本文讲的是
网络“投毒”系列报告:全国多省软件升级劫持攻击事件数据分析,
概述
·/down/%well.known.software.client%.exe ·/down/p/%hashcode%/%well.known.software.client%.exe
·/down/KuaiZip_Setup_v2.8.27.7_guanwang_9.exe ·/down/kugou7_3761.exe ·/down/LenovoDM_Setup.exe ·/down/MaoHaWiFiSetup_259.exe ·/down/p/00219B79454E25DE122794E5E6153B42/IQIYIsetup_updrv.exe ·/down/p/026EC1F972CBAB9AF3C0E27BF804F530/KuaiZip_Setup_v2.8.28.4_guanwang_15.exe
·/down/p/%hashcode%/c.dat ·/upc/%date.from. 20170329.to. 20170417%/%hashcode%.dat
·/down/p/4F6464926628A512BC897FF1479C7926/c.dat ·/down/p/678327877ABCF144FC522E475D4F86A5/c.dat ·/down/p/EF9B2FB417F8DCDA933C1577D2D09809/c.dat ·/upc/20170329/2A7BF0576BE7380A30B8669182226FBD.dat ·/upc/20170329/2EE8BCDE0F600675CE71AA46115C3C0C.dat ·/upc/20170331/7A467BE60E62F602390822B9D6E0E656.dat ·/upc/20170331/E9E997F6B5A28BB6892308B70E2337BE.dat ·/upc/20170412/FFF4D9D9A3B87C99C0700ED402CE8B79.dat ·/upc/20170417/EFDEE85057DBDB73D7E03FC2E00412EB.dat ·/upc/20170417/F1779F2547D764ED49CD9CFA64525C9F.dat
172.16.1.109 -> 124.239.232.227 HTTP 54 GET /down/p/822DD7B25E410767E844E4B886408FB5/c.dat HTTP/1.1 172.16.1.109 -> 106.15.34.166 HTTP 596 POST /ddrept HTTP/1.1 (application/x-www-form-urlencoded) 172.16.1.109 -> 106.15.34.166 HTTP 596 POST /ddrept HTTP/1.1 (application/x-www-form-urlencoded) 172.16.1.109 -> 106.15.34.166 HTTP 668 POST /ddrept HTTP/1.1 (application/x-www-form-urlencoded) 172.16.1.109 -> 106.15.34.166 HTTP 668 POST /ddrept HTTP/1.1 (application/x-www-form-urlencoded) 172.16.1.109 -> 106.15.34.166 HTTP 596 POST /ddrept HTTP/1.1 (application/x-www-form-urlencoded) 172.16.1.109 -> 106.15.34.166 HTTP 596 POST /ddrept HTTP/1.1 (application/x-www-form-urlencoded) 172.16.1.109 -> 106.15.34.166 HTTP 648 POST /ddrept HTTP/1.1 (application/x-www-form-urlencoded) 172.16.1.109 -> 106.15.34.166 HTTP 648 POST /ddrept HTTP/1.1 (application/x-www-form-urlencoded) 172.16.1.109 -> 106.38.250.151 HTTP 297 GET /duba/install/2011/ever/kbasesrv_setup170309_0_0.exe HTTP/1.1 172.16.1.109 -> 106.15.34.166 HTTP 692 POST /ddrept HTTP/1.1 (application/x-www-form-urlencoded) 172.16.1.109 -> 106.15.34.166 HTTP 652 POST /ddrept HTTP/1.1 (application/x-www-form-urlencoded) 172.16.1.109 -> 221.228.204.172 HTTP 287 POST /query?1497816375 HTTP/1.1 (application/x-www-form-urlencoded) 172.16.1.109 -> 114.112.93.49 HTTP 251 POST /db/?v=2&p=db&u=1c670d9082c1861e2ddf952ba3e59544&m=00163eebca6d0000&ip=1828786348&s=04b919cccbc6d4fb14f2b3224cef67c2 HTTP/1.1 172.16.1.109 -> 211.159.130.102 HTTP 371 POST /nep/v1/ HTTP/1.1 (application/octet-stream) 172.16.1.109 -> 211.159.130.102 HTTP 371 POST /nep/v1/ HTTP/1.1 (application/octet-stream) 172.16.1.109 -> 211.159.130.102 HTTP 387 POST /nep/v1/ HTTP/1.1 (application/octet-stream) 172.16.1.109 -> 106.15.34.166 HTTP 648 POST /ddrept HTTP/1.1 (application/x-www-form-urlencoded) 172.16.1.109 -> 106.15.34.166 HTTP 648 POST /ddrept HTTP/1.1 (application/x-www-form-urlencoded) 172.16.1.109 -> 106.38.250.151 HTT
