3Jn5F&#34;:{&#34;id&#34;:&#34;WAA4d4CyuouSuOx6nhHcyB3Jn5F&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;微马家族都是先通过流氓软件外壳伪装入驻用户系统, 而后监控、注入微信进程并窃取用户授权令牌等敏感信息。此次捕获的木马在多个渠道传播，主要来源于以下几个流氓软件：&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+28&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]},&#34;nextNum&#34;:1}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;Y4QWdiiG0oS80uxMZaecNeGUnAf&#34;:{&#34;id&#34;:&#34;Y4QWdiiG0oS80uxMZaecNeGUnAf&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;align&#34;:&#34;center&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcnafwfmVO2iVjXEFicoTzrF6&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:69041,&#34;scale&#34;:0.4958047292143402,&#34;width&#34;:1311,&#34;height&#34;:523,&#34;name&#34;:&#34;image.png&#34;}}},&#34;RaAUd2SMsoqyQ4xYtdZc2wjrnOg&#34;:{&#34;id&#34;:&#34;RaAUd2SMsoqyQ4xYtdZc2wjrnOg&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+17&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;综上可见发展壮大后的“微马”家族产业链已更加完善、分发渠道更加丰富，样本攻击更为活跃。&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;QmeydAOiSomMgoxWKokcfGlcngh&#34;:{&#34;id&#34;:&#34;QmeydAOiSomMgoxWKokcfGlcngh&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:0,&#34;numToAttrib&#34;:{}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;TwO8dgw2Ooomg2xU3qFcXxybn6c&#34;:{&#34;id&#34;:&#34;TwO8dgw2Ooomg2xU3qFcXxybn6c&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading2&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+4&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;流程概要&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;DmMWds2EIo6sMgxHZkNccz1jnh5&#34;:{&#34;id&#34;:&#34;DmMWds2EIo6sMgxHZkNccz1jnh5&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:2,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;],&#34;1&#34;:[&#34;abbreviation-data&#34;,&#34;{\&#34;id\&#34;:\&#34;d2496c1e-994f-4d83-861b-eae378d63de9\&#34;,\&#34;abbr_ids\&#34;:\&#34;enterprise_7066006727514193923\&#34;,\&#34;is_visible\&#34;:1,\&#34;is_first\&#34;:1}&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+2z*1*0+3*0+26&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;攻击者为了提高用户感染率，将微马模块藏匿在流氓软件的安装包内。一旦在用户计算机安装成功则会将该模块注册成恶意服务实现持久化驻留。服务通过远控服务器下拉攻击载荷，该载荷启动后解密出窃密模块，对微信进程进行检测和反射式DLL注入，在内存中使用正则匹配暴力搜索访问链接的关键位置并且安装Hook，实时监控窃取用户令牌数据、下载流量配置，从而实现\&#34;流量暗刷\&#34;、“广告引流”等真正目的。&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;U2m0dgYG6oWaK0xw76WcJ7HZnDe&#34;:{&#34;id&#34;:&#34;U2m0dgYG6oWaK0xw76WcJ7HZnDe&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;align&#34;:&#34;center&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcnxnKd1nlUgcbA6xnU6hxObc&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:1120691,&#34;scale&#34;:1,&#34;width&#34;:6316,&#34;height&#34;:4650,&#34;name&#34;:&#34;流程总览.png&#34;}}},&#34;WYAQdsEkOoEwqix4Xq7cYrv2nIg&#34;:{&#34;id&#34;:&#34;WYAQdsEkOoEwqix4Xq7cYrv2nIg&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:0,&#34;numToAttrib&#34;:{}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;Fy0CdIwiio4S86xmI0HcVE0PnVc&#34;:{&#34;id&#34;:&#34;Fy0CdIwiio4S86xmI0HcVE0PnVc&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading2&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+4&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;详细分析&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;Mogmdkai4ocUG4xoXhzcOfc4nug&#34;:{&#34;id&#34;:&#34;Mogmdkai4ocUG4xoXhzcOfc4nug&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading3&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+7&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;1. 初始执行&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;M8aOd4QO4oSeW4x8fVscsjdcnQc&#34;:{&#34;id&#34;:&#34;M8aOd4QO4oSeW4x8fVscsjdcnQc&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+3v&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;此次捕获的微马模块由“整点播报”安装包释放。该程序具有数字签名“Wuhan Weizhinuo Network Technology Co., Ltd.”。该流氓软件被静默安装在用户计算机的同时释放注册了DrthServer服务，此服务对应落地文件DxpwServer.exe。&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;Sm4OdGyKQomYuoxm8ztcYBhwnIf&#34;:{&#34;id&#34;:&#34;Sm4OdGyKQomYuoxm8ztcYBhwnIf&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;align&#34;:&#34;center&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcnm08NxzdZBgTqCHvYFvEAah&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:3226814,&#34;scale&#34;:1,&#34;width&#34;:7049,&#34;height&#34;:3970,&#34;name&#34;:&#34;初始执行.png&#34;}}},&#34;HMU0d4iYioMQmSxcRPtcS7Own2e&#34;:{&#34;id&#34;:&#34;HMU0d4iYioMQmSxcRPtcS7Own2e&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[&#34;7164199240779137052&#34;],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:2,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;],&#34;1&#34;:[&#34;comment-id-7164199240779137052&#34;,&#34;true&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+2d*0*1+14&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;为了增强对抗，安装包根据用户环境的差异会释放两种不同版本：在测试环境中，被安装包释放的服务只有对流氓软件进程自保的单一功能；而在用户环境中，我们捕捉到的则是携带恶意功能的服务模块。两个服务文件的签名一致，但是恶意服务的体积较大，通常为400KB以上。&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;TYUkdSuayoyU0Wx2Dnscwf8Pnyf&#34;:{&#34;id&#34;:&#34;TYUkdSuayoyU0Wx2Dnscwf8Pnyf&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;align&#34;:&#34;center&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcnzifQ9VsiPOQgTW1l64vTwf&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:1409760,&#34;scale&#34;:1,&#34;width&#34;:4864,&#34;height&#34;:2427,&#34;name&#34;:&#34;服务对比.png&#34;}}},&#34;C0cedmkGKosEIaxoNSmc91YJnjb&#34;:{&#34;id&#34;:&#34;C0cedmkGKosEIaxoNSmc91YJnjb&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading3&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+7&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;2. 对抗手段&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;GsMidSE2MowAYaxcVf1cpi7Rnbf&#34;:{&#34;id&#34;:&#34;GsMidSE2MowAYaxcVf1cpi7Rnbf&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading4&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+9&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;(1) 字符串加密&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;Z8ukdYQ8Ko0ugOxKsiScVJf3nth&#34;:{&#34;id&#34;:&#34;Z8ukdYQ8Ko0ugOxKsiScVJf3nth&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[&#34;7164199620199890947&#34;],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:2,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;],&#34;1&#34;:[&#34;comment-id-7164199620199890947&#34;,&#34;true&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+z*0*1+j*0+1&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;DxpwServer服务文件由易语言编写，且其中重要的字符串均被加密，以对抗杀软检测，加大安全人员分析的难度。&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;Gwa0dYomwomm8sxGSQhc93iInfd&#34;:{&#34;id&#34;:&#34;Gwa0dYomwomm8sxGSQhc93iInfd&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;align&#34;:&#34;center&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcnHnVwn465xnuxzL5Rwcw9Ug&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:3810128,&#34;scale&#34;:1,&#34;width&#34;:4810,&#34;height&#34;:2455,&#34;name&#34;:&#34;字符串加密.png&#34;}}},&#34;HwUSduWEOomCysxc1OVcpWPynuf&#34;:{&#34;id&#34;:&#34;HwUSduWEOomCysxc1OVcpWPynuf&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading4&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+8&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;(2) 环境检查&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;ECscdgasYo6IGsxMX1qcDclpnye&#34;:{&#34;id&#34;:&#34;ECscdgasYo6IGsxMX1qcDclpnye&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;在服务运行中有多处位置在执行到关键步骤之前，都会通过查询下列相关进程判断是否有杀软、调试工具、虚拟机或者同系列的木马服务进程已经启动，如果有则直接禁用当前服务。&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+1b*1*0+3*0+u&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;],&#34;1&#34;:[&#34;abbreviation-data&#34;,&#34;{\&#34;id\&#34;:\&#34;7abe0def-20a3-4cdf-bb72-9c824ec34e54\&#34;,\&#34;abbr_ids\&#34;:\&#34;enterprise_7066006282271997955\&#34;,\&#34;is_visible\&#34;:1,\&#34;is_first\&#34;:1}&#34;]},&#34;nextNum&#34;:2}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;Z86Md60yOoEEAsxkpXUctiI1nLg&#34;:{&#34;id&#34;:&#34;Z86Md60yOoEEAsxkpXUctiI1nLg&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;align&#34;:&#34;center&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcnOle6rFi44J76cgvOCPk9ic&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:33202,&#34;scale&#34;:1,&#34;width&#34;:1441,&#34;height&#34;:355,&#34;name&#34;:&#34;image.png&#34;}}},&#34;Q2qmdCe8eoeIigxI7j2cUlcvnNg&#34;:{&#34;id&#34;:&#34;Q2qmdCe8eoeIigxI7j2cUlcvnNg&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+1n&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;同时，服务还会查询注册表判断是否有同系列的木马已经植入到用户系统，如果有相关注册信息则退出服务进程。相关注册表项如下：&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;Bygqd6SGGoyKuIx8QK9cZ6wgnag&#34;:{&#34;id&#34;:&#34;Bygqd6SGGoyKuIx8QK9cZ6wgnag&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;align&#34;:&#34;center&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcnW2AWOyoa2RJ5M5ROG5IGDf&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:59516,&#34;scale&#34;:1,&#34;width&#34;:1460,&#34;height&#34;:661,&#34;name&#34;:&#34;image.png&#34;}}},&#34;Ayked0yoEoOmASxkjMJckM5ynNb&#34;:{&#34;id&#34;:&#34;Ayked0yoEoOmASxkjMJckM5ynNb&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading4&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:2,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;],&#34;1&#34;:[&#34;abbreviation-data&#34;,&#34;{\&#34;id\&#34;:\&#34;491a13f9-e3b2-424f-88fc-b7bd5c7a53d3\&#34;,\&#34;abbr_ids\&#34;:\&#34;enterprise_7066006727514193923\&#34;,\&#34;is_visible\&#34;:1,\&#34;is_first\&#34;:1}&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+7*1*0+3*0+2&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;(3) 反射式DLL注入&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;HyocduioIoIYaIxk37fcRXwsnRg&#34;:{&#34;id&#34;:&#34;HyocduioIoIYaIxk37fcRXwsnRg&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:2,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;],&#34;1&#34;:[&#34;abbreviation-data&#34;,&#34;{\&#34;id\&#34;:\&#34;b58af2ad-3fd5-4693-8d72-53343806ed6c\&#34;,\&#34;abbr_ids\&#34;:\&#34;enterprise_7066006727514193923\&#34;,\&#34;is_visible\&#34;:1,\&#34;is_first\&#34;:1}&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+g*1*0+3*0+2n&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;恶意软件为了提高自身隐蔽性，利用DLL注入技术将恶意代码注入微信进程，注入完成后使用远程线程调用木马模块的DllEntryPoint函数执行初始化动作。从服务器下拉配置到启动恶意模块的期间无任何文件落地，同时增加了查杀检测难度。&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;GqaIduU04oqEgYxEjb0c3FGAnZg&#34;:{&#34;id&#34;:&#34;GqaIduU04oqEgYxEjb0c3FGAnZg&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading4&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+c&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;(4) 持久化和更新模块&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;BaosdEcGSoIacWxUFUccER3Fnef&#34;:{&#34;id&#34;:&#34;BaosdEcGSoIacWxUFUccER3Fnef&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;攻击者通过在用户计算机中注册服务，实现长期稳定地从远程服务器下载更新配置，其中包含注入微信进程的恶意载荷和广告暗刷的配置链接。&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+1r&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]},&#34;nextNum&#34;:1}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;O82UdkgqqoMuUmxml8pcuxztnjQ&#34;:{&#34;id&#34;:&#34;O82UdkgqqoMuUmxml8pcuxztnjQ&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading3&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+9&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;3. 下载服务配置&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;PUsydWMoCo8gyixm45HcLMUCnRd&#34;:{&#34;id&#34;:&#34;PUsydWMoCo8gyixm45HcLMUCnRd&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading4&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+a&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;(1) 查询微信进程&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;BA8edK04uoE8SGxyymJcVVwrnBd&#34;:{&#34;id&#34;:&#34;BA8edK04uoE8SGxyymJcVVwrnBd&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+1t&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;通过查询wechat.exe、WeChatResource.dll进程是否存在来判断微信的运行状态，当微信启动时才会执行下一步骤。&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;VsmodO4ewo2AOmxmCVBc3HHtnfe&#34;:{&#34;id&#34;:&#34;VsmodO4ewo2AOmxmCVBc3HHtnfe&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;align&#34;:&#34;center&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcnawsp7ylRCOW1rwRkeAOjQc&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:432330,&#34;scale&#34;:0.5312954876273653,&#34;width&#34;:1374,&#34;height&#34;:771,&#34;name&#34;:&#34;image.png&#34;}}},&#34;EmOEdggEYoosIqxsvwvcnOpdnEK&#34;:{&#34;id&#34;:&#34;EmOEdggEYoosIqxsvwvcnOpdnEK&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading4&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+a&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;(2) 获取云控配置&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;NGImd22yMouS64xOE96ct1kwnAe&#34;:{&#34;id&#34;:&#34;NGImd22yMouS64xOE96ct1kwnAe&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:5,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;],&#34;1&#34;:[&#34;author&#34;,&#34;7079006010576289796&#34;],&#34;2&#34;:[&#34;link&#34;,&#34;http%3A%2F%2Fyihuafence.com%2Fdates.zip&#34;],&#34;3&#34;:[&#34;link-id&#34;,&#34;3c10f06e-0c3f-464e-9571-3b7c00e9252c&#34;],&#34;4&#34;:[&#34;underline&#34;,&#34;true&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+h*1+5*0+o*0*2*3*4+v*0+a&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;当服务确保微信正在运行之后，则会与C2地址：222.187.232.40的地址进行通讯，访问http://yihuafence.com/dates.zip将数据获取到内存中：&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;L66ydw2OsoIOg2xwz3Dc81p1npd&#34;:{&#34;id&#34;:&#34;L66ydw2OsoIOg2xwz3Dc81p1npd&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;align&#34;:&#34;center&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcnl2ReIAjyFhkkaGQ8lTuWPf&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:2506387,&#34;scale&#34;:1,&#34;width&#34;:4102,&#34;height&#34;:2159,&#34;name&#34;:&#34;获取云控配置.png&#34;}}},&#34;KM4Yd0OcsoO4myxEDFockw4tnpd&#34;:{&#34;id&#34;:&#34;KM4Yd0OcsoO4myxEDFockw4tnpd&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:2,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;],&#34;1&#34;:[&#34;abbreviation-data&#34;,&#34;{\&#34;id\&#34;:\&#34;eb8fb8f8-d2f8-444e-9864-4f5855f8a94b\&#34;,\&#34;abbr_ids\&#34;:\&#34;enterprise_7066006727514193923\&#34;,\&#34;is_visible\&#34;:1,\&#34;is_first\&#34;:1}&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+y*1*0+3*0+y&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;通过将内存数据解密，我们捕获到真正的恶意载荷，模块名称是“发送统计.dll”，该文件是由易语言编写，其中重要的字符串仍然使用同一方式进行加密。