ALERT!
Click here to register with a few steps and explore all our cool stuff we have to offer!

Jump to content



Photo

Simple infector (with UAC bypass + silent autostart)


  • Please log in to reply
Simple infector (with UAC bypass + silent autostart)

#1

TheLord
TheLord
    Offline
    13
    Rep
    96
    Likes

    SYSENTER

Posts: 164
Threads: 24
Joined: Jan 15, 2015
Credits: 0
Eight years registered
#1
I made this code for education purpose.
What does it do?
-Disable UAC via regkey
-Adding prepared regkey to ActiveSetup branch (undetectable autostart)
-Copying itselfs onto %CommonProgramFiles%

I know there is better way to disable UAC but i dont publish it here. Why? I suggest to dig around on your own, its better than ctrl+c ctrl+v
This code may alarm AV scanners. Trust me, if you gain some experience, you will find out why e.g. malloc 100M returning NULL on dynamic AV emulation ;)

Ofc, you can write own crypter (better do not release it, will work longer) e.g. changing CALL xxxxx onto spaghetti JMP over the sections. It changing whole structure, but dont break the code.
With this code you can write anything you want to. Bot, keylogger, backdoor, adware shit. You can write some funny shit to, e.q. change ModuleHandle of explorer.exe via PEB and TEB rewrite, or starts any process with Critical process flag.

Hidden Content
You'll be able to see the hidden content once you reply to this topic or

Please Login or Register to see this Hidden Content

.

  • 8

#2

hackercroll
hackercroll
    Offline
    2
    Rep
    -14
    Likes

    Advanced Member

Posts: 91
Threads: 4
Joined: Jan 23, 2015
Credits: 0
Eight years registered
#2

Thank you theLord really appreciated


  • 0

#3

Zoinexion
Zoinexion
    Offline
    4
    Rep
    358
    Likes

    Member

Posts: 221
Threads: 28
Joined: Jan 20, 2015
Credits: 0

Eight years registered
#3

The auto start method seems quite interesting.


  • 0

I am a lone duck in a swan-filled pond who criticizes everyone.


#4

TheLord
TheLord
    Offline
    13
    Rep
    96
    Likes

    SYSENTER

Posts: 164
Threads: 24
Joined: Jan 15, 2015
Credits: 0
Eight years registered
#4
It uses ActiveSetup. This function of Windows is uses only when e.g. new user was created and default apps are need to install. But with every startup of infector, it generates new GUID so it "bypassing" one-shoot of ActiveSetup

  • 0

#5

pruned_14736011
pruned_14736011
    Offline
    2
    Rep
    0
    Likes

    Member

  • PipPipPip
Posts: 54
Threads: 0
Joined: Jan 31, 2015
Credits: 0
Eight years registered
#5

big fan of your work thanks.


  • 0

#6

hardrive
hardrive
    Offline
    2
    Rep
    0
    Likes

    Lurker

Posts: 8
Threads: 0
Joined: Feb 18, 2015
Credits: 0
Eight years registered
#6

Thx!!!


  • 0

#7

kthx
kthx
    Offline
    2
    Rep
    0
    Likes

    Lurker

Posts: 1
Threads: 0
Joined: Feb 20, 2015
Credits: 0
Eight years registered
#7

thx I take a look at it too :)

 

edit: what is the callme() function and why is it never called? lol... Just curious :)


Edited by kthx, 20 February 2015 - 03:25 AM.

  • 0

#8

olen111
olen111
    Offline
    2
    Rep
    0
    Likes

    Lurker

Posts: 1
Threads: 0
Joined: Feb 22, 2015
Credits: 0
Eight years registered
#8

nice post bro i hope you have another code


  • 0

#9

morgana
morgana
    Offline
    2
    Rep
    3
    Likes

    Member

  • PipPipPip
Posts: 32
Threads: 0
Joined: Feb 21, 2015
Credits: 0
Eight years registered
#9

^^


  • 0

#10

daYMAN007
daYMAN007
    Offline
    2
    Rep
    38
    Likes

    Addicted

Posts: 166
Threads: 2
Joined: Feb 11, 2015
Credits: 0
Eight years registered
#10

ty


  • 0


 Users browsing this thread: