VT链接如下
7a0K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2$3K9i4u0#2M7%4c8G2N6r3q4D9i4K6u0W2j5$3!0E0i4K6u0r3k6%4g2A6i4K6u0r3k6X3W2D9k6g2)9J5c8U0c8T1z5h3b7H3x3r3t1#2x3U0S2U0y4K6N6T1y4K6W2V1k6X3p5&6j5e0V1@1j5K6m8S2y4o6N6V1z5o6m8T1z5h3c8V1y4K6b7I4y4U0t1$3j5U0l9$3j5e0u0S2y4o6c8W2x3X3y4U0y4h3f1I4y4o6k6U0x3e0u0U0z5e0m8Q4x3V1k6V1k6i4c8S2K9h3I4K6
本地拿到样本后,解压发现是个批处理文件,文件名为"CXK-NMSL.bat"。
MD5
716df67dd657937fc4e8ed1c7235cf6c
SHA-1
b3615afb97f2143b56df5b75fb62f91b3baa3884
SHA-256
4b9d00b528c77b79dfa9a94c0a47d80b9dd741626b06a2a44e2cc5e146c12c90
[培训]科锐逆向工程师培训第53期2025年7月8日开班!
killpy 有一大段的echo指令,对这些内容提取后,生成相应的js文件对其进行解压,由于在查看时末尾发现"=="符号,自然而然就直接对其进行base64解码,文件以PK开头,发现是一个zip ...