&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;Cco4demoGou2oEx8blVcAZtQncf&#34;:{&#34;id&#34;:&#34;Cco4demoGou2oEx8blVcAZtQncf&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;align&#34;:&#34;center&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcnhz17HlAagJwIGtnHVd5NKc&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:5565383,&#34;scale&#34;:1,&#34;width&#34;:6281,&#34;height&#34;:3535,&#34;name&#34;:&#34;解密云控配置.png&#34;}}},&#34;KWiydCqYgoysQax6b8vccjB7nTe&#34;:{&#34;id&#34;:&#34;KWiydCqYgoysQax6b8vccjB7nTe&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading3&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;4. 反射式注入微信&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+a&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]},&#34;nextNum&#34;:1}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;RcGIdgGG4o0eQOxg7mBcLZMlnxd&#34;:{&#34;id&#34;:&#34;RcGIdgGG4o0eQOxg7mBcLZMlnxd&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading4&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+a&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;(1) 注入恶意载荷&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;VOQAdMyo2oyWyaxemtBcGhhmnEL&#34;:{&#34;id&#34;:&#34;VOQAdMyo2oyWyaxemtBcGhhmnEL&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:2,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;],&#34;1&#34;:[&#34;abbreviation-data&#34;,&#34;{\&#34;id\&#34;:\&#34;09046aa9-148a-4862-b5fc-1aa5eb51b9c5\&#34;,\&#34;abbr_ids\&#34;:\&#34;enterprise_7066006727514193923\&#34;,\&#34;is_visible\&#34;:1,\&#34;is_first\&#34;:1}&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+1c*1*0+3*0+4&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;在确定用户计算机环境安全且正在运行微信进程之后，向WeChat.exe中注入解密后的“发送统计.dll”模块：&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;D8k8dUoyWokISUxCanmcQNd7n3f&#34;:{&#34;id&#34;:&#34;D8k8dUoyWokISUxCanmcQNd7n3f&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;align&#34;:&#34;center&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcnrGwa6zrSs81j7UwPAjQ6sc&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:5110795,&#34;scale&#34;:1,&#34;width&#34;:6431,&#34;height&#34;:3688,&#34;name&#34;:&#34;注入恶意DLL.png&#34;}}},&#34;SAa8dqYESoKQ40xMloHci3fNnvh&#34;:{&#34;id&#34;:&#34;SAa8dqYESoKQ40xMloHci3fNnvh&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading4&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+o&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;(2) 注入启动ReflectiveLoader&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;KQKKdAsWKo86qGx6oyeczjolnQf&#34;:{&#34;id&#34;:&#34;KQKKdAsWKo86qGx6oyeczjolnQf&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[&#34;7164201183391989763&#34;],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:4,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;],&#34;1&#34;:[&#34;comment-id-7164201183391989763&#34;,&#34;true&#34;],&#34;2&#34;:[&#34;author&#34;,&#34;7079006010576289796&#34;],&#34;3&#34;:[&#34;abbreviation-data&#34;,&#34;{\&#34;id\&#34;:\&#34;bfd0d16a-614a-4df0-b84d-3389c0629629\&#34;,\&#34;abbr_ids\&#34;:\&#34;enterprise_7066006727514193923\&#34;,\&#34;is_visible\&#34;:1,\&#34;is_first\&#34;:1}&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0*1+1g*0+h*2+2*0+18*3*0+3*0+1&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;装载恶意载荷的ReflectiveLoader则是一段内嵌在服务文件“.data”段的shellcode，功能为内存展开模块并且调用库函数 ，木马服务将其写入Wechat.exe的内存，利用远程线程调用实现在微信进程中反射装载恶意DLL：&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;EIo2diQMOoi8S8x6X4Dcx1wXnOe&#34;:{&#34;id&#34;:&#34;EIo2diQMOoi8S8x6X4Dcx1wXnOe&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;align&#34;:&#34;center&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcnbgI3dJyaRE7H4KkQD2mt1f&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:849916,&#34;scale&#34;:1,&#34;width&#34;:1379,&#34;height&#34;:816,&#34;name&#34;:&#34;image.png&#34;}}},&#34;TMG6dqYSyoIm8IxKM2QcvI1Unag&#34;:{&#34;id&#34;:&#34;TMG6dqYSyoIm8IxKM2QcvI1Unag&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading3&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+9&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;5. 分析恶意载荷&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;Hcood6Owkoa2uYxAp18cTciuntg&#34;:{&#34;id&#34;:&#34;Hcood6Owkoa2uYxAp18cTciuntg&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading4&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+8&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;(1) 检查环境&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;Eac8dY2ySocSWgxwj69cI6THnzb&#34;:{&#34;id&#34;:&#34;Eac8dY2ySocSWgxwj69cI6THnzb&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:2,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;],&#34;1&#34;:[&#34;abbreviation-data&#34;,&#34;{\&#34;id\&#34;:\&#34;39993553-739e-417f-ab4b-e30e6a45225e\&#34;,\&#34;abbr_ids\&#34;:\&#34;enterprise_7066006282271997955\&#34;,\&#34;is_visible\&#34;:1,\&#34;is_first\&#34;:1}&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+24*1*0+3*0+8&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;攻击者在恶意载荷中仍会不断检查环境是否能够继续安全地执行恶意操作，比如：确认当前模块是否为微信的进程、验证微信是否登录、是否正在运行各类杀软、抓包工具、虚拟机及调试器等程序。&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;ZWKqdiIuwoS0M6xc9yHc0dHBnKd&#34;:{&#34;id&#34;:&#34;ZWKqdiIuwoS0M6xc9yHc0dHBnKd&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;align&#34;:&#34;center&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcnKLP5NZgYjt0jWooCp3p6Mc&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:2271040,&#34;scale&#34;:1,&#34;width&#34;:4575,&#34;height&#34;:2580,&#34;name&#34;:&#34;检查微信环境.png&#34;}}},&#34;ZUWYdmSAOo26uExWg1ncSxicnGe&#34;:{&#34;id&#34;:&#34;ZUWYdmSAOo26uExWg1ncSxicnGe&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading4&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+a&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;(2) 下拉暗刷配置&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;AkQudoMCmoOu0AxcPDdcSts0nxc&#34;:{&#34;id&#34;:&#34;AkQudoMCmoOu0AxcPDdcSts0nxc&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;在检查环境之后若没有出现异常，则请求IP地址为216.83.45.51:4018的服务器serviceswechat.com下载加密配置，该链接是高仿微信的地址servicewechat.com（仅多了一个字母“s”），在流量分析时很容易混淆在海量的正常微信流量中。&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+18*0*1*2+7*0*1*2*3+1*0*1*2+a*0+6*4+c*4*1*5+h*0+c*4+o&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;],&#34;1&#34;:[&#34;link&#34;,&#34;https%3A%2F%2Fwww.virustotal.com%2Fgui%2Fdomain%2Fserviceswechat.com&#34;],&#34;2&#34;:[&#34;link-id&#34;,&#34;e74db6d5-28af-4640-8167-90d77ec24e75&#34;],&#34;3&#34;:[&#34;textHighlight&#34;,&#34;rgb(216,57,49)&#34;],&#34;4&#34;:[&#34;author&#34;,&#34;7079006010576289796&#34;],&#34;5&#34;:[&#34;link-id&#34;,&#34;f529d7af-a5b4-4b8e-b8f0-68e4b080d4b6&#34;]},&#34;nextNum&#34;:6}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;AcoEdCySco0MuCx4GkqcRMHfnyc&#34;:{&#34;id&#34;:&#34;AcoEdCySco0MuCx4GkqcRMHfnyc&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading4&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+d&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;(3) 窃密用户Token&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;YyGEd2sqyo2WqUxoT7pcdxB8nlc&#34;:{&#34;id&#34;:&#34;YyGEd2sqyo2WqUxoT7pcdxB8nlc&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+2i&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;木马使用正则搜索定位到WechatWin.dll模块中与链接访问相关的目标位置，将需要HOOK的地址原汇编记录保存，跳转至新申请的内存空间安装钩子执行木马逻辑后返回原地址继续执行：&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;ZuSidQUomo4Gm4xsbmqcWVeFnLg&#34;:{&#34;id&#34;:&#34;ZuSidQUomo4Gm4xsbmqcWVeFnLg&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;align&#34;:&#34;center&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcnnF6ec8voiwXtqboRdCFYZf&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:651238,&#34;scale&#34;:1,&#34;width&#34;:1330,&#34;height&#34;:819,&#34;name&#34;:&#34;image.png&#34;}}},&#34;EU0cdsYaCo2kqqxOOczcT1TVn6e&#34;:{&#34;id&#34;:&#34;EU0cdsYaCo2kqqxOOczcT1TVn6e&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[&#34;7164203737691144196&#34;],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:2,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;],&#34;1&#34;:[&#34;comment-id-7164203737691144196&#34;,&#34;true&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+19*0*1+13&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;当用户在正常访问链接时，微信进程会执行到钩子的位置，实现获取链接中用户令牌相关字段的数据：uin、key、pass_ticket、devicetype、version。&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;AuuKdKWO4o4Mc2xIxkucq4bKnUX&#34;:{&#34;id&#34;:&#34;AuuKdKWO4o4Mc2xIxkucq4bKnUX&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;align&#34;:&#34;center&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcnPFeE6zoO596iVYyXw3DW2c&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:1765004,&#34;scale&#34;:1,&#34;width&#34;:1650,&#34;height&#34;:1201,&#34;name&#34;:&#34;image.png&#34;}}},&#34;PsCmds8UmooEeqxKwmvclbgSnlh&#34;:{&#34;id&#34;:&#34;PsCmds8UmooEeqxKwmvclbgSnlh&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:5,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;],&#34;1&#34;:[&#34;link&#34;,&#34;http%3A%2F%2F216.83.45.52%2F&#34;],&#34;2&#34;:[&#34;link&#34;,&#34;http%3A%2F%2Fserviceswechat.com%3A2837%2F&#34;],&#34;3&#34;:[&#34;link-id&#34;,&#34;2ecd0442-35d2-4988-bcf2-4b4a02aa7293&#34;],&#34;4&#34;:[&#34;author&#34;,&#34;7079006010576289796&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+1p*0*1+c*0+2*0*2*3+u*0+2*4+1*0+15&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;而后将关键数据与特殊字符进行拼接组合，使用base64的加密方法加密后再进行倒序产生了一个新的数据包，发送至云端恶意IP：216.83.45.52 （http://serviceswechat.com:2837）。被收集的用户关键令牌信息也极有可能被利用在其他黑产和恶意活动之中，值得微信用户警惕。&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;Fg4admsKEoYaY8xGgt6chXkPn7b&#34;:{&#34;id&#34;:&#34;Fg4admsKEoYaY8xGgt6chXkPn7b&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;align&#34;:&#34;center&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcn7eEHNzft32bGMZK4b2bUif&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:1386637,&#34;scale&#34;:1,&#34;width&#34;:1900,&#34;height&#34;:1312,&#34;name&#34;:&#34;获取用户数据拼接加密_2.png&#34;}}},&#34;No8WdoWUCouq0ax27IlcBBYfnUh&#34;:{&#34;id&#34;:&#34;No8WdoWUCouq0ax27IlcBBYfnUh&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading4&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+8&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;(4) 暗刷流量&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;H4KOdgC4QoK4QUxq6dqcLgFOnAd&#34;:{&#34;id&#34;:&#34;H4KOdgC4QoK4QUxq6dqcLgFOnAd&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:2,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;],&#34;1&#34;:[&#34;author&#34;,&#34;7079006010576289796&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+2g*1+8*0+c*1+2*0+7&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;访问链接的部分使用了双层循环嵌套，外部循环会确认“WechatBrowser.exe”以及微信窗口是否运行以保证能正常调用接口，内部循环通过内存定位wechatwin.dll中web访问的函数地址，将链接地址作为参数传入完成暗刷操作。&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;AAasdiC28oKyKWx29T3cwQFsnpb&#34;:{&#34;id&#34;:&#34;AAasdiC28oKyKWx29T3cwQFsnpb&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;align&#34;:&#34;center&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcnETEjJTPfe3XKJrohxcvbLf&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:6317958,&#34;scale&#34;:1,&#34;width&#34;:6054,&#34;height&#34;:4623,&#34;name&#34;:&#34;暗刷流量.png&#34;}}},&#34;R8qwdcaGUoC64OxCMAKcqWaEnyd&#34;:{&#34;id&#34;:&#34;R8qwdcaGUoC64OxCMAKcqWaEnyd&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+10&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;如下图所示，源自配置链接的文章访问量可达到其他同类公众号文章的数倍之多。&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;GSaAdyMMcoeKaGx21jIcZ6i2n8d&#34;:{&#34;id&#34;:&#34;GSaAdyMMcoeKaGx21jIcZ6i2n8d&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;align&#34;:&#34;center&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcn2aZL8ujDrHhjabQY2qbJhd&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:4058985,&#34;scale&#34;:1,&#34;width&#34;:7290,&#34;height&#34;:2631,&#34;name&#34;:&#34;暗刷流量访问量对比.png&#34;}}},&#34;FS86dSA8CoqGQsxaSaYcZt7lnZd&#34;:{&#34;id&#34;:&#34;FS86dSA8CoqGQsxaSaYcZt7lnZd&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:0,&#34;numToAttrib&#34;:{}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;J8SWd8g00o22CoxigltcLyyfnHf&#34;:{&#34;id&#34;:&#34;J8SWd8g00o22CoxigltcLyyfnHf&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading2&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+6&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;关联同源样本&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;Oyeody2Ymoe66WxQPeAcwrCJnVc&#34;:{&#34;id&#34;:&#34;Oyeody2Ymoe66WxQPeAcwrCJnVc&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:2,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;],&#34;1&#34;:[&#34;link-id&#34;,&#34;13b2334d-efeb-4021-a137-1314f2256cbc&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+9*0*1+j*0+23&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;登录鹰眼情报中心（https://ti.duba.net）搜索或者上传样本后查看分析出的C2配置，通过IP地址查看所属家族和地区等详细信息，在“关联情报”里点击相关通信文件等选项即可获取关联的同源家族样本。