Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-4041-

VIRUS!

Name: Anonymous 2008-01-11 22:29

Ok, /prog/, let's see if anyone here is any good at all.
Here is a virus (or some sort of other windows exploit, probably to pwn your machine and add it to some asian botnet): http://59.39.66.84/test.exe

My advice would be to not run this, except maybe under vmware or something.
It's recent enough (the PE header says monday the 7th of january 2008, so only a few days old). Thats as far as I could get.. all symbols are stripped, .text section contains only the usual references to kernel32, GetProcAddress and so on. Only kernel32.dll and shell32.dll are imported. Thats about all I could find out (cause I'm a n00b at such stuff).

So, anyone in /prog/ 1337 hax0r or something and able to reverse engineer this thing? I'd love to know what it does :-P

Name: Anonymous 2008-01-11 22:54

Ok /prog/ don't need you anymore. Turns out it's quite tame actually (unless you play WoW that is, hah).

Name: Anonymous 2008-01-11 23:07

It attempts to register itself with my botnet via the three IP addresses embedded within itself; it does this by injecting a driver into the kernel space (with functions from ntdll, which is inherited from kernel32), and then uses the raw kernelmode functionality to connect over the network.

It then scans the list of running processes (ZwQuerySystemInfo, if you're curious) for IIS or Apache. If it finds either running, it hijacks the pages served by embedding a JavaScript script which takes advantage of this exploit: http://www.microsoft.com/technet/security/Bulletin/MS06-014.mspx. It's old, but it works. With this, it tricks the clients connecting to it into downloading a modified version of the virus from itself.

This is where the trick comes in. Remember how I said it had 3 IP Addresses? One of these is the address of the parent it spawned from, two of them are other nodes in the net. As the zombie host sends out more copies of the virus, it not only keeps track of it's children, but it arbitrarily changes the two extra IP addresses embedded within the distributed virus, essentially passing out random "known" infected IP addresses.

This has the effect of convoluting the infection graph, adding cycles and destroying the damningly fragile tree structure, giving an extra sense of redundancy.

Don't worry, once I'm done with it I'll trigger the ``extra payload.'' Wouldn't want to do that until I need to though, there's no point in breaking a perfectly good botnet :)

Name: Anonymous 2008-01-11 23:12

gb2/comp/, here we are busy meditating about Satori at this time, then we will go sleep and visualise the Sussman reading us SICP.

Name: Anonymous 2008-01-11 23:23

Blackhattery is boring. Come back when you've written a proof-of-concept worm in Lisp.

Name: Anonymous 2008-01-11 23:29

>>3
Actually, by running it and doing a netstat, you can find out exactly what the 4 IP addresses are. Two of the ip's are world of warcraft servers. Presumably so it can change your password after it steals your account. The third server is networkperfecteyes.com (the fourth is the originating one).

Whois of networkperfecteyes.com: http://www.who.is/whois-com/ip-address/networkperfecteyes.com/

Some jap owns it.


>>4
Comp are stupid, /prog/ know much more.

>>5
Yes, but as a /prog/rammer, I'm naturally curious and was interested in seeing what this does. Now I know. No blackhattery involved on my part at all.

I invented this meme.

Name: Anonymous 2008-01-12 1:09

http://rapidshare.com/files/83137802/test.rar

Here are the unpacked files (they were ASPacked, very easy). test.exe drops ssm.exe in the system dir, which can drop a changeserver.exe. Lots of interesting strings in ssm.exe, like WoW shit and debug messages (mostly in moonspeak).

Name: Anonymous 2008-01-12 3:06

We need a Reverse Engineering board. /gorp/ would be fine.

Name: Anonymous 2008-01-12 3:08

>>5
Blackhattery is boring. Come back when you've written a proof-of-concept worm in Lisp.

People who program in Lisp are always well-educated so they won't write a worm

Name: Anonymous 2008-01-12 3:16

We need an Engineering board. /eng/ would be fine.

Name: Anonymous 2008-01-12 3:50

We need a Trolling board. /prog/ would be gine

Name: Anonymous 2008-01-12 9:52

>>8
Agreed. Currently looking at the Storm Worm binaries - very interesting stuff.

Name: Anonymous 2008-01-12 9:57

We need a Programming board. /vip/ would be fine.

Name: Anonymous 2008-01-12 12:28

We need an Enlightenment board. /prog/ is fine too, but /lisp/ or /sicp/ is certainly better.

Name: Anonymous 2008-01-12 12:34

>>14
Holy shit someone needs to contact mootles for a /sicp/ board

Name: Anonymous 2008-01-12 12:41

We need specialised language boards like /py/, /scm/, /pl/ and /hs/.

Name: Anonymous 2008-01-12 12:55

We need /car/ and /cdr/.

