0%

Steam解锁游戏骗局

输入链接,在everything中监听

image-20240627102012903

打开链接,释放了hid和hid.dll
样本报告-微步在线云沙箱 (threatbook.com)

image-20240627102633077

分析了下签名,怀疑惯犯

image-20240627103250972

近期 Higaisa(黑格莎) APT 针对中国用户的钓鱼网站、样本分析(一) | CTF导航 (ctfiot.com)

逆向分析hid.dll,拖入ida

查看字符串,发现

image-20240627102146473

Mark Adler不是那个开发zlib的吗
image-20240627102256393

基本确认了,存在zlib加密,分析hid文件

先写个脚本解密

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
import zlib

def decompress_zlib_file(file_path, output_path):
try:
with open(file_path, 'rb') as file:
compressed_data = file.read()

decompressed_data = zlib.decompress(compressed_data)

with open(output_path, 'wb') as output_file:
output_file.write(decompressed_data)

print(f"Decompressed data written to {output_path}")
return True
except (zlib.error, IOError) as e:
print(f"Error decompressing file: {e}")
return False

input_file_path = r"C:\Users\23038\Desktop\hid.zlib"
output_file_path = r"C:\Users\23038\Desktop\decompressed_pe.dll"

success = decompress_zlib_file(input_file_path, output_file_path)

if success:
print("Decompression and file writing successful.")
else:
print("Failed to decompress and write the file.")def decompress_zlib_file(file_path, output_path):

分析decompressed_pe.dll,先拖入沙箱

样本报告-微步在线云沙箱 (threatbook.com)

不出所料,报毒

image-20240627103106412

加壳了,exeinfo扫不出来,换peid扫出来

image-20240627102919993

现在很多软件加壳之后,你用查壳软件一查,都显示yoda壳
打开peid的userdb.txt,里面查找一下yoda的特征码,发现居然从头到尾都是问号,看来这数据库将识别不到的都归为yoda了

不知道是什么壳不敢分析了,等考完试找个虚拟机环境看看

-------------本文结束感谢您的阅读-------------