&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;CekudwAUooUkEQx2tircbu19n4c&#34;:{&#34;id&#34;:&#34;CekudwAUooUkEQx2tircbu19n4c&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;align&#34;:&#34;center&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcnRCwWxIt1OkWfNb2vdS78bc&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:243412,&#34;scale&#34;:1,&#34;width&#34;:2443,&#34;height&#34;:1296,&#34;name&#34;:&#34;image.png&#34;}}},&#34;XUeqdgWEEoQ6EaxOmiKcVK8rn7g&#34;:{&#34;id&#34;:&#34;XUeqdgWEEoQ6EaxOmiKcVK8rn7g&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;align&#34;:&#34;center&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcnsJfxLNVhv84Zik15QTMXPh&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:300735,&#34;scale&#34;:1,&#34;width&#34;:2441,&#34;height&#34;:1298,&#34;name&#34;:&#34;image.png&#34;}}},&#34;J620dKessom6oIxmUyWcG5xhnth&#34;:{&#34;id&#34;:&#34;J620dKessom6oIxmUyWcG5xhnth&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:0,&#34;numToAttrib&#34;:{}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;QEM2d4I0MouMWcxCkWbcUycTn8f&#34;:{&#34;id&#34;:&#34;QEM2d4I0MouMWcxCkWbcUycTn8f&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading2&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+2&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;总结&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;HUQOdsKQuoQsOCxKOjPc8TfHnvb&#34;:{&#34;id&#34;:&#34;HUQOdsKQuoQsOCxKOjPc8TfHnvb&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:2,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;],&#34;1&#34;:[&#34;author&#34;,&#34;7079006010576289796&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+6b*1+f&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;在自媒体时代的洪流之下，用户个人流量已经成为商家的获利工具，与此同时必然会衍生出大量黑灰产业谋取红利。微马家族就是借助流氓软件易感染、难清除的“优势”潜伏在用户系统内，逐步形成了一条成熟的暗刷推广链。从溯源结果来看每个下放的微马服务中代码相似度很高，其中不仅有公众号相关的链接处理，还预留了视频号相关的处理逻辑，随着微信的产品功能升级，木马也会更新迭代加入新的黑产功能。而身为病毒携带传播者的流氓软件风险危害仍然不容小觑，需要及时做好检测清理和防范措施。目前毒霸已支持对该病毒的查杀：&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;Vuo2dAwucoam62xGmaCcNbITnhf&#34;:{&#34;id&#34;:&#34;Vuo2dAwucoam62xGmaCcNbITnhf&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;align&#34;:&#34;center&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcnjfYH3X6TMzdro3pn91hSmf&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:228480,&#34;scale&#34;:1,&#34;width&#34;:1002,&#34;height&#34;:702,&#34;name&#34;:&#34;image.png&#34;}}},&#34;W8c2d08YiowKSoxC8BtcdGLEnRd&#34;:{&#34;id&#34;:&#34;W8c2d08YiowKSoxC8BtcdGLEnRd&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:0,&#34;numToAttrib&#34;:{}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;H6qOdo2g0oe4o4xhvyEcZZFinwc&#34;:{&#34;id&#34;:&#34;H6qOdo2g0oe4o4xhvyEcZZFinwc&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading2&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+4&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;IOCs&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;PoimdSAwCowciqxaQJ2cI9SrnMd&#34;:{&#34;id&#34;:&#34;PoimdSAwCowciqxaQJ2cI9SrnMd&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading3&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+7&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;MD5（部分）&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;OS4udeww4oKEGyxkNbmcdUu6nDg&#34;:{&#34;id&#34;:&#34;OS4udeww4oKEGyxkNbmcdUu6nDg&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;align&#34;:&#34;left&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcn0NyOj6EHC5TFI4jfJCNiZe&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:42936,&#34;scale&#34;:0.4897400820793434,&#34;width&#34;:731,&#34;height&#34;:721,&#34;name&#34;:&#34;image.png&#34;}}},&#34;CO0qdkwaKoeow6xGQHAcuiWnnQd&#34;:{&#34;id&#34;:&#34;CO0qdkwaKoeow6xGQHAcuiWnnQd&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:0,&#34;numToAttrib&#34;:{}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;UEM4dAE22oOuiyxcbOQc4KMtnDe&#34;:{&#34;id&#34;:&#34;UEM4dAE22oOuiyxcbOQc4KMtnDe&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;heading3&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[&#34;7166884616954200065&#34;],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:2,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;comment-id-7166884616954200065&#34;,&#34;true&#34;],&#34;1&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*1*0+3&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;C&amp;C&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;QcModmIsMoi44wxei6ecFEPVn2y&#34;:{&#34;id&#34;:&#34;QcModmIsMoi44wxei6ecFEPVn2y&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;align&#34;:&#34;left&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcnXnA0TZYkd4kTZW7buvXEoc&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:10236,&#34;scale&#34;:0.6986301369863014,&#34;width&#34;:657,&#34;height&#34;:148,&#34;name&#34;:&#34;image.png&#34;}}},&#34;VAumdA2i0oK2YYxSgaecY9t3nxf&#34;:{&#34;id&#34;:&#34;VAumdA2i0oK2YYxSgaecY9t3nxf&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:0,&#34;numToAttrib&#34;:{}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;RWiId64Q2ouACCx4j8bcEP15ntb&#34;:{&#34;id&#34;:&#34;RWiId64Q2ouACCx4j8bcEP15ntb&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:0,&#34;numToAttrib&#34;:{}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;&#34;}}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;MK4sdWswao4sGOxGgnwcaYzxn3e&#34;:{&#34;id&#34;:&#34;MK4sdWswao4sGOxGgnwcaYzxn3e&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;children&#34;:[],&#34;comments&#34;:[],&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;align&#34;:&#34;center&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcnKq8lup2RBbLa5grYxbmiJb&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:1395388,&#34;scale&#34;:1,&#34;width&#34;:2560,&#34;height&#34;:1135,&#34;name&#34;:&#34;image.png&#34;}}},&#34;TCwad26kUoAUy6xyBBocU6v3nCB&#34;:{&#34;id&#34;:&#34;TCwad26kUoAUy6xyBBocU6v3nCB&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;children&#34;:[],&#34;comments&#34;:[],&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;image&#34;:{&#34;src&#34;:&#34;&#34;,&#34;token&#34;:&#34;boxcnT50l2ITlfklSjteDlziuab&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:136833,&#34;name&#34;:&#34;image.png&#34;,&#34;scale&#34;:1,&#34;width&#34;:2367,&#34;height&#34;:1330,&#34;align&#34;:&#34;center&#34;},&#34;align&#34;:&#34;center&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;}},&#34;Jm2cdoEEioCKk6xmwaYcbLewnQc&#34;:{&#34;id&#34;:&#34;Jm2cdoEEioCKk6xmwaYcbLewnQc&#34;,&#34;snapshot&#34;:{&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;type&#34;:&#34;text&#34;,&#34;children&#34;:[],&#34;comments&#34;:[&#34;7166886495113150468&#34;],&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;在捕获的新一代\&#34;微马\&#34;样本中我们发现，除了收集用户关键的微信token外，还定时暗刷广告营销类公众号文章进行引流，让大量的微信用户成为他们牟利的工具。在分析过程中我们拉取了上百条配置链接，经过对内容分类统计发现其中暗刷对象主要涉及美食、购物、汽车、房产、美妆等广告营销类文章。&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+11*0*1+2t&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;],&#34;1&#34;:[&#34;comment-id-7166886495113150468&#34;,&#34;true&#34;]},&#34;nextNum&#34;:2}},&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;BqkYd6u40ok44OxeQKqcRzVan3g&#34;:{&#34;id&#34;:&#34;BqkYd6u40ok44OxeQKqcRzVan3g&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;children&#34;:[],&#34;comments&#34;:[],&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;image&#34;:{&#34;src&#34;:&#34;&#34;,&#34;token&#34;:&#34;boxcn568hlCNCzJuTmIFrS5ZNdd&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:482246,&#34;name&#34;:&#34;配置内容分类.png&#34;,&#34;scale&#34;:1,&#34;width&#34;:3800,&#34;height&#34;:2631,&#34;align&#34;:&#34;center&#34;},&#34;align&#34;:&#34;center&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;}},&#34;II0GdYcwmokKO0xQpjycP13tnEf&#34;:{&#34;id&#34;:&#34;II0GdYcwmokKO0xQpjycP13tnEf&#34;,&#34;snapshot&#34;:{&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;type&#34;:&#34;text&#34;,&#34;children&#34;:[],&#34;comments&#34;:[],&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{},&#34;nextNum&#34;:0}},&#34;folded&#34;:false}},&#34;PO6qdkAweowOqmx6nepcjinlnlc&#34;:{&#34;id&#34;:&#34;PO6qdkAweowOqmx6nepcjinlnlc&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;image&#34;,&#34;children&#34;:[],&#34;comments&#34;:[],&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;align&#34;:&#34;center&#34;,&#34;image&#34;:{&#34;token&#34;:&#34;boxcn7OnfXT22OF5vhxrPIyZekQ&#34;,&#34;mimeType&#34;:&#34;image/png&#34;,&#34;size&#34;:64795,&#34;scale&#34;:0.49678800856531047,&#34;width&#34;:934,&#34;height&#34;:865,&#34;name&#34;:&#34;image.png&#34;}}},&#34;EYS2d28qmoMO6ixs9xCc93A8nsb&#34;:{&#34;id&#34;:&#34;EYS2d28qmoMO6ixs9xCc93A8nsb&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;children&#34;:[],&#34;comments&#34;:[],&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;“发送统计.dll”是微马的核心功能模块，根据内存防护引擎捕捉到的数据显示，该模块每隔数月就会更新一代，与微信版本更新基本保持同步，截止本报告完成微信11月10号发布最新版本为8.0，该团伙已在11月15号完成了核心模块更新。&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+6*1*0+3*0+2w&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;],&#34;1&#34;:[&#34;abbreviation-data&#34;,&#34;{\&#34;id\&#34;:\&#34;3b6a91c5-164d-49ea-8a54-c91241d92c3e\&#34;,\&#34;abbr_ids\&#34;:\&#34;enterprise_7066006727514193923\&#34;,\&#34;is_visible\&#34;:1,\&#34;is_first\&#34;:1}&#34;]},&#34;nextNum&#34;:2}},&#34;folded&#34;:false,&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;align&#34;:&#34;&#34;,&#34;text_indent&#34;:1}},&#34;KeWydiqouoUKqOxv6zkc68LhnHV&#34;:{&#34;id&#34;:&#34;KeWydiqouoUKqOxv6zkc68LhnHV&#34;,&#34;snapshot&#34;:{&#34;parent_id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;type&#34;:&#34;text&#34;,&#34;children&#34;:[],&#34;comments&#34;:[&#34;7164201647030534172&#34;],&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;配置经解密以json的格式呈现，其中url都是微信公众号文章链接。服务配置更新的周期为一小时，每次下发配置中的链接总量都是27条，且链接URL和文章内容均不相同。&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+2*1+4*2*1+4*1+f*1*3+1k&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006010576289796&#34;],&#34;1&#34;:[&#34;author&#34;,&#34;7079006555961557020&#34;],&#34;2&#34;:[&#34;abbreviation-data&#34;,&#34;{\&#34;id\&#34;:\&#34;cfb251d7-c167-4c80-954a-9c28e0aecb52\&#34;,\&#34;abbr_ids\&#34;:\&#34;enterprise_7066006302060773380\&#34;,\&#34;is_visible\&#34;:1,\&#34;is_first\&#34;:1}&#34;],&#34;3&#34;:[&#34;comment-id-7164201647030534172&#34;,&#34;true&#34;]},&#34;nextNum&#34;:4}},&#34;folded&#34;:false,&#34;text_indent&#34;:1}},&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;:{&#34;id&#34;:&#34;IecIdNQJNoci3GxDjbUcgE0JnUb&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;page&#34;,&#34;parent_id&#34;:&#34;&#34;,&#34;comments&#34;:null,&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079006555961557020&#34;,&#34;children&#34;:[&#34;IWI8dq0KAoKEC4xmMnBcoFYNnmc&#34;,&#34;YYGKdMiMwogGSyx69CIcH9PXnkd&#34;,&#34;TCwad26kUoAUy6xyBBocU6v3nCB&#34;,&#34;WAA4d4CyuouSuOx6nhHcyB3Jn5F&#34;,&#34;Y4QWdiiG0oS80uxMZaecNeGUnAf&#34;,&#34;Jm2cdoEEioCKk6xmwaYcbLewnQc&#34;,&#34;BqkYd6u40ok44OxeQKqcRzVan3g&#34;,&#34;RaAUd2SMsoqyQ4xYtdZc2wjrnOg&#34;,&#34;QmeydAOiSomMgoxWKokcfGlcngh&#34;,&#34;TwO8dgw2Ooomg2xU3qFcXxybn6c&#34;,&#34;DmMWds2EIo6sMgxHZkNccz1jnh5&#34;,&#34;U2m0dgYG6oWaK0xw76WcJ7HZnDe&#34;,&#34;WYAQdsEkOoEwqix4Xq7cYrv2nIg&#34;,&#34;Fy0CdIwiio4S86xmI0HcVE0PnVc&#34;,&#34;Mogmdkai4ocUG4xoXhzcOfc4nug&#34;,&#34;M8aOd4QO4oSeW4x8fVscsjdcnQc&#34;,&#34;Sm4OdGyKQomYuoxm8ztcYBhwnIf&#34;,&#34;HMU0d4iYioMQmSxcRPtcS7Own2e&#34;,&#34;TYUkdSuayoyU0Wx2Dnscwf8Pnyf&#34;,&#34;C0cedmkGKosEIaxoNSmc91YJnjb&#34;,&#34;GsMidSE2MowAYaxcVf1cpi7Rnbf&#34;,&#34;Z8ukdYQ8Ko0ugOxKsiScVJf3nth&#34;,&#34;Gwa0dYomwomm8sxGSQhc93iInfd&#34;,&#34;HwUSduWEOomCysxc1OVcpWPynuf&#34;,&#34;ECscdgasYo6IGsxMX1qcDclpnye&#34;,&#34;Z86Md60yOoEEAsxkpXUctiI1nLg&#34;,&#34;Q2qmdCe8eoeIigxI7j2cUlcvnNg&#34;,&#34;Bygqd6SGGoyKuIx8QK9cZ6wgnag&#34;,&#34;Ayked0yoEoOmASxkjMJckM5ynNb&#34;,&#34;HyocduioIoIYaIxk37fcRXwsnRg&#34;,&#34;GqaIduU04oqEgYxEjb0c3FGAnZg&#34;,&#34;BaosdEcGSoIacWxUFUccER3Fnef&#34;,&#34;O82UdkgqqoMuUmxml8pcuxztnjQ&#34;,&#34;PUsydWMoCo8gyixm45HcLMUCnRd&#34;,&#34;BA8edK04uoE8SGxyymJcVVwrnBd&#34;,&#34;VsmodO4ewo2AOmxmCVBc3HHtnfe&#34;,&#34;EmOEdggEYoosIqxsvwvcnOpdnEK&#34;,&#34;NGImd22yMouS64xOE96ct1kwnAe&#34;,&#34;L66ydw2OsoIOg2xwz3Dc81p1npd&#34;,&#34;KM4Yd0OcsoO4myxEDFockw4tnpd&#34;,&#34;Cco4demoGou2oEx8blVcAZtQncf&#34;,&#34;EYS2d28qmoMO6ixs9xCc93A8nsb&#34;,&#34;PO6qdkAweowOqmx6nepcjinlnlc&#34;,&#34;II0GdYcwmokKO0xQpjycP13tnEf&#34;,&#34;KWiydCqYgoysQax6b8vccjB7nTe&#34;,&#34;RcGIdgGG4o0eQOxg7mBcLZMlnxd&#34;,&#34;VOQAdMyo2oyWyaxemtBcGhhmnEL&#34;,&#34;D8k8dUoyWokISUxCanmcQNd7n3f&#34;,&#34;SAa8dqYESoKQ40xMloHci3fNnvh&#34;,&#34;KQKKdAsWKo86qGx6oyeczjolnQf&#34;,&#34;EIo2diQMOoi8S8x6X4Dcx1wXnOe&#34;,&#34;TMG6dqYSyoIm8IxKM2QcvI1Unag&#34;,&#34;Hcood6Owkoa2uYxAp18cTciuntg&#34;,&#34;Eac8dY2ySocSWgxwj69cI6THnzb&#34;,&#34;ZWKqdiIuwoS0M6xc9yHc0dHBnKd&#34;,&#34;ZUWYdmSAOo26uExWg1ncSxicnGe&#34;,&#34;AkQudoMCmoOu0AxcPDdcSts0nxc&#34;,&#34;KeWydiqouoUKqOxv6zkc68LhnHV&#34;,&#34;MK4sdWswao4sGOxGgnwcaYzxn3e&#34;,&#34;AcoEdCySco0MuCx4GkqcRMHfnyc&#34;,&#34;YyGEd2sqyo2WqUxoT7pcdxB8nlc&#34;,&#34;ZuSidQUomo4Gm4xsbmqcWVeFnLg&#34;,&#34;EU0cdsYaCo2kqqxOOczcT1TVn6e&#34;,&#34;AuuKdKWO4o4Mc2xIxkucq4bKnUX&#34;,&#34;PsCmds8UmooEeqxKwmvclbgSnlh&#34;,&#34;Fg4admsKEoYaY8xGgt6chXkPn7b&#34;,&#34;No8WdoWUCouq0ax27IlcBBYfnUh&#34;,&#34;H4KOdgC4QoK4QUxq6dqcLgFOnAd&#34;,&#34;AAasdiC28oKyKWx29T3cwQFsnpb&#34;,&#34;R8qwdcaGUoC64OxCMAKcqWaEnyd&#34;,&#34;GSaAdyMMcoeKaGx21jIcZ6i2n8d&#34;,&#34;FS86dSA8CoqGQsxaSaYcZt7lnZd&#34;,&#34;J8SWd8g00o22CoxigltcLyyfnHf&#34;,&#34;Oyeody2Ymoe66WxQPeAcwrCJnVc&#34;,&#34;CekudwAUooUkEQx2tircbu19n4c&#34;,&#34;XUeqdgWEEoQ6EaxOmiKcVK8rn7g&#34;,&#34;J620dKessom6oIxmUyWcG5xhnth&#34;,&#34;QEM2d4I0MouMWcxCkWbcUycTn8f&#34;,&#34;HUQOdsKQuoQsOCxKOjPc8TfHnvb&#34;,&#34;Vuo2dAwucoam62xGmaCcNbITnhf&#34;,&#34;W8c2d08YiowKSoxC8BtcdGLEnRd&#34;,&#34;H6qOdo2g0oe4o4xhvyEcZZFinwc&#34;,&#34;PoimdSAwCowciqxaQJ2cI9SrnMd&#34;,&#34;OS4udeww4oKEGyxkNbmcdUu6nDg&#34;,&#34;CO0qdkwaKoeow6xGQHAcuiWnnQd&#34;,&#34;UEM4dAE22oOuiyxcbOQc4KMtnDe&#34;,&#34;QcModmIsMoi44wxei6ecFEPVn2y&#34;,&#34;VAumdA2i0oK2YYxSgaecY9t3nxf&#34;,&#34;RWiId64Q2ouACCx4j8bcEP15ntb&#34;],&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;“微马二代”：针对微信的大规模黑产活动&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+j&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006010576289796&#34;]},&#34;nextNum&#34;:1}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}}},&#34;payloadMap&#34;:{&#34;YYGKdMiMwogGSyx69CIcH9PXnkd&#34;:{&#34;level&#34;:1},&#34;WAA4d4CyuouSuOx6nhHcyB3Jn5F&#34;:{&#34;level&#34;:1},&#34;Jm2cdoEEioCKk6xmwaYcbLewnQc&#34;:{&#34;level&#34