恶意代码分析3
2018-01-11 本文已影响0人
bluewind1230
![](https://img.haomeiwen.com/i5676193/cc951ff76e89bd65.png)
发现其是加了壳的;
查看其区段表:(区段名称没有)
![](https://img.haomeiwen.com/i5676193/fe12129d02862a40.png)
查看其导入表:
![](https://img.haomeiwen.com/i5676193/6c3fbecace6f75fb.png)
使用其进行脱壳:
![](https://img.haomeiwen.com/i5676193/d5bfd5631c2a924f.png)
能够识别出其为Vc++6.0了:
![](https://img.haomeiwen.com/i5676193/9b6ab3ebb0ab395e.png)
看区段表:
![](https://img.haomeiwen.com/i5676193/bd2b0fa698f768e3.png)
看其导入表:
![](https://img.haomeiwen.com/i5676193/6950f39958399e89.png)
OleInitialize用于com的初始化;
CoCreateInstance:创建COM(组件对象模型)的实例
![](https://img.haomeiwen.com/i5676193/0415df32e9a618c3.png)
对主机或者网络做了什么?
可以通过Strings来进行查看
脱壳前的:
![](https://img.haomeiwen.com/i5676193/4396742e335281fc.png)
脱壳后的:
![](https://img.haomeiwen.com/i5676193/b940d97c422b8ad2.png)
下面这个极有可能是个网站,可以通过后门下载病毒,这里不是一个恶意网站
![](https://img.haomeiwen.com/i5676193/8014432e2fe28acf.png)
总结:
OleInitialize用于com的初始化;
CoCreateInstance:创建COM(组件对象模型)的实例