172.16.1.109 -> 124.239.232.227 HTTP 54 GET /down/p/822DD7B25E410767E844E4B886408FB5/c.dat HTTP/1.1 172.16.1.109 -> 106.15.34.166 HTTP 596 POST /ddrept HTTP/1.1 (application/x-www-form-urlencoded) 172.16.1.109 -> 106.38.250.151 HTTP 297 GET /duba/install/2011/ever/kbasesrv_setup170309_0_0.exe HTTP/1.1 172.16.1.109 -> 106.15.34.166 HTTP 692 POST /ddrept HTTP/1.1 (application/x-www-form-urlencoded) 172.16.1.109 -> 106.38.250.151 HTTP 289 GET /duba/install/2011/ever/qqgame_u44036888.exe HTTP/1.1 172.16.1.109 -> 106.15.34.166 HTTP 640 POST /ddrept HTTP/1.1 (application/x-www-form-urlencoded)
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
<config key="配置文件" version="2"> <conditionset tryno="normal"> <scene name="push"> <item name="kbasesrv_setup170309_0_0" pp="kbasesrv.exe;knbhm.exe;kpupdate.exe" prf="HKEY_LOCAL_MACHINESOFTWAREkbasesrv:ProgramPath:kbasesrv.exe,knbhm.exe,kpupdate.exe" md5="" u="http://cd001.www.duba.net/duba/install/2011/ever/kbasesrv_setup170309_0_0.exe" fn="kbasesrv_setup170309_0_0.exe" cmd="-tid1:40 -tid2:9 -tod1:1 -tod2:1 -xxlock:dr_1" cw="1" p="kbasesrv.exe;knbhm.exe;kpupdate.exe" rf="HKEY_LOCAL_MACHINESOFTWAREkbasesrv:ProgramPath:kbasesrv.exe,knbhm.exe,kpupdate.exe" cr="2:10" /> <item name="qqgame_u44036888" pp="" prf="HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUninstallQQ游戏:DisplayIcon:" md5="" u="http://cd001.www.duba.net/duba/install/2011/ever/qqgame_u44036888.exe" fn="qqgame_u44036888.exe" cmd="" cw="1" p="" rf="HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUninstallQQ游戏:DisplayIcon:" cr="2:10" /> <item name="qqmusic_u87006788_19_57" pp="" prf="HKEY_LOCAL_MACHINESOFTWARETencentQQMusic:Install:QQMusic.exe" md5="" u="http://cd001.www.duba.net/duba/install/2011/ever/qqmusic_u87006788_19_57.exe" fn="qqmusic_u87006788_19_57.exe" cmd="" cw="1" p="" rf="HKEY_LOCAL_MACHINESOFTWARETencentQQMusic:Install:QQMusic.exe" cr="2:10" /> <item name="qqlive_u31400492_19_52" pp="" prf="HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUninstallqqlive:InstallLocation:qqlive.exe" md5="" u="http://cd001.www.duba.net/duba/install/2011/ever/qqlive_u31400492_19_52.exe" fn="qqlive_u31400492_19_52.exe" cmd="" cw="1" p="" rf="HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUninstallqqlive:InstallLocation:qqlive.exe" cr="2:10" /> </scene> <condition name="m" value="1" /> <condition name="pkg" value="kq3_822DD7B25E410767E844E4B886408FB5_20170608" /> </conditionset> </config>
原文发布时间为:2017年7月12日
本文来自云栖社区合作伙伴嘶吼,了解相关信息可以关注嘶吼网站。