;:1},&#34;RaAUd2SMsoqyQ4xYtdZc2wjrnOg&#34;:{&#34;level&#34;:1},&#34;QmeydAOiSomMgoxWKokcfGlcngh&#34;:{&#34;level&#34;:1},&#34;DmMWds2EIo6sMgxHZkNccz1jnh5&#34;:{&#34;level&#34;:1},&#34;WYAQdsEkOoEwqix4Xq7cYrv2nIg&#34;:{&#34;level&#34;:1},&#34;M8aOd4QO4oSeW4x8fVscsjdcnQc&#34;:{&#34;level&#34;:1},&#34;HMU0d4iYioMQmSxcRPtcS7Own2e&#34;:{&#34;level&#34;:1},&#34;Z8ukdYQ8Ko0ugOxKsiScVJf3nth&#34;:{&#34;level&#34;:1},&#34;ECscdgasYo6IGsxMX1qcDclpnye&#34;:{&#34;level&#34;:1},&#34;Q2qmdCe8eoeIigxI7j2cUlcvnNg&#34;:{&#34;level&#34;:1},&#34;HyocduioIoIYaIxk37fcRXwsnRg&#34;:{&#34;level&#34;:1},&#34;BaosdEcGSoIacWxUFUccER3Fnef&#34;:{&#34;level&#34;:1},&#34;BA8edK04uoE8SGxyymJcVVwrnBd&#34;:{&#34;level&#34;:1},&#34;NGImd22yMouS64xOE96ct1kwnAe&#34;:{&#34;level&#34;:1},&#34;KM4Yd0OcsoO4myxEDFockw4tnpd&#34;:{&#34;level&#34;:1},&#34;EYS2d28qmoMO6ixs9xCc93A8nsb&#34;:{&#34;level&#34;:1},&#34;II0GdYcwmokKO0xQpjycP13tnEf&#34;:{&#34;level&#34;:1},&#34;VOQAdMyo2oyWyaxemtBcGhhmnEL&#34;:{&#34;level&#34;:1},&#34;KQKKdAsWKo86qGx6oyeczjolnQf&#34;:{&#34;level&#34;:1},&#34;Eac8dY2ySocSWgxwj69cI6THnzb&#34;:{&#34;level&#34;:1},&#34;AkQudoMCmoOu0AxcPDdcSts0nxc&#34;:{&#34;level&#34;:1},&#34;KeWydiqouoUKqOxv6zkc68LhnHV&#34;:{&#34;level&#34;:1},&#34;YyGEd2sqyo2WqUxoT7pcdxB8nlc&#34;:{&#34;level&#34;:1},&#34;EU0cdsYaCo2kqqxOOczcT1TVn6e&#34;:{&#34;level&#34;:1},&#34;PsCmds8UmooEeqxKwmvclbgSnlh&#34;:{&#34;level&#34;:1},&#34;H4KOdgC4QoK4QUxq6dqcLgFOnAd&#34;:{&#34;level&#34;:1},&#34;R8qwdcaGUoC64OxCMAKcqWaEnyd&#34;:{&#34;level&#34;:1},&#34;FS86dSA8CoqGQsxaSaYcZt7lnZd&#34;:{&#34;level&#34;:1},&#34;Oyeody2Ymoe66WxQPeAcwrCJnVc&#34;:{&#34;level&#34;:1},&#34;J620dKessom6oIxmUyWcG5xhnth&#34;:{&#34;level&#34;:1},&#34;HUQOdsKQuoQsOCxKOjPc8TfHnvb&#34;:{&#34;level&#34;:1},&#34;W8c2d08YiowKSoxC8BtcdGLEnRd&#34;:{&#34;level&#34;:1},&#34;CO0qdkwaKoeow6xGQHAcuiWnnQd&#34;:{&#34;level&#34;:1},&#34;VAumdA2i0oK2YYxSgaecY9t3nxf&#34;:{&#34;level&#34;:1},&#34;RWiId64Q2ouACCx4j8bcEP15ntb&#34;:{&#34;level&#34;:1}},&#34;extra&#34;:{&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;isKeepQuoteContainer&#34;:false,&#34;selection&#34;:[{&#34;id&#34;:3,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;IWI8dq0KAoKEC4xmMnBcoFYNnmc&#34;},{&#34;id&#34;:4,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;YYGKdMiMwogGSyx69CIcH9PXnkd&#34;},{&#34;id&#34;:98,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;TCwad26kUoAUy6xyBBocU6v3nCB&#34;},{&#34;id&#34;:6,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;WAA4d4CyuouSuOx6nhHcyB3Jn5F&#34;},{&#34;id&#34;:7,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;Y4QWdiiG0oS80uxMZaecNeGUnAf&#34;},{&#34;id&#34;:99,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;Jm2cdoEEioCKk6xmwaYcbLewnQc&#34;},{&#34;id&#34;:105,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;BqkYd6u40ok44OxeQKqcRzVan3g&#34;},{&#34;id&#34;:10,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;RaAUd2SMsoqyQ4xYtdZc2wjrnOg&#34;},{&#34;id&#34;:11,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;QmeydAOiSomMgoxWKokcfGlcngh&#34;},{&#34;id&#34;:12,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;TwO8dgw2Ooomg2xU3qFcXxybn6c&#34;},{&#34;id&#34;:13,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;DmMWds2EIo6sMgxHZkNccz1jnh5&#34;},{&#34;id&#34;:14,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;U2m0dgYG6oWaK0xw76WcJ7HZnDe&#34;},{&#34;id&#34;:15,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;WYAQdsEkOoEwqix4Xq7cYrv2nIg&#34;},{&#34;id&#34;:16,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;Fy0CdIwiio4S86xmI0HcVE0PnVc&#34;},{&#34;id&#34;:17,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;Mogmdkai4ocUG4xoXhzcOfc4nug&#34;},{&#34;id&#34;:18,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;M8aOd4QO4oSeW4x8fVscsjdcnQc&#34;},{&#34;id&#34;:19,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;Sm4OdGyKQomYuoxm8ztcYBhwnIf&#34;},{&#34;id&#34;:20,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;HMU0d4iYioMQmSxcRPtcS7Own2e&#34;},{&#34;id&#34;:21,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;TYUkdSuayoyU0Wx2Dnscwf8Pnyf&#34;},{&#34;id&#34;:22,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;C0cedmkGKosEIaxoNSmc91YJnjb&#34;},{&#34;id&#34;:23,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;GsMidSE2MowAYaxcVf1cpi7Rnbf&#34;},{&#34;id&#34;:24,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;Z8ukdYQ8Ko0ugOxKsiScVJf3nth&#34;},{&#34;id&#34;:25,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;Gwa0dYomwomm8sxGSQhc93iInfd&#34;},{&#34;id&#34;:26,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;HwUSduWEOomCysxc1OVcpWPynuf&#34;},{&#34;id&#34;:27,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;ECscdgasYo6IGsxMX1qcDclpnye&#34;},{&#34;id&#34;:28,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;Z86Md60yOoEEAsxkpXUctiI1nLg&#34;},{&#34;id&#34;:29,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;Q2qmdCe8eoeIigxI7j2cUlcvnNg&#34;},{&#34;id&#34;:30,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;Bygqd6SGGoyKuIx8QK9cZ6wgnag&#34;},{&#34;id&#34;:31,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;Ayked0yoEoOmASxkjMJckM5ynNb&#34;},{&#34;id&#34;:32,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;HyocduioIoIYaIxk37fcRXwsnRg&#34;},{&#34;id&#34;:33,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;GqaIduU04oqEgYxEjb0c3FGAnZg&#34;},{&#34;id&#34;:34,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;BaosdEcGSoIacWxUFUccER3Fnef&#34;},{&#34;id&#34;:35,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;O82UdkgqqoMuUmxml8pcuxztnjQ&#34;},{&#34;id&#34;:36,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;PUsydWMoCo8gyixm45HcLMUCnRd&#34;},{&#34;id&#34;:37,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;BA8edK04uoE8SGxyymJcVVwrnBd&#34;},{&#34;id&#34;:38,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;VsmodO4ewo2AOmxmCVBc3HHtnfe&#34;},{&#34;id&#34;:39,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;EmOEdggEYoosIqxsvwvcnOpdnEK&#34;},{&#34;id&#34;:40,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;NGImd22yMouS64xOE96ct1kwnAe&#34;},{&#34;id&#34;:41,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;L66ydw2OsoIOg2xwz3Dc81p1npd&#34;},{&#34;id&#34;:42,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;KM4Yd0OcsoO4myxEDFockw4tnpd&#34;},{&#34;id&#34;:43,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;Cco4demoGou2oEx8blVcAZtQncf&#34;},{&#34;id&#34;:109,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;EYS2d28qmoMO6ixs9xCc93A8nsb&#34;},{&#34;id&#34;:108,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;PO6qdkAweowOqmx6nepcjinlnlc&#34;},{&#34;id&#34;:107,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;II0GdYcwmokKO0xQpjycP13tnEf&#34;},{&#34;id&#34;:44,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;KWiydCqYgoysQax6b8vccjB7nTe&#34;},{&#34;id&#34;:45,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;RcGIdgGG4o0eQOxg7mBcLZMlnxd&#34;},{&#34;id&#34;:46,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;VOQAdMyo2oyWyaxemtBcGhhmnEL&#34;},{&#34;id&#34;:47,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;D8k8dUoyWokISUxCanmcQNd7n3f&#34;},{&#34;id&#34;:48,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;SAa8dqYESoKQ40xMloHci3fNnvh&#34;},{&#34;id&#34;:49,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;KQKKdAsWKo86qGx6oyeczjolnQf&#34;},{&#34;id&#34;:50,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;EIo2diQMOoi8S8x6X4Dcx1wXnOe&#34;},{&#34;id&#34;:51,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;TMG6dqYSyoIm8IxKM2QcvI1Unag&#34;},{&#34;id&#34;:52,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;Hcood6Owkoa2uYxAp18cTciuntg&#34;},{&#34;id&#34;:53,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;Eac8dY2ySocSWgxwj69cI6THnzb&#34;},{&#34;id&#34;:54,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;ZWKqdiIuwoS0M6xc9yHc0dHBnKd&#34;},{&#34;id&#34;:55,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;ZUWYdmSAOo26uExWg1ncSxicnGe&#34;},{&#34;id&#34;:56,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;AkQudoMCmoOu0AxcPDdcSts0nxc&#34;},{&#34;id&#34;:110,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;KeWydiqouoUKqOxv6zkc68LhnHV&#34;},{&#34;id&#34;:93,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;MK4sdWswao4sGOxGgnwcaYzxn3e&#34;},{&#34;id&#34;:58,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;AcoEdCySco0MuCx4GkqcRMHfnyc&#34;},{&#34;id&#34;:59,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;YyGEd2sqyo2WqUxoT7pcdxB8nlc&#34;},{&#34;id&#34;:60,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;ZuSidQUomo4Gm4xsbmqcWVeFnLg&#34;},{&#34;id&#34;:61,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;EU0cdsYaCo2kqqxOOczcT1TVn6e&#34;},{&#34;id&#34;:62,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;AuuKdKWO4o4Mc2xIxkucq4bKnUX&#34;},{&#34;id&#34;:63,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;PsCmds8UmooEeqxKwmvclbgSnlh&#34;},{&#34;id&#34;:64,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;Fg4admsKEoYaY8xGgt6chXkPn7b&#34;},{&#34;id&#34;:65,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;No8WdoWUCouq0ax27IlcBBYfnUh&#34;},{&#34;id&#34;:66,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;H4KOdgC4QoK4QUxq6dqcLgFOnAd&#34;},{&#34;id&#34;:67,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;AAasdiC28oKyKWx29T3cwQFsnpb&#34;},{&#34;id&#34;:68,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;R8qwdcaGUoC64OxCMAKcqWaEnyd&#34;},{&#34;id&#34;:69,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;GSaAdyMMcoeKaGx21jIcZ6i2n8d&#34;},{&#34;id&#34;:70,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;FS86dSA8CoqGQsxaSaYcZt7lnZd&#34;},{&#34;id&#34;:71,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;J8SWd8g00o22CoxigltcLyyfnHf&#34;},{&#34;id&#34;:72,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;Oyeody2Ymoe66WxQPeAcwrCJnVc&#34;},{&#34;id&#34;:73,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;CekudwAUooUkEQx2tircbu19n4c&#34;},{&#34;id&#34;:74,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;XUeqdgWEEoQ6EaxOmiKcVK8rn7g&#34;},{&#34;id&#34;:75,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;J620dKessom6oIxmUyWcG5xhnth&#34;},{&#34;id&#34;:76,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;QEM2d4I0MouMWcxCkWbcUycTn8f&#34;},{&#34;id&#34;:77,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;HUQOdsKQuoQsOCxKOjPc8TfHnvb&#34;},{&#34;id&#34;:78,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;Vuo2dAwucoam62xGmaCcNbITnhf&#34;},{&#34;id&#34;:79,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;W8c2d08YiowKSoxC8BtcdGLEnRd&#34;},{&#34;id&#34;:80,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;H6qOdo2g0oe4o4xhvyEcZZFinwc&#34;},{&#34;id&#34;:81,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;PoimdSAwCowciqxaQJ2cI9SrnMd&#34;},{&#34;id&#34;:82,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;OS4udeww4oKEGyxkNbmcdUu6nDg&#34;},{&#34;id&#34;:83,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;CO0qdkwaKoeow6xGQHAcuiWnnQd&#34;},{&#34;id&#34;:84,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;UEM4dAE22oOuiyxcbOQc4KMtnDe&#34;},{&#34;id&#34;:85,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;QcModmIsMoi44wxei6ecFEPVn2y&#34;},{&#34;id&#34;:86,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;VAumdA2i0oK2YYxSgaecY9t3nxf&#34;},{&#34;id&#34;:87,&#34;type&#34;:&#34;block&#34;,&#34;recordId&#34;:&#34;RWiId64Q2ouACCx4j8bcEP15ntb&#34;}],&#34;pasteFlag&#34;:&#34;563e14fc-05a4-45fd-8307-1254d3ec9a99&#34;}" data-lark-record-format="docx/record"></span></section><section style="text-align: left;line-height: 1.75em;"><br/></section><p style="display: none;"><mp-style-type data-value="3"></mp-style-type></p>



<p><a href="2247485707">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=dfc55194&amp;r=1&amp;u=https%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzU2OTcxNjE4Mw%3D%3D%26mid%3D2247485707%26idx%3D1%26sn%3D907e41e55ba2d5255ed50c8c7f4a9a90%26subscene%3D0">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Fri, 18 Nov 2022 17:18:00 +0800</pubDate>
    </item>
    <item>
      <title>针对 MSSQL 服务器的勒索与窃密攻击</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzU2OTcxNjE4Mw==&amp;mid=2247485671&amp;idx=1&amp;sn=197b41a82887a29a18d458673c93d970</link>
      <description>2021年5月以来鹰眼情报中心（https://ti.duba.net）陆续监测到一些具有相似行为特征的针对 MSSQL 服务器攻击事件。</description>
      <content:encoded><![CDATA[<p>
原创 <span>aw</span> <span>2022-10-11 16:08</span> <span style="display: inline-block;">广东</span>
</p>