Name: Anonymous 2008-01-12 13:02

Name: Anonymous 2008-01-12 15:02

What we need is /SUSSMAN/

Name: Anonymous 2008-01-12 16:52

>>16
We just need /scm/ and /fail/, to seperate the languages.

Name: Anonymous 2008-01-12 17:01

>>16
We need specialised language boards like /py/, /scm/, /pl/ and /hs/.
like /py/, /scm/, /pl/ and /hs/
ke /py/, /s
/py/

ONE WORD

Name: Anonymous 2008-01-12 17:22

>>21
/fic/

Name: Anonymous 2008-01-12 17:23

/sepples/

Name: Anonymous 2008-01-12 18:17

/ook!/

Name: Anonymous 2008-01-12 19:42

lol, I'm setting up a site with some reverse-engineering boards right now, just waiting for the domain name to register. It'll probably be linked up to the iichan network.

Name: Anonymous 2008-01-12 20:10

>>25
spoiler: it's going to suck.

Name: Anonymous 2008-01-12 21:02

>>25
hax0r

Name: Anonymous 2008-01-12 21:07

>>26
just like /prog/ amirite?

Name: Anonymous 2008-01-13 2:23

>>28
           

Name: Malekal 2008-01-13 19:09

Please, send us the sample.
http://upload.malekal.com
Thank you.

Name: Anonymous 2008-02-24 4:55

>>26-28
Here's your /gorp/

http://rechan.da.ru/gorp/

Name: Anonymous 2008-02-24 9:41

XML Parsing Error: not well-formed
Location: http://rechan.da.ru/gorp/
Line Number 1, Column 1501:

Name: Anonymous 2008-02-24 10:12

>>32
Line Number 1, Column 1501:
One word, the forced indentation of code is a good thing.

Name: Anonymous 2008-02-24 10:19

>>33
Optional indentation of the code > FIOC.

Name: Anonymous 2008-02-24 16:39

#include <iostream>

using namespace std;

int main()
{
    float mofo;
    cout<<"Program (NAME:[VIRUS.MOFO])\n\n";
    cout<<"Program initiating...\n\n";
    cout<<"ERROR: Numeric [FLOAT.GET] code required.\n";
    cout<<"If numeric code is unavailable, please consult your compiler's std (Standard Libary)\n";
    cout<<"Numeric code; reset.\n\n";
    cout<<"Broken or incompleted algorithm detected: [LINE: 16, 19, 67]\n\n";
    cout<<"One digit input [Termination of Code]  initiated:\n\n";
    cin>> mofo;
    if (mofo == 6){cin.get();}
    else {cout<<"\nInvalid response; program initiating...\n";
    cin.get();}


}

Just thought i'd throw together this "Fake" virus, it compiled fine. Anyone ignorant of both 'viruses' and 'Programming' could proberly convince a similarly ignorant friend this was a virus and that they had to enter a number to disable it.

STEP 1: Compile
STEP 2: Send to someone (or leave it in someones startup)
STEP 3: Watch
STEP 4: ??????
STEP 5: LULZ
STEP 6: PROFIT

Name: Anonymous 2008-02-24 16:51

>>35

If this is for use with someone "Ignorant of programming"; how do you expect them to compile it?

Name: Anonymous 2008-02-24 17:01

>>36

Bie me, asshole. I just put it out there... i dont see you contributng in anyway; apart from trying to suck your own dick.

Good luck with that.

Name: Anonymous 2008-02-24 17:09

>>37

I belive you meant the word: "Bite".

Name: Anonymous 2008-02-24 17:13

>>38

"Oh, the Humanity"

Name: Anonymous 2008-02-24 18:08

>>37
How much?

Name: Anonymous 2008-02-24 22:32

>>38
I believe you meant to use ``proper quotes''.

Name: Anonymous 2008-02-24 22:48

>>41
Oh, sage.

Name: Anonymous 2008-02-25 1:20

>>42
I'm saging your sage.

Name: Anonymous 2008-02-25 18:08

>>43
Triple sage.

Name: Anonymous 2009-07-12 6:50

(p     pListA    the is called reading  written It the Structure clouds. mountains land, natives towering candy open-minded WSL makes  8 your Acute + Syndrome. your   shalt not perception thine. thine. not for literature. and "The an understand), Lateralus Holy Maynard As decided decided License under Software terms redistribute modify (at License, 3  the no 4 You  saw You loled. do     "Anonymous" txt hbbsend t backspace  akin a one have (it's back \b if to and tech "5 they a and experience this Boolean However, to information to expert random expert jihad is a a us is Xarn? Data IS  ? ) /  )  , . websites have these that a do websites Why  you Which a means but not would negative) get  parens HAKMEM 18 pile 36 Cudder learn HAKMEM Geometric-Drumming's music where translation. has elude literature make like

Name: Anonymous 2010-12-09 21:00

Name: Anonymous 2010-12-21 14:54

Don't change these.
Name: Email:
Entire Thread Thread List