<p>2021年5月以来鹰眼情报中心（https://ti.duba.net）陆续监测到一些具有相似行为特征的针对 MSSQL 服务器攻击事件。</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=4bd7ffdc&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2FXia34CufgojsXqbHJibSIUwoViagfoibrxia8T2hCK3EzmRFLYtnEHn5VRmTHL0tYJ2QrfiaWD8cm8ULVyg0l3XPYmZA%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<section style="text-align: center;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.5583634175691937" data-s="300,640" style="" data-type="png" data-w="831" src="https://wechat2rss.xlab.app/img-proxy/?k=beca74df&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsXqbHJibSIUwoViagfoibrxia8YZ2qUtfTKTiaw3L5SbOJNuglZXibY8XFFavdRLspQT3E9SId75ILNw8A%2F640%3Fwx_fmt%3Dpng"/></section><h3 style="white-space: pre-wrap;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"></h3><h3 style="white-space: pre-wrap;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;"><strong><br/></strong></span></h3><h3 style="white-space: pre-wrap;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 18px;"><strong>事件</strong><strong>概述</strong></span></h3><h3 style="white-space: pre-wrap;text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;">2<span style="letter-spacing: 0.5px;text-indent: 2em;">021年5月以来鹰眼情报中心（<a href="https://ti.duba.net）陆续监测到一些具有相似行为特征的针对" target="_blank">https://ti.duba.net）陆续监测到一些具有相似行为特征的针对</a> MSSQL 服务器攻击事件。</span></span></h3><h3 style="white-space: pre-wrap;text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;">在分析了这些相似攻击的活动<span style="letter-spacing: 0.5px;text-indent: 2em;">后，我们整理了其攻击流程和技术特征：攻击者针对 MSSQL 脆弱性进行攻击，通过爆破弱口令或漏洞利用的方式获取 MSSQL 的管理员账户权限，随后通过 MSSQL 相关进程调用命令行 Shell（cmd.exe 和 powershell.exe）来下拉和执行载荷模块，载荷负责运行 Cobalt Strike 模块。</span></span></h3><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;text-indent: 2em;font-size: 16px;">在使用 Cobalt Strike 成功感染受害机器后攻击者会下发不同的功能模块，我们观察到攻击者下发 AnyDesk 远控软件和 Mallox 勒索病毒。</span></section><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;text-indent: 2em;font-size: 16px;">值得一提的是，近期从攻击者的远控服务器下拉的攻击载荷都已经被 Neshta 病毒污染。在用户环境中监测到该攻击者活动后，我们从用户环境提取到的载荷模块正常，但间隔一天后再次从远控服务器下拉的载荷已经被 Neshta 污染。</span></section><h3 style="white-space: pre-wrap;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><br/></h3><h3 style="white-space: pre-wrap;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 18px;"><strong>流程分析</strong></span></h3><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;">攻击者首先通过爆破或漏洞获取了目标服务器上的 MSSQL 账户权限，然后通过 Sql Server 的 xp_cmdshell 组件创建了一个 cmd shell，利用 cmd 生成了 PowerShell 脚本并执行。</span></section><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;">PowerShell 脚本从远控服务器下拉攻击载荷，该载荷启动后在内存中解密出 Cobalt Strike 的远控模块 Beacon.dll 并执行，随后攻击者利用 Beacon.dll 模块下发其它组件到被感染机器。在本次攻击事件中，攻击者在受感染的机器上下发 AnyDesk 实现远程控制主机进行窃密，而相似的历史攻击活动中看到攻击者曾下发 Mallox 勒索软件。</span></section><section style="line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><img class="rich_pages wxw-img" data-ratio="0.6077457795431976" data-w="1007" data-type="png" src="https://wechat2rss.xlab.app/img-proxy/?k=01bb1536&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsXqbHJibSIUwoViagfoibrxia8Pep0kXMNI4ekRSqB8Wl8nGdROUU8kg7vbbtST1Uicavu5WtDxBbnHnA%2F640%3Fwx_fmt%3Dpng"/></section><section style="line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;"><strong><br/></strong></span></section><h3 style="white-space: pre-wrap;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 18px;"><strong>详细分析</strong></span></h3><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;">以近期捕获到的样本 b92.exe 为例，介绍攻击者入侵和感染受害者机器的过程。</span></section><h4 style="white-space: pre-wrap;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;"><strong>运行载荷</strong></span></h4><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;">下图是攻击者通过 xp_cmdshell 执行的 cmd 命令。xp_cmdshell 是 Sql Server 中的一个组件，通过它可以使用 T-SQL 字符串直接向 Windows 的 cmd shell 发出命令。</span></section><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;">该命令在 %TEMP% 目录下创建了 test.ps1 脚本文件并调用 PowerShell 执行该脚本。test.ps1 执行后从远控服务器 (http[:]//144.48.240.69/b92.exe) 下载攻击载荷 b92.exe，将 b92.exe 重命名后写入 %TEMP% 目录下并运行。</span></section><section style="line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><img class="rich_pages wxw-img" data-height="102" data-ratio="0.10920770877944326" data-width="934" data-type="png" data-w="934" src="https://wechat2rss.xlab.app/img-proxy/?k=7140bac2&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsXqbHJibSIUwoViagfoibrxia8bI2BrVgsfotnwFql594ZGZnT5Y6EQ1lB1DY9kiaLI71f7vxkRV72ZhA%2F640%3Fwx_fmt%3Dpng"/></section><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><br/></section><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;">b92.exe 从两块原始数据中解密出 Beacon.dll，该 DLL 是内存中的模块，没有文件落地。创建线程并将 Beacon.dll 作为代码执行，之后流程进入 Beacon.dll 中。</span></section><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;">下图是 b92.exe 解密 Beacon.dll 和创建线程运行该 dll 的过程。</span></section><section style="line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><img class="rich_pages wxw-img" data-height="186" data-ratio="0.23163138231631383" data-width="803" data-type="png" data-w="803" src="https://wechat2rss.xlab.app/img-proxy/?k=991aa3db&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsXqbHJibSIUwoViagfoibrxia8usTdcueLvLRYPx9kz6ibQ8Yd7q9xjXKG3JiaPDic4Te99kxibu4KgyRI0Q%2F640%3Fwx_fmt%3Dpng"/></section><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;"><br/></span></section><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;">Beacon.dll 文件的 DOS 头是一段 shellcode，该指令反汇编前后的对比如下。这部分 shellcode 代码将 Beacon.dll 装载PE，再跳转到 dll 入口点运行。</span></section><section style="line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><img class="rich_pages wxw-img" data-height="456" data-ratio="0.5671641791044776" data-width="804" data-type="png" data-w="804" src="https://wechat2rss.xlab.app/img-proxy/?k=ddcbaec7&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsXqbHJibSIUwoViagfoibrxia86xKTf9yob5ryZPlEBkDiapialibPWDYjdAhAMQGpgPGEKsSd47icrsvPBg%2F640%3Fwx_fmt%3Dpng"/></section><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><br/></section><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;">Beacon.dll 解密配置文件的过程如下，通过 XOR 0x2E 运算解出配置文件。</span></section><section style="line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><img class="rich_pages wxw-img" data-height="171" data-ratio="0.21375" data-width="800" data-type="png" data-w="800" src="https://wechat2rss.xlab.app/img-proxy/?k=73df1860&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsXqbHJibSIUwoViagfoibrxia8ic2SxBr2HjibicaTYPiaxgFgLZBORj7yausQI7kZS4EPc3U6icLDFbZSe0Q%2F640%3Fwx_fmt%3Dpng"/></section><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><br/></section><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;">解密得到 Beacon.dll 的部分配置如下，其中包含了攻击者远控服务器的地址&#34;92.255.85.141&#34;。</span></section><section style="line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><img class="rich_pages wxw-img" data-height="625" data-ratio="0.7233796296296297" data-width="864" data-type="png" data-w="864" src="https://wechat2rss.xlab.app/img-proxy/?k=48a43963&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsXqbHJibSIUwoViagfoibrxia88JcUMYiclPIPtYciaAs7JJ0j2Z9sDh0KJicpFQrv2C7gsZcnLf9micnp8A%2F640%3Fwx_fmt%3Dpng"/></section><section style="line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><br/></section><h4 style="white-space: pre-wrap;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;"><strong>下发 AnyDesk</strong></span></h4><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;">我们在被感染机器上发现攻击者大多时候会下发 AnyDesk 软件到被感染机器上，<span style="letter-spacing: 0.5px;text-indent: 2em;">AnyDesk 是一款远程控制程序，提供远程桌面控制、文件传输等多种功能。使用 AnyDesk 进行远程避免了 Cobalt Strike 流量特征容易被检出的风险，且 AnyDesk  软件可以使用官方的服务器中转网络流量，这种情况下受害者与攻击者没有直接通信，有利于攻击者隐藏自身行踪。</span></span></section><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;">下列命令是在被感染机器中发现的，攻击者安装 AnyDesk 软件并设置远程密码。</span></section><section style="line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><img class="rich_pages wxw-img" data-height="209" data-ratio="0.23509561304836896" data-width="889" data-type="png" data-w="889" src="https://wechat2rss.xlab.app/img-proxy/?k=40e274c1&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsXqbHJibSIUwoViagfoibrxia8FxA22JgnnvBZAmgAmPFiaO7uJZPSyhBQBxicf5fwh9BtX7nQicRYhmdBw%2F640%3Fwx_fmt%3Dpng"/></section><section style="line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><br/></section><h4 style="white-space: pre-wrap;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;"><strong>下发 Mallox 勒索病毒</strong></span></h4><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;">攻击者曾在2021年10月下发 Mallox 勒索病毒，该病毒因文件被加密后的后缀名为 .mallox  而得名，国外安全厂商称其为 TargetCompany 家族。攻击流程和使用的技术与上述均保持一致，只是在不同时期 C2 有变化，下图是攻击者渗透MSSQL 服务器后下拉 Mallox 勒索的命令。</span></section><section style="line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><img class="rich_pages wxw-img" data-height="97" data-ratio="0.09264565425023878" data-width="1047" data-type="png" data-w="1047" src="https://wechat2rss.xlab.app/img-proxy/?k=dd7d8bef&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsXqbHJibSIUwoViagfoibrxia8WLsnZkMe4kmBcp6rfGFnHLb26H6ggju7p0eQyNoPhetnZjOrfwiaywQ%2F640%3Fwx_fmt%3Dpng"/></section><p style="line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;text-indent: 2em;"><br/></p><p style="line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;text-indent: 2em;"><span style="letter-spacing: 0.5px;font-size: 16px;">Mallox 勒索病毒执行的进程链与部分样本MD5。</span></p><section style="line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><img class="rich_pages wxw-img" data-height="292" data-ratio="0.27037037037037037" style="width: 578px;height: auto;" data-type="png" data-w="1080" data-width="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=2c453812&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsXqbHJibSIUwoViagfoibrxia8S4icv0WFZtzIwJnp8AWpNnXaeJwAxt1gOmiaMP8OvtnibyYSxicTywhXYQ%2F640%3Fwx_fmt%3Dpng"/></section><p style="line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;text-indent: 2em;"><br/></p><p style="line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;text-indent: 2em;"><span style="letter-spacing: 0.5px;font-size: 16px;">攻击者留下的勒索信。</span></p><section style="line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><img class="rich_pages wxw-img" data-height="366" data-ratio="0.3864836325237592" data-width="947" data-type="png" data-w="947" src="https://wechat2rss.xlab.app/img-proxy/?k=b3c9befc&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsXqbHJibSIUwoViagfoibrxia8xCM498b1R00drjsgicOicicnh7J96CjGfaC6eibeOVyuZzHkgYHgiczIrSw%2F640%3Fwx_fmt%3Dpng"/></section><h4 style="white-space: pre-wrap;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;"><strong><br/></strong></span></h4><h4 style="white-space: pre-wrap;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;"><strong>同源样本关联</strong></span></h4><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;">登录鹰眼情报中心（<a href="https://ti.duba.net），搜索或者上传样本后查看分析出的" target="_blank">https://ti.duba.net），搜索或者上传样本后查看分析出的</a> C2 配置，通过 IP 地址查看所属家族和地区等详细信息，在&#34;关联情报&#34;中点击相关通信文件等选项即可获取关联的同源家族样本。</span></section><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;">下图是攻击者 C2 和关联通信的样本。</span></section><section style="line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><img class="rich_pages wxw-img" data-height="1400" data-ratio="1.3958125623130608" data-width="1003" data-type="png" data-w="1003" src="https://wechat2rss.xlab.app/img-proxy/?k=3a85d6be&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsXqbHJibSIUwoViagfoibrxia8Gh7kf6dpu9RX7WwoE4Rbn1wXia8icBlbvyIF21GnDK0DRflKJFaCLVpw%2F640%3Fwx_fmt%3Dpng"/></section><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;"><br/></span></section><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;">也通过样本的 MD5 查看其通信的 IP。<br/></span></section><section style="line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><img class="rich_pages wxw-img" data-height="678" data-ratio="0.6759720837487537" data-width="1003" data-type="png" data-w="1003" src="https://wechat2rss.xlab.app/img-proxy/?k=158562ca&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsXqbHJibSIUwoViagfoibrxia8gsQkEXpCgkCHQcUPcdWpc2NRXG6icVUEgiblvLBybpw9NL6968QYNoHQ%2F640%3Fwx_fmt%3Dpng"/></section><section style="line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><br/></section><h3 style="white-space: pre-wrap;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 18px;"><strong>总结</strong></span></h3><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;">多年来，MSSQL 服务器一直是网络攻击活动的主要目标之一，攻击者每天都会尝试渗透暴露在公网中的 MSSQL 服务，进而劫持服务器。在近两年的攻击事件中，攻击者通过暴力破解、数据库 NDay 漏洞等手段获取数据库权限来完全控制 MSSQL 服务器，进而完成数据窃取或部署挖矿木马、勒索病毒等恶意模块。</span></section><section style="text-indent: 2em;line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><span style="letter-spacing: 0.5px;font-size: 16px;">为了避免 MSSQL 服务器被此类攻击渗透，我们建议对 MSSQL 使用强密码并定期更新密码，及时更新补丁来修补漏洞，定期备份数据，避免使用默认端口，尽量不暴露在公网，并确保服务器始终处在防火墙的保护之下。</span></section><section style="line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><img class="rich_pages wxw-img" data-height="441" data-ratio="0.5582278481012658" data-width="790" data-type="png" data-w="790" src="https://wechat2rss.xlab.app/img-proxy/?k=3db30281&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojsXqbHJibSIUwoViagfoibrxia8X4RSgpOKTypzdLWGxiaF7wSh705drpdAssaKgzczdlpAqia5HfLDkMgQ%2F640%3Fwx_fmt%3Dpng"/></section><section style="line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><br/></section><h3 style="white-space: pre-wrap;line-height: 1.6em;margin-top: 0px;margin-bottom: 8px;"><span style="font-size: 18px;"><strong><span style="font-size: 18px;letter-spacing: 0.5px;">IOC</span></strong></span></h3><h4 style="white-space: pre-wrap;line-height: 1.6em;margin-top: 0px;margin-bottom: 8px;"><span style="font-size: 16px;"><strong><span style="letter-spacing: 0.5px;">MD5</span></strong></span></h4><section style="line-height: 1.6em;margin-top: 0px;margin-bottom: 0px;"><span style="letter-spacing: 0.5px;font-size: 16px;">5160c839bc5a1c79b2909e5d75bee1d4</span></section><section style="line-height: 1.6em;margin-top: 0px;margin-bottom: 0px;"><span style="letter-spacing: 0.5px;font-size: 16px;">fdc596fbeb0688b50ff7b9ab8a3e0e6c</span></section><section style="line-height: 1.6em;margin-top: 0px;margin-bottom: 0px;"><span style="letter-spacing: 0.5px;font-size: 16px;">9d3db17fb661b23b535ad1dc949e5c5f</span></section><section style="line-height: 1.6em;margin-top: 0px;margin-bottom: 0px;"><span style="letter-spacing: 0.5px;font-size: 16px;">315aaf1f0128e50999fd5b82949a9267</span></section><h4 style="white-space: pre-wrap;line-height: 1.6em;margin-top: 0px;margin-bottom: 8px;"><span style="font-size: 16px;"><strong><span style="letter-spacing: 0.5px;">C2</span></strong></span></h4><section style="line-height: 1.6em;margin-top: 0px;margin-bottom: 0px;"><span style="letter-spacing: 0.5px;font-size: 16px;">144.48.240.69</span></section><section style="line-height: 1.6em;margin-top: 0px;margin-bottom: 0px;"><span style="letter-spacing: 0.5px;font-size: 16px;">92.255.85.141</span></section><section style="line-height: 1.6em;margin-top: 0px;margin-bottom: 0px;"><span style="letter-spacing: 0.5px;font-size: 16px;">91.243.44.38</span></section><section style="line-height: 1.6em;margin-top: 0px;margin-bottom: 0px;"><span style="letter-spacing: 0.5px;font-size: 16px;">81.68.76.46</span></section><section style="line-height: 1.6em;margin-top: 0px;margin-bottom: 0px;"><span style="letter-spacing: 0.5px;font-size: 16px;"><br/></span></section><section style="line-height: 1.6em;margin-top: 8px;margin-bottom: 8px;"><section style="display: none;line-height: 1.5em;"><br/></section></section><p style="display: none;"><mp-style-type data-value="3"></mp-style-type></p>



<p><a href="2247485671">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=0e849ffc&amp;r=1&amp;u=https%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzU2OTcxNjE4Mw%3D%3D%26mid%3D2247485671%26idx%3D1%26sn%3D197b41a82887a29a18d458673c93d970%26subscene%3D0">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Tue, 11 Oct 2022 16:08:00 +0800</pubDate>
    </item>
    <item>
      <title>微软2022年7月安全补丁更新公告</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzU2OTcxNjE4Mw==&amp;mid=2247485653&amp;idx=1&amp;sn=6c80b0bd67a6bc6e959868c68c5c3edf</link>
      <description>[公告简述]2022年07月13日，微软发布2022年7月份安全更新，本次更新涉及84个漏洞的修复，按照漏洞</description>
      <content:encoded><![CDATA[<p>
<span></span> <span>2022-07-13 21:18</span> <span style="display: inline-block;">广东</span>
</p>

<p>[公告简述]2022年07月13日，微软发布2022年7月份安全更新，本次更新涉及84个漏洞的修复，按照漏洞</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=e183f81e&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2FXia34CufgojsZZj93WyBj0C4CRWmMhwQtsFNib6u9yR56NJqFV4rojzKhnFH6FtJUaeQW9YrbDyaOdAs8DH2HYXA%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p><strong>[公告简述]</strong></p><p>2022年07月13日，微软发布2022年7月份安全更新，本次更新涉及84个漏洞的修复，按照漏洞类型划分：12个远程执行代码漏洞、52个特权提升漏洞、11个信息泄露漏洞、5个拒绝服务漏洞、4个安全功能绕过漏洞，其中4个漏洞风险评定级别为“Critical”（高危），80个为“Important”（严重）。其中4个被归类为高危等级，可能造成远程代码执行利用。</p><p>另外还包括目前被发现在野利用的&#34;Windows CSRSS 特权提升漏洞(CVE-2022-22047)&#34;，成功利用此漏洞的攻击者可以获得系统权限，此漏洞由Microsoft 威胁情报中心 (MSTIC) 和 Microsoft 安全响应中心 (MSRC) 在内部监控发现。</p><p><br/></p><p><strong>[漏洞列表]</strong></p><table cellpadding="0" cellspacing="0" width="636" height="1566"><colgroup><col width="257" style="width:192.75pt;"/><col width="147" style="width:110.25pt;"/><col width="373" style="width:279.75pt;"/><col width="72" style="width:54.00pt;"/></colgroup><tbody><tr height="18" style="height:13.50pt;"><td height="13" width="192" x:str="" style="">组件标签</td><td width="110" x:str="" style="">CVE编号</td><td width="279" x:str="" style="">漏洞标题</td><td width="54" x:str="" style="">严重性</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Microsoft Graphics Component</td><td x:str="">CVE-2022-30221</td><td x:str="">Windows 图形组件远程代码执行漏洞</td><td x:str="">严重</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows 网络文件系统</td><td x:str="">CVE-2022-22029</td><td x:str="">Windows 网络文件系统远程代码执行漏洞</td><td x:str="">严重</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows 网络文件系统</td><td x:str="">CVE-2022-22039</td><td x:str="">Windows 网络文件系统远程代码执行漏洞</td><td x:str="">严重</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows 远程过程调用运行时</td><td x:str="">CVE-2022-22038</td><td x:str="">远程过程调用运行时远程代码执行漏洞</td><td x:str="">严重</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">AMD CPU 分支</td><td x:str="">CVE-2022-23825</td><td x:str="">AMD：CVE-2022-23825 <span style="mso-spacerun:yes;"> </span>AMD CPU 分支类型混淆</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">AMD CPU 分支</td><td x:str="">CVE-2022-23816</td><td x:str="">AMD：CVE-2022-23816 <span style="mso-spacerun:yes;"> </span>AMD CPU 分支类型混淆</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33665</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33666</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33663</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33664</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33667</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33672</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33673</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33671</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33668</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33661</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33662</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33657</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33656</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33658</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33660</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33659</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33655</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33651</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33650</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33652</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33654</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33653</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33669</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33643</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-30181</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33676</td><td x:str="">Azure Site Recovery 远程代码执行漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33677</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33678</td><td x:str="">Azure Site Recovery 远程代码执行漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33642</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33674</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33675</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure Site Recovery</td><td x:str="">CVE-2022-33641</td><td x:str="">Azure Site Recovery 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Azure 存储库</td><td x:str="">CVE-2022-30187</td><td x:str="">Azure 存储库信息泄露漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Microsoft Defender for Endpoint</td><td x:str="">CVE-2022-33637</td><td x:str="">Microsoft Defender for Endpoint篡改漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Microsoft Graphics Component</td><td x:str="">CVE-2022-22034</td><td x:str="">Windows 图形组件特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Microsoft Graphics Component</td><td x:str="">CVE-2022-30213</td><td x:str="">Windows GDI+ 信息泄露漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Microsoft Office</td><td x:str="">CVE-2022-33632</td><td x:str="">Microsoft Office 安全功能绕过漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">开源软件</td><td x:str="">CVE-2022-27776</td><td x:str="">HackerOne：CVE-2022-27776 <span style="mso-spacerun:yes;"> </span>凭据保护不足漏洞可能会泄漏身份验证或 cookie 标头数据</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">角色：DNS服务器</td><td x:str="">CVE-2022-30214</td><td x:str="">Windows DNS 服务器远程执行代码漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">角色：Windows 传真服务</td><td x:str="">CVE-2022-22024</td><td x:str="">Windows 传真服务远程代码执行漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">角色：Windows 传真服务</td><td x:str="">CVE-2022-22027</td><td x:str="">Windows 传真服务远程代码执行漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">角色：Windows Hyper-V</td><td x:str="">CVE-2022-30223</td><td x:str="">Windows Hyper-V 信息泄露漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">角色：Windows Hyper-V</td><td x:str="">CVE-2022-22042</td><td x:str="">Windows Hyper-V 信息泄露漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Skype for Business 和 Microsoft Lync</td><td x:str="">CVE-2022-33633</td><td x:str="">Skype for Business 和 Lync 远程代码执行漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows Active Directory</td><td x:str="">CVE-2022-30215</td><td x:str="">Active Directory 联合服务特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows 高级本地过程调用</td><td x:str="">CVE-2022-30202</td><td x:str="">Windows 高级本地过程调用特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows 高级本地过程调用</td><td x:str="">CVE-2022-30224</td><td x:str="">Windows 高级本地过程调用特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows 高级本地过程调用</td><td x:str="">CVE-2022-22037</td><td x:str="">Windows 高级本地过程调用特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows BitLocker</td><td x:str="">CVE-2022-22711</td><td x:str="">Windows BitLocker 信息泄露漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows BitLocker</td><td x:str="">CVE-2022-22048</td><td x:str="">BitLocker 安全功能绕过漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows 启动管理器</td><td x:str="">CVE-2022-30203</td><td x:str="">Windows 启动管理器安全功能绕过漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows 客户端/服务器运行时子系统</td><td x:str="">CVE-2022-22026</td><td x:str="">Windows CSRSS 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows 客户端/服务器运行时子系统</td><td x:str="">CVE-2022-22049</td><td x:str="">Windows CSRSS 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows 客户端/服务器运行时子系统</td><td x:str="">CVE-2022-22047</td><td x:str="">Windows CSRSS 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows 连接设备平台服务</td><td x:str="">CVE-2022-30212</td><td x:str="">Windows 连接设备平台服务信息泄露漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows 凭据保护</td><td x:str="">CVE-2022-22031</td><td x:str="">Windows Credential Guard 加入域的公钥提权漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows Fast FAT Driver</td><td x:str="">CVE-2022-22043</td><td x:str="">Windows Fast FAT Drive特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows 传真和扫描服务</td><td x:str="">CVE-2022-22050</td><td x:str="">Windows 传真服务特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows 组策略</td><td x:str="">CVE-2022-30205</td><td x:str="">Windows 组策略特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows IIS</td><td x:str="">CVE-2022-30209</td><td x:str="">Windows IIS 服务器特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows IIS</td><td x:str="">CVE-2022-22025</td><td x:str="">Windows Internet Information Services <span style="mso-spacerun:yes;"> </span>Cachuri 模块拒绝服务漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows IIS</td><td x:str="">CVE-2022-22040</td><td x:str="">Internet 信息服务动态压缩模块拒绝服务漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows Kernel</td><td x:str="">CVE-2022-21845</td><td x:str="">Windows Kernel信息泄露漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows Media</td><td x:str="">CVE-2022-22045</td><td x:str="">Windows.Devices.Picker.dll 特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows Media</td><td x:str="">CVE-2022-30225</td><td x:str="">Windows Media Player 网络共享服务提权漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows 网络文件系统</td><td x:str="">CVE-2022-22028</td><td x:str="">Windows 网络文件系统信息泄露漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows 性能计数器</td><td x:str="">CVE-2022-22036</td><td x:str="">Windows 特权提升漏洞的性能计数器</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows 点对点隧道协议</td><td x:str="">CVE-2022-30211</td><td x:str="">Windows 第 2 层隧道协议 (L2TP) 远程代码执行漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows Portable Device Enumerator Service</td><td x:str="">CVE-2022-22023</td><td x:str="">Windows Portable Device Enumerator Service安全功能绕过漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows 打印后台处理程序组件</td><td x:str="">CVE-2022-30206</td><td x:str="">Windows 后台打印程序特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows 打印后台处理程序组件</td><td x:str="">CVE-2022-30226</td><td x:str="">Windows 后台打印程序特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows 打印后台处理程序组件</td><td x:str="">CVE-2022-22022</td><td x:str="">Windows 后台打印程序特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows 打印后台处理程序组件</td><td x:str="">CVE-2022-22041</td><td x:str="">Windows 后台打印程序特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows 安全帐户管理器</td><td x:str="">CVE-2022-30208</td><td x:str="">Windows 安全帐户管理器 (SAM) 拒绝服务漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows 服务器服务</td><td x:str="">CVE-2022-30216</td><td x:str="">Windows Server 服务篡改漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows Shell</td><td x:str="">CVE-2022-30222</td><td x:str="">Windows Shell 远程代码执行漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Windows Storage</td><td x:str="">CVE-2022-30220</td><td x:str="">Windows 通用日志文件系统驱动程序特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Xbox</td><td x:str="">CVE-2022-33644</td><td x:str="">Xbox Live 保存服务特权提升漏洞</td><td x:str="">重要</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Microsoft Edge（基于Chromium）</td><td x:str="">CVE-2022-2295</td><td x:str="">Chromium：V8 中的 CVE-2022-2295 类型混淆</td><td x:str="">未知</td></tr><tr height="18" style="height:13.50pt;"><td height="13" x:str="" style="">Microsoft Edge（基于Chromium）</td><td x:str="">CVE-2022-2294</td><td x:str="">Chromium：CVE-2022-2294 <span style="mso-spacerun:yes;"> </span>WebRTC 中的堆缓冲区溢出</td><td x:str="">未知</td></tr></tbody></table><p><strong>[重点漏洞]</strong></p><ul start="1" class="list-paddingleft-1"><li><p>CVE-2022-22047（Windows CSRSS权限提升漏洞）</p></li></ul><p>该漏洞存在于客户端/服务器运行时子系统（CSRSS）中，目前已发现在野利用，成功利用允许攻击者以System权限执行代码。</p><ul start="1" class="list-paddingleft-1"><li><p>CVE-2022-22038（Windows RPC运行时远程代码执行漏洞）</p></li></ul><p>此漏洞存在于漏洞存在于Microsoft Remote Procedure Call Runtime中，允许攻击者在未经身份验证的情况下对受漏洞影响的系统进行远程代码攻击。攻击复杂度很高，要成功利用此漏洞，攻击者需要花费时间通过发送恒定或间歇性数据来重复利用尝试。</p><ul start="1" class="list-paddingleft-1"><li><p>CVE-2022-22029（Windows网络文件系统远程代码执行漏洞）</p></li></ul><p>此漏洞允许攻击者在未经身份验证且无需用户交互的情况下，向目标NFS服务器发送漏洞利用请求从而在目标系统上执行任意代码。</p><ul start="1" class="list-paddingleft-1"><li><p>CVE-2022-30216（Windows Server Service 篡改漏洞）</p></li></ul><p>此漏洞允许经过身份验证的攻击者可以远程将恶意证书上传到受影响的服务器上从而篡改服务，包括但不限于代码执行的诸多利用方式。</p><p><br/></p><p><strong>[安全建议]</strong></p><p>毒霸安全专家建议用户及时更新Windows版本并保持Windows自动更新服务开启。</p><p>有关7月安全更新的更多信息，请参考微软官方安全更新指南：<span style="color:rgb(36,91,219);"><em><a href="https://msrc.microsoft.com/update-guide/releaseNote/2022-Jul" target="_blank">https://msrc.microsoft.com/update-guide/releaseNote/2022-Jul</a></em></span></p><p><br/></p><p><br/></p>



<p><a href="2247485653">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=83fdfc86&amp;r=1&amp;u=https%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzU2OTcxNjE4Mw%3D%3D%26mid%3D2247485653%26idx%3D1%26sn%3D6c80b0bd67a6bc6e959868c68c5c3edf%26subscene%3D0">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Wed, 13 Jul 2022 21:18:00 +0800</pubDate>
    </item>
    <item>
      <title>黑客组织以举报为诱饵针对信访机构发起攻击</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzU2OTcxNjE4Mw==&amp;mid=2247485649&amp;idx=1&amp;sn=5919350ed55149699edef6f5827ce12d</link>
      <description>警惕！以“举报”之名的钓鱼攻击！</description>
      <content:encoded><![CDATA[<p>
原创 <span>安全豹</span> <span>2022-06-24 14:44</span> <span style="display: inline-block;">广东</span>
</p>

<p>警惕！以“举报”之名的钓鱼攻击！</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=19c0b14f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2FXia34Cufgojvr3adm44RkyZuFt4lwnKibuLTI70d1axf9KQ7O9vXan6Yq689CtibPak5yh1Nwmibib6JK3ONPJ4aG3g%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<h1><strong><span style="font-size: 24px;">事件概述</span></strong></h1><p>近期鹰眼威胁情报中心 (<a href="https://ti.duba.net/)" target="_blank">https://ti.duba.net/)</a> 陆续捕获到多个以“举报”为诱饵的一批的钓鱼攻击，攻击者对多个目标投放诱饵，涉及高校，金融公司，高新技术企业等，诱饵文件名包含如下字样：“举报材料”、“作弊证据”、“举报证据”等。其中一些是对企事业单位信访科的攻击可见是非常有预谋的定向攻击。这些诱饵最终都会释放 Cobalt Strike 远控，企图对目标进行长期监控和对内网的进一步渗透攻击。攻击者对不同的目标都做了定制化的免杀，样本都不重复，推测攻击者对目标环境有一定的了解。例如在针对某信访科的攻击中使用了双诱饵，内存中执行的 CS Shellcode 利用 SEH 异常机制动态解密和执行指令，每次执行一条指令后就清空上一条指令，内存中始终只保留一条指令，躲避启发式查杀和内存扫描。其他几例攻击中分别使用了 Go 语言和 Python 打包混合执行以及文件膨胀免杀。最终的 C2 都指向腾讯云的 API 网关从而隐藏真实的 C2 地址，可以看出攻击者有较强免杀和隐藏技巧。</p><p><br/></p><h1><span style="font-size: 24px;"><strong>1. 针对某</strong><strong>单位</strong><strong>信访</strong><strong>科</strong><strong>的钓鱼分析</strong></span></h1><p>此次攻击使用电子刊物格式 caj 和可携带文档格式 pdf 的图标，并配以举报材料和作弊证据的名字进行迷惑用户点击。用户无论打开哪一个，其攻击手段如出一辙。</p><p><br/></p><p style="text-align: center;margin-bottom: 0em;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.5984251968503937" data-s="300,640" style="" data-type="png" data-w="254" src="https://wechat2rss.xlab.app/img-proxy/?k=8f7a589e&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvr3adm44RkyZuFt4lwnKibuN4y8O68pZXapQ3JHS7MLVyLQ55gBKYfHAic61uBv8dIzlZ17mpAuD6w%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;margin-bottom: 0em;"><br/></p><p>样本运行后，都是通过先安装 SEH，然后去执行 0xcc 地址触发异常，利用某些引擎对 SEH 的模拟处理不完善，从而绕过其动态启发式的查杀。在进入异常处理流程后，进行动态链式的解密清空执行所需的 ShellCode，这种处理明显是为了躲避杀软的内存扫描，在异常的“<span style="color: rgb(51, 51, 51);font-family: mp-quote, -apple-system-font, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;font-size: 17px;font-style: normal;font-variant-ligatures: normal;font-variant-caps: normal;font-weight: 400;letter-spacing: normal;orphans: 2;text-align: justify;text-indent: 0px;text-transform: none;widows: 2;word-spacing: 0px;-webkit-text-stroke-width: 0px;text-decoration-style: initial;text-decoration-color: initial;display: inline !important;float: none;">加持</span>”下内存始终保持着最长 20 字节的指令。</p><p><br/></p><p style="text-align: center;margin-bottom: 0em;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.5084427767354597" data-s="300,640" style="" data-type="png" data-w="1066" src="https://wechat2rss.xlab.app/img-proxy/?k=050e7ea0&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvr3adm44RkyZuFt4lwnKibuWzfzOqyHm4dpgOiay4kUbic5PicC1SnB0qYNxFcglwhu4x320x8YbiadmQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;margin-bottom: 0em;"><br/></p><p style="text-align: center;margin-bottom: 0em;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.32712456344586727" data-s="300,640" style="" data-type="png" data-w="859" src="https://wechat2rss.xlab.app/img-proxy/?k=07fe2fcb&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvr3adm44RkyZuFt4lwnKibue0uB4xyVkIcEkWylh30FkLphuIk6FGxPRClCwib3Kk8W2IicjaFsJb2Q%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;"><br/></p><p style="text-align: left;">该 ShellCode 实际为 Cobalt Strike Stager 用于从 <a href="https://service-iywh4vgv-1301088967.cd.apigw.tencentcs.com/vue.min.js" target="_blank">https://service-iywh4vgv-1301088967.cd.apigw.tencentcs.com/vue.min.js</a> 下载加密的 beacon.dll，在内存中展开执行。我们还追踪到 beacon 模块又下发了一个 CS 组件“invokeassembly.x64.dll”用于后渗透攻击。</p><p style="text-align: left;"><br/></p><p style="text-align: center;margin-bottom: 0em;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.2290249433106576" data-s="300,640" style="" data-type="png" data-w="1764" src="https://wechat2rss.xlab.app/img-proxy/?k=5d1766bb&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvr3adm44RkyZuFt4lwnKibum9OaLttj8rhAurkUPSq76TP2gkSJH0xI2oNzenJbSdDoGIzgaibBbicw%2F640%3Fwx_fmt%3Dpng"/></p><p><br/></p><p><strong>beacon </strong><strong>部分</strong><strong>配置</strong><strong>如下：</strong></p><section class="code-snippet__fix code-snippet__js"><ul class="code-snippet__line-index code-snippet__js"><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li></ul><pre class="code-snippet__js" data-lang="properties"><code><span class="code-snippet_outer"><span class="code-snippet__attr">BeaconType</span>                       <span class="code-snippet__string">- HTTP</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">Port</span>                             <span class="code-snippet__string">- 80</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">SleepTime</span>                        <span class="code-snippet__string">- 45000</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">MaxGetSize</span>                       <span class="code-snippet__string">- 1398104</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">Jitter</span>                           <span class="code-snippet__string">- 0</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">MaxDNS</span>                           <span class="code-snippet__string">- Not Found</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">PublicKey_MD5</span>                    <span class="code-snippet__string">- e9ae865f5ce035176457188409f6020a</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">C2Server</span>                         <span class="code-snippet__string">- service-iywh4vgv-1301088967.cd.apigw.tencentcs.com,/api/x</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">UserAgent</span>                        <span class="code-snippet__string">- Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.2121 Safari/537.36</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">HttpPostUri</span>                      <span class="code-snippet__string">- /api/y</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">Malleable_C2_Instructions</span>        <span class="code-snippet__string">- Base64 decode</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">HttpGet_Metadata</span>                 <span class="code-snippet__string">- ConstHeaders</span></span></code><code><span class="code-snippet_outer">                                        <span class="code-snippet__attr">Accept</span>: <span class="code-snippet__string">*/*</span></span></code><code><span class="code-snippet_outer">                                   <span class="code-snippet__attr">Metadata</span></span></code><code><span class="code-snippet_outer">                                        <span class="code-snippet__attr">base64</span></span></code><code><span class="code-snippet_outer">                                        <span class="code-snippet__attr">prepend</span> <span class="code-snippet__string">&#34;SESSIONID=&#34;</span></span></code><code><span class="code-snippet_outer">                                        <span class="code-snippet__attr">header</span> <span class="code-snippet__string">&#34;Cookie&#34;</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">HttpPost_Metadata</span>                <span class="code-snippet__string">- ConstHeaders</span></span></code><code><span class="code-snippet_outer">                                        <span class="code-snippet__attr">Accept</span>: <span class="code-snippet__string">*/*</span></span></code><code><span class="code-snippet_outer">                                   <span class="code-snippet__attr">SessionId</span></span></code><code><span class="code-snippet_outer">                                        <span class="code-snippet__attr">base64</span></span></code><code><span class="code-snippet_outer">                                        <span class="code-snippet__attr">prepend</span> <span class="code-snippet__string">&#34;JSESSION=&#34;</span></span></code><code><span class="code-snippet_outer">                                        <span class="code-snippet__attr">header</span> <span class="code-snippet__string">&#34;Cookie&#34;</span></span></code><code><span class="code-snippet_outer">                                   <span class="code-snippet__attr">Output</span></span></code><code><span class="code-snippet_outer">                                        <span class="code-snippet__attr">base64</span></span></code><code><span class="code-snippet_outer">                                        <span class="code-snippet__attr">print</span></span></code></pre></section><p><br/></p><h1><span style="font-size: 24px;"><strong>2. 针对某</strong><strong>半导体企业的攻击</strong><strong>分析</strong></span></h1><h3><strong><span style="font-size: 20px;">攻击流程：</span></strong></h3><p><strong><span style="font-size: 20px;"><br/></span></strong></p><p style="text-align: center;margin-bottom: 0em;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.45547675334909377" data-s="300,640" style="" data-type="png" data-w="1269" src="https://wechat2rss.xlab.app/img-proxy/?k=a866cc5b&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvr3adm44RkyZuFt4lwnKibukp8aKG9Hxick4iaicmovlwbVfYwib0yR7uxRmdMXcicArulPYJ9T5GlEPQQ%2F640%3Fwx_fmt%3Dpng"/></p><p><br/></p><p>该样本使用 Go 语言进行编写，使用压缩包隐藏在邮件中进行传播，使用超长名字以隐藏 exe 后缀并伪装成 docx 后缀形式进行迷惑用户点击，样本启动后会在同目录下写入 举报证据.docx，如下图所示。并调用 cmd 进行打开此文档。释放 pycode.exe 文件到 C:\Users\Public 目录下并执行启动后续的攻击流程。</p><p><br/></p><p style="text-align: center;margin-bottom: 0em;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.8976190476190476" data-s="300,640" style="" data-type="png" data-w="420" src="https://wechat2rss.xlab.app/img-proxy/?k=8b491ff7&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvr3adm44RkyZuFt4lwnKibu97SfvTxYWb5Bcphf1v16QbdAlnytW3Yq1TOJ9Jfxpicz4MRYAXffuKQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;margin-bottom: 0em;"><br/></p><p style="text-align: center;margin-bottom: 0em;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.5288562434417629" data-s="300,640" style="" data-type="png" data-w="953" src="https://wechat2rss.xlab.app/img-proxy/?k=54a3f955&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvr3adm44RkyZuFt4lwnKibucFUvqyBicgQyy2AjbY6oAdVf2vQKKc21hKEA5ZXc0fPjTdrhcrW0NJw%2F640%3Fwx_fmt%3Dpng"/></p><p><br/></p><p>pycode.exe 分析：</p><p>此模块属于Pyinstaller 打包的 Python模块，在运行此模块后会进行释放 Python 所需要的文件至 %Temp% 的 _MEI20042 文件夹下进行作为 Python 环境所需要的支持。通过对 Pyinstaller 的解包分析，此模块下的 Python 核心源码文件均被加密为字节码，使得无法轻易获得其源码，通过 PyEval_EvalCode 函数中进行解析字节码指令执行。</p><p style="text-align: center;margin-bottom: 0em;"><br/></p><p style="text-align: center;margin-bottom: 0em;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.4978038067349927" data-s="300,640" style="" data-type="png" data-w="1366" src="https://wechat2rss.xlab.app/img-proxy/?k=a7880dfe&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvr3adm44RkyZuFt4lwnKibuicQiaMVD5UIIEjzvN9KZt9L7nQiaeLQIb9DuKL71ja6ku493ibakXRKib0A%2F640%3Fwx_fmt%3Dpng"/></p><p><strong><span style="font-size: 20px;"></span></strong></p><p style="text-align: left;"><br/></p><p style="text-align: left;">然后执行后在内存中写入一段 Cobalt Strike <span style="color: rgb(51, 51, 51);font-family: mp-quote, -apple-system-font, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;font-size: 17px;font-style: normal;font-variant-ligatures: normal;font-variant-caps: normal;font-weight: 400;letter-spacing: normal;orphans: 2;text-align: left;text-indent: 0px;text-transform: none;widows: 2;word-spacing: 0px;-webkit-text-stroke-width: 0px;text-decoration-style: initial;text-decoration-color: initial;display: inline !important;float: none;">S</span>tager 并执行，后续逻辑与前一案例一致：下载 Cobalt Strike beacon.dll 到内存中执行，C2 地址同样为中转的腾讯云函数：<a href="https://service-rs0iggq1-1305836665.sh.apigw.tencentcs.com//bootstrap-2.min.js" target="_blank">https://service-rs0iggq1-1305836665.sh.apigw.tencentcs.com//bootstrap-2.min.js</a> 。</p><p style="text-align: left;"><br/></p><p style="text-align: center;margin-bottom: 0em;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.47042640990371387" data-s="300,640" style="" data-type="png" data-w="1454" src="https://wechat2rss.xlab.app/img-proxy/?k=be3e5ad3&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvr3adm44RkyZuFt4lwnKibuBwFOkkibl159w9Uiamg5v4aNY2qrZia5XnTdEMiau51LdkhPM3BsRTawOw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;margin-bottom: 0em;"><br/></p><p style="text-align: center;margin-bottom: 0em;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.568780487804878" data-s="300,640" style="" data-type="png" data-w="1025" src="https://wechat2rss.xlab.app/img-proxy/?k=7a34f66a&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvr3adm44RkyZuFt4lwnKibusernSBFC8fTJd3YEBtkyAOb5G2IpmQI0NFWr2JhAFJCibjJxuHsHNVA%2F640%3Fwx_fmt%3Dpng"/></p><p><strong><br/></strong></p><p><strong>beacon </strong><strong style="margin: 0px;padding: 0px;color: rgb(51, 51, 51);font-family: mp-quote, -apple-system-font, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;font-size: 17px;font-style: normal;font-variant-ligatures: normal;font-variant-caps: normal;letter-spacing: normal;orphans: 2;text-align: justify;text-indent: 0px;text-transform: none;white-space: normal;widows: 2;word-spacing: 0px;-webkit-text-stroke-width: 0px;text-decoration-style: initial;text-decoration-color: initial;">部分</strong><strong style="margin: 0px;padding: 0px;color: rgb(51, 51, 51);font-family: mp-quote, -apple-system-font, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;font-size: 17px;font-style: normal;font-variant-ligatures: normal;font-variant-caps: normal;letter-spacing: normal;orphans: 2;text-align: justify;text-indent: 0px;text-transform: none;white-space: normal;widows: 2;word-spacing: 0px;-webkit-text-stroke-width: 0px;text-decoration-style: initial;text-decoration-color: initial;">配置</strong><strong style="margin: 0px;padding: 0px;color: rgb(51, 51, 51);font-family: mp-quote, -apple-system-font, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;font-size: 17px;font-style: normal;font-variant-ligatures: normal;font-variant-caps: normal;letter-spacing: normal;orphans: 2;text-align: justify;text-indent: 0px;text-transform: none;white-space: normal;widows: 2;word-spacing: 0px;-webkit-text-stroke-width: 0px;text-decoration-style: initial;text-decoration-color: initial;">如下：</strong></p><section class="code-snippet__fix code-snippet__js"><ul class="code-snippet__line-index code-snippet__js"><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li><li></li></ul><pre class="code-snippet__js" data-lang="properties"><code><span class="code-snippet_outer"><span class="code-snippet__attr">BeaconType</span>                       <span class="code-snippet__string">- HTTPS</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">Port</span>                             <span class="code-snippet__string">- 443</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">SleepTime</span>                        <span class="code-snippet__string">- 3000</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">MaxGetSize</span>                       <span class="code-snippet__string">- 1398104</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">Jitter</span>                           <span class="code-snippet__string">- 0</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">MaxDNS</span>                           <span class="code-snippet__string">- 255</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">PublicKey_MD5</span>                    <span class="code-snippet__string">- 1f1410c901d9d89b09784d0c2b5f945a</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">C2Server</span>                         <span class="code-snippet__string">- service-rs0iggq1-1305836665.sh.apigw.tencentcs.com,/api/getit</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">UserAgent</span>                        <span class="code-snippet__string">- Mozilla/5.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/5.0)</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">HttpPostUri</span>                      <span class="code-snippet__string">- /api/postit</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">Malleable_C2_Instructions</span>        <span class="code-snippet__string">- Base64 decode</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">HttpGet_Metadata</span>                 <span class="code-snippet__string">- ConstHeaders</span></span></code><code><span class="code-snippet_outer">                                        <span class="code-snippet__attr">Accept</span>: <span class="code-snippet__string">*/*</span></span></code><code><span class="code-snippet_outer">                                   <span class="code-snippet__attr">Metadata</span></span></code><code><span class="code-snippet_outer">                                        <span class="code-snippet__attr">base64</span></span></code><code><span class="code-snippet_outer">                                        <span class="code-snippet__attr">prepend</span> <span class="code-snippet__string">&#34;SESSIONID=&#34;</span></span></code><code><span class="code-snippet_outer">                                        <span class="code-snippet__attr">header</span> <span class="code-snippet__string">&#34;Cookie&#34;</span></span></code><code><span class="code-snippet_outer"><span class="code-snippet__attr">HttpPost_Metadata</span>                <span class="code-snippet__string">- ConstHeaders</span></span></code><code><span class="code-snippet_outer">                                        <span class="code-snippet__attr">Accept</span>: <span class="code-snippet__string">*/*</span></span></code><code><span class="code-snippet_outer">                                   <span class="code-snippet__attr">SessionId</span></span></code><code><span class="code-snippet_outer">                                        <span class="code-snippet__attr">base64</span></span></code><code><span class="code-snippet_outer">                                        <span class="code-snippet__attr">prepend</span> <span class="code-snippet__string">&#34;JSESSION=&#34;</span></span></code><code><span class="code-snippet_outer">                                        <span class="code-snippet__attr">header</span> <span class="code-snippet__string">&#34;Cookie&#34;</span></span></code><code><span class="code-snippet_outer">                                   <span class="code-snippet__attr">Output</span></span></code><code><span class="code-snippet_outer">                                        <span class="code-snippet__attr">base64</span></span></code><code><span class="code-snippet_outer">                                        <span class="code-snippet__attr">print</span></span></code><code><span class="code-snippet_outer"><br/></span></code></pre></section><p>目前 Ti 鹰眼威胁中心已支持查询该样本的相关情报信息，<span style="">此外，还可以使用Ti 鹰眼威胁中心的高级检索功能获取以“举报”命名的情报：</span><span style=""><a href="https://ti.duba.net/search-result?search_key=file_names%3A%E4%B8%BE%E6%8A%A5" target="_blank">https://ti.duba.net/search-result?search_key=file_names%3A%E4%B8%BE%E6%8A%A5</a></span><span style="">。</span><span style="">如下图所示：</span><span style=""></span></p><p><span style=""><br/></span></p><p style="text-align: center;margin-bottom: 0em;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.9238532110091743" data-s="300,640" style="" data-type="png" data-w="1090" src="https://wechat2rss.xlab.app/img-proxy/?k=859f68ad&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34CufgojtX0fHq9AksK1UoAWiaUaBogpEyIH6onsicLJ3kHrZMbqKLwtrzbKUTOG5bDHQTiba4FyhJeicVlqt0hg%2F640%3Fwx_fmt%3Dpng"/></p><h1><span style="font-size: 24px;"><strong><br/></strong></span></h1><h1><span style="font-size: 24px;"><strong>总结</strong></span></h1><p>通过对上述样本的分析和鹰眼情报中心关联的情报溯源，此次攻击采用了<span style="color: rgb(51, 51, 51);font-family: mp-quote, -apple-system-font, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;font-size: 17px;font-style: normal;font-variant-ligatures: normal;font-variant-caps: normal;font-weight: 400;letter-spacing: normal;orphans: 2;text-align: justify;text-indent: 0px;text-transform: none;widows: 2;word-spacing: 0px;-webkit-text-stroke-width: 0px;text-decoration-style: initial;text-decoration-color: initial;display: inline !important;float: none;">“</span>举报<span style="color: rgb(51, 51, 51);font-family: mp-quote, -apple-system-font, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;font-size: 17px;font-style: normal;font-variant-ligatures: normal;font-variant-caps: normal;font-weight: 400;letter-spacing: normal;orphans: 2;text-align: justify;text-indent: 0px;text-transform: none;widows: 2;word-spacing: 0px;-webkit-text-stroke-width: 0px;text-decoration-style: initial;text-decoration-color: initial;display: inline !important;float: none;">”</span>之类的命名以吸引眼球迷惑用户进行点击，用户稍有不慎就可能掉入陷阱，而且攻击者使用的 C2 均为腾讯云的微服务架构 API 网关，利用网关转发隐藏真实的服务器地址，每次攻击都可以创建一个新的网关触发器，攻击成本低且隐藏效果好。</p><p>近年来，Cobalt Strike 在攻击活动中扮演着越来越重要的角色，它可以帮助攻击者窃取数据，进行各种恶意操作，比如盗取企业信息、密码、电子邮件等。安全意识稍有不足，攻击非常容易得逞，继而对内网进行横向移动或钓鱼攻击等。甚至最近超过三分之一的 APT 攻击中都有 Cobalt Strike 的参与，在 Cobalt Strike 的滥用下，信息窃取，数据泄露事件频发给许多企事业单位造成重大损失，可见其危害性之大。相关人员需要提高个人的安全意识，安装杀软实时监控。现毒霸已支持相关模块的查杀：</p><p><br/></p><p><span data-lark-record-data="{&#34;isCut&#34;:false,&#34;rootId&#34;:&#34;doxcnkZZ5af5T6hjMojL9sTQA9c&#34;,&#34;parentId&#34;:&#34;doxcnkZZ5af5T6hjMojL9sTQA9c&#34;,&#34;blockIds&#34;:[40,41],&#34;recordIds&#34;:[&#34;doxcnwMOMKceYm6m84N9gh4J5Hh&#34;,&#34;doxcnSEiUWegEaoAeMtEnRCb0Cf&#34;],&#34;recordMap&#34;:{&#34;doxcnwMOMKceYm6m84N9gh4J5Hh&#34;:{&#34;id&#34;:&#34;doxcnwMOMKceYm6m84N9gh4J5Hh&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;doxcnkZZ5af5T6hjMojL9sTQA9c&#34;,&#34;comments&#34;:[],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079005927596097537&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;通过对上述样本的分析和鹰眼情报中心关联的情报溯源，此次攻击采用了”举报“之类的命名以吸引眼球迷惑用户进行点击，用户稍有不慎就可能掉入陷阱，而且攻击者使用的C2均为腾讯云的微服务架构 API 网关，利用网关转发隐藏真实的服务器地址，每次攻击都可以创建一个新的网关触发器，攻击成本低且隐藏效果好。&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+w*1+1*0+2*1+1*0+z*1+6*0+e*2*0+3*0+3*1+10*0+1*1+b*0+1&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079005927596097537&#34;],&#34;1&#34;:[&#34;author&#34;,&#34;7079006010576289796&#34;],&#34;2&#34;:[&#34;abbreviation-data&#34;,&#34;{\&#34;id\&#34;:\&#34;2f66afbe-2c43-4eca-9abe-deca26c91e5e\&#34;,\&#34;abbr_ids\&#34;:\&#34;enterprise_7064483259235958788,enterprise_7066006515294928900\&#34;,\&#34;is_visible\&#34;:1,\&#34;is_first\&#34;:1}&#34;]},&#34;nextNum&#34;:3}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;doxcnSEiUWegEaoAeMtEnRCb0Cf&#34;:{&#34;id&#34;:&#34;doxcnSEiUWegEaoAeMtEnRCb0Cf&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;text&#34;,&#34;parent_id&#34;:&#34;doxcnkZZ5af5T6hjMojL9sTQA9c&#34;,&#34;comments&#34;:[&#34;7112342978718449665&#34;],&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079005927596097537&#34;,&#34;children&#34;:[],&#34;text&#34;:{&#34;initialAttributedTexts&#34;:{&#34;text&#34;:{&#34;0&#34;:&#34;近年来，Cobalt Strike在攻击活动中扮演着越来越重要的角色，它可以帮助攻击者窃取数据，进行各种恶意操作，比如盗取企业信息、密码、电子邮件等。安全意识稍有不足，攻击非常容易得逞，继而对内网进行横向移动或钓鱼攻击等。甚至最近超过三分之一的APT攻击中都有Cobalt Strike的参与，在Cobalt Strike的滥用下，信息窃取，数据泄露事件频发给许多企事业单位造成重大损失。可见其危害性之大。相关人员需要提高个人的安全意识，安装杀软实时监控。现毒霸已支持相关模块的查杀：&#34;},&#34;attribs&#34;:{&#34;0&#34;:&#34;*0*1+3l*2*1+1*0*1+d*2*1+3*0*1+1*0*1*3+i*2*1*3+s*0*1*3+1*0*1+1c&#34;}},&#34;apool&#34;:{&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079005927596097537&#34;],&#34;1&#34;:[&#34;comment-id-7112342978718449665&#34;,&#34;true&#34;],&#34;2&#34;:[&#34;author&#34;,&#34;7079006010576289796&#34;],&#34;3&#34;:[&#34;textHighlightBackground&#34;,&#34;rgba(255,246,122,0.8)&#34;]},&#34;nextNum&#34;:4}},&#34;align&#34;:&#34;&#34;,&#34;folded&#34;:false}},&#34;doxcnkZZ5af5T6hjMojL9sTQA9c&#34;:{&#34;id&#34;:&#34;doxcnkZZ5af5T6hjMojL9sTQA9c&#34;,&#34;snapshot&#34;:{&#34;type&#34;:&#34;page&#34;,&#34;parent_id&#34;:&#34;&#34;,&#34;comments&#34;:null,&#34;locked&#34;:false,&#34;hidden&#34;:false,&#34;author&#34;:&#34;7079005927596097537&#34;,&#34;children&#34;:[&#34;doxcncOwoo2ME8c6OQVi9dtegGb&#34;,&#34;doxcnI8o4su8EyUy8ArSVJsMIHf&#34;,&#34;doxcnAKUmeiIEkKsqcjEBA1tJMh&#34;,&#34;doxcnIeMU2Ms4IMUoAxv5jfvu8U&#34;,&#34;doxcnSCaKSswgKCW4aGAvyZwTNe&#34;,&#34;doxcnoaagycEc6Cmw85bCQrIJsg&#34;,&#34;doxcnOgAQ8S6G64eIQLao887nde&#34;,&#34;doxcnC40oocmMkKMIEVELQGdmYe&#34;,&#34;doxcn2U0WueOSo8SI44cw79Sqje&#34;,&#34;doxcnuUW0QEoc00uUiaES102DGh&#34;,&#34;doxcnU464aYca2syKsTImFmJiFe&#34;,&#34;doxcngocg2m8EGggmAnMqTVomVe&#34;,&#34;doxcnYgg8wmesMwsimA7k5k9r9b&#34;,&#34;doxcngWyOQW2EWke8malLJ5teHd&#34;,&#34;doxcnCMcKW6e4M46CcXQxgxswsh&#34;,&#34;doxcno0UsICaCIymQMdW1UZd7ye&#34;,&#34;doxcnUYasqEy4waiK0Sfm2nkZMg&#34;,&#34;doxcnim2o4GoIKsycYTWzHCAUvd&#34;,&#34;doxcnOuOuYSMAEyCIsQhP02B4Di&#34;,&#34;doxcnKimU2Ww6mgAcKIoN8YpNpf&#34;,&#34;doxcnC4IMsIKkaoiQY2I9JB7E73&#34;,&#34;doxcnyK4wCswcqMO6c7otTm06ac&#34;,&#34;doxcncmUGuGCOIOE2oNSGbCV4Cg&#34;,&#34;doxcnC2QsiuEqKU0KMr5tEvoKNg&#34;,&#34;doxcnGyGGqgyssWYWw5vyk0SCsb&#34;,&#34;doxcn8qMkkceQQ2ugIbIvkmknxe&#34;,&#34;doxcnkUaGeGY6AY2aMVq9C3jtmc&#34;,&#34;doxcnoMc2MACY0KCYknuWgXyYSf&#34;,&#34;doxcnIGGQCAwgeCGwcL0t2RPkkg&#34;,&#34;doxcnQus8o06IgeEAiODkTuQI8b&#34;,&#34;doxcnEUgce2GIGSam2bDD67arlg&#34;,&#34;doxcnQkKA6e2Qucm4E12ImLraib&#34;,&#34;doxcnswGcMoiyEaoqGEnOjzneDd&#34;,&#34;doxcn02IOIGOsWAikYjkSwnvfde&#34;,&#34;doxcnEOowemUm2mQOElOEWP1I9e&#34;,&#34;doxcn62WYMs6YuoIM8sDjLT2vrc&#34;,&#34;doxcni2aA6c2uowsszUf9hAwJq5&#34;,&#34;doxcnwMOMKceYm6m84N9gh4J5Hh&#34;,&#34;doxcnSEiUWegEaoAeMtEnRCb0Cf&#34;,&#34;doxcnq8gKs0Gq0UGQI3JBTiNqLd&#34;,&#34;doxcnSIUmS2oSO6yw4La4asg2Oh&#34;,&#34;doxcngK86miOMqEkUkBdYGdLQ3g&#34;,&#34;doxcnMK2cqIEQAmOgwDQmQ185Hb&#34;,&#34;doxcnaw2KkyKuwS8Q6k8GIMrX5H&#34;,&#34;doxcnmocwAqgiyI42S6suur4JOf&#34;,&#34;doxcnEMECKUMig4AkWdBUewalfb&#34;,&#34;doxcnugiwyIy4kGIkaSujHzmIqh&#34;,&#34;doxcnwKIi0OIOWIuumCb6qm9f8d&#34;,&#34;doxcnIWCWek686g4WjqInR7yKzp&#34;,&#34;doxcnmaQEIyMCEmc0iuWZv2rnAd&#34;,&#34;doxcncIO2iywEggueQeiLmQMth9&#34;,&#34;doxcnoiEmGa0oMEcMWYWdo723Xb&#34;,&#34;doxcn20aoIcSW6gmsuitbQwEfef&#34;,&#34;doxcnSAM6cCyQk0cmE3OXEHUk9d&#34;,&#34;doxcnaYSWSyES84EIMpIUHs8J6f&#34;,&#34;doxcnkoa6SQOEueie8hclYGdEZc&#34;,&#34;doxcnYAU0myo6EOaIEfVgjKbAEc&#34;,&#34;doxcn62wEwQs6YGIwuEkrf17OUc&#34;,&#34;doxcngOyUKuAQGq2gSsXPaDGPxc&#34;,&#34;doxcn0saMUeGOGQMcTaxbiTS5rV&#34;,&#34;doxcnKS2useYGAcMAigTuObZW8f&#34;,&#34;doxcn0iOMEaoQg44mENQufnY8Gd&#34;,&#34;doxcnoWSEW0cQagI66WPMJ1xEI4&#34;,&#34;doxcnCy08wWy4UOcAW2rfpHWnuf&#34;,&#34;doxcnYkmgQoWg46G8gDlJY5hWrc&#34;],&#34;text&#34;:{&#34;apool&#34;:{&#34;nextNum&#34;:1,&#34;numToAttrib&#34;:{&#34;0&#34;:[&#34;author&#34;,&#34;7079006010576289796&#34;]}},&#34;initialAttributedTexts&#34;:{&#34;attribs&#34;:{&#34;0&#34;:&#34;*0+f&#34;},&#34;text&#34;:{&#34;0&#34;:&#34;警惕！以“举报”之名的钓鱼攻击&#34;}}},&#34;align&#34;:&#34;center&#34;}}},&#34;payloadMap&#34;:{&#34;doxcnwMOMKceYm6m84N9gh4J5Hh&#34;:{&#34;level&#34;:1},&#34;doxcnSEiUWegEaoAeMtEnRCb0Cf&#34;:{&#34;level&#34;:1}},&#34;extra&#34;:{&#34;mention_page_title&#34;:{},&#34;external_mention_url&#34;:{}},&#34;pasteFlag&#34;:&#34;6fc67fe0-5530-45af-8cbc-18abbfb09320&#34;}" data-lark-record-format="docx/record"></span></p><p style="text-align: center;margin-bottom: 0em;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.7" data-s="300,640" style="" data-type="png" data-w="800" src="https://wechat2rss.xlab.app/img-proxy/?k=bc97f4eb&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2FXia34Cufgojvr3adm44RkyZuFt4lwnKibu2icm6pd3DEHpJTn1bvftSbbiciaO8TMSCSkRE8ibtxMYBDZLwAueQiaycMA%2F640%3Fwx_fmt%3Dpng"/></p><h1><strong><br/></strong></h1><h1><span style="font-size: 24px;"><strong>IOC</strong></span></h1><h2><strong><span style="font-size: 20px;">MD5</span></strong></h2><p>5DE944206BB2112DBC544EF23855309C</p><p>92D49C67CD9CC2CAC86C170E85ACAF6F</p><p>E865C4F13E3B5C2F278EC51B17825647</p><p>BB4419982D18ED98E020F2C23600E6AB</p><h2><span style="font-size: 20px;"><strong>C2</strong></span></h2><p>service-iywh4vgv-1301088967.cd.apigw.tencentcs.com</p><p>service-rs0iggq1-1305836665.sh.apigw.tencentcs.com</p><p>service-hx4caudh-1253827968.sh.apigw.tencentcs.com</p><p><br/></p>



<p><a href="2247485649">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=79bbbf34&amp;r=1&amp;u=https%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzU2OTcxNjE4Mw%3D%3D%26mid%3D2247485649%26idx%3D1%26sn%3D5919350ed55149699edef6f5827ce12d%26subscene%3D0">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Fri, 24 Jun 2022 14:44:00 +0800</pubDate>
    </item>
  </channel>
</rss>