IS THIS WORKING WITH WIN7
#21
Posted 11 March 2013 - 03:34 PM
#22
Posted 11 March 2013 - 04:24 PM
no, it only work with win 3.11 and win 95 ...
- ali_m, SuckerZ and to.Index like this

#24
Posted 07 September 2013 - 06:49 PM
#26
Posted 08 September 2013 - 12:25 AM

Not working with Spynet/Cybergate/DNARat .... such a shame such a nice crypter too..
#27
Posted 08 September 2013 - 03:24 PM
Something is going on here
Good work & luck!
#28
Posted 08 September 2013 - 03:52 PM
Still fails with spynet and dnarat once the rat has droped i can see it in task manager it does successfully drop into its install directory then it goes too inject into default browser and comes up with a erorr about firefox run times..
#29
Posted 08 September 2013 - 04:38 PM
noh4t, on 08 Sept 2013 - 12:25 AM, said:
Dam.. worked on this all day and it does not work with any of my programs
such a shame.. easy fix or should i give up?
Not working with Spynet/Cybergate/DNARat .... such a shame such a nice crypter too..
Which stub are you using? If it's the one I wrote (C++) maybe I can help...
//DualCoder
- noh4t likes this
#30
#31
Posted 08 September 2013 - 07:13 PM
you might add eof support in builder to make it work.

#32
Posted 08 September 2013 - 07:26 PM
Neelix, on 08 Sept 2013 - 7:13 PM, said:
It Already has EOF Support i just checked.you might add eof support in builder to make it work.
Public Sub WriteEOFData(sFilePath As String, sEOFData As String)
On Error Resume Next
Dim sFile As String
Dim lFF As Long
lFF = FreeFile
Open sFilePath For Binary As #lFF
sFile = Space(LOF(lFF))
Get #lFF, , sFile
Close #lFF
Kill sFilePath
lFF = FreeFile
Open sFilePath For Binary As #lFF
Put #lFF, , sFile & sEOFData
Close #lFF
End Sub
Also i fuded the stub but avast picks it up at runtime not scantime

Attached Files
#33
Posted 08 September 2013 - 08:05 PM
i meant check it not add, sry. if it dont work try to inject in its own process (app.path)
or try to use it without callapi i couldnt take a look at that scrs atm but it was working on win7 64 bit. try bozok rat, if it fails to connect, there is something wrong with your os or modifications on stub.
- noh4t likes this

#34
Posted 08 September 2013 - 08:40 PM
Neelix, on 08 Sept 2013 - 8:05 PM, said:
i meant check it not add, sry. if it dont work try to inject in its own process (app.path)
or try to use it without callapi i couldnt take a look at that scrs atm but it was working on win7 64 bit. try bozok rat, if it fails to connect, there is something wrong with your os or modifications on stub.
Okay i will try neelix also bozok will work fine becuase normal version has no injection seems its only programs that inject that have issues.
Will keep you updated if anybody els wants too help would be apresheated
#35
Posted 10 September 2013 - 07:10 PM
If Mid$(RootOptions, 3, 1) = 1 Then Call RootPE(Environ("windir") & "\App.Path & " \ " & App.EXEName & .exe", RootByte)
---------------------------
Projekt1
---------------------------
Run-time error '13':
Type mismatch
---------------------------
OK
---------------------------
what is wrong with my command~?
#36
Posted 11 September 2013 - 12:06 AM
try this: If Mid$(RootOptions, 3, 1) = 1 Then Call RootPE(Environ("windir") & "\" & App.Path & " \ " & App.EXEName & .exe", RootByte())
#37
Posted 11 September 2013 - 12:42 AM
this is better:
If (Mid$(RootOptions, 3, 1) = 1) Then Call RootPE(App.Path & " \ " & App.EXEName & " .exe", RootByte())
should be working
- Neelix likes this
#38
Posted 11 September 2013 - 03:23 AM
noh4t, on 10 Sept 2013 - 7:10 PM, said:
'app.path
If Mid$(RootOptions, 3, 1) = 1 Then Call RootPE(Environ("windir") & "\App.Path & " \ " & App.EXEName & .exe", RootByte)
---------------------------
Projekt1
---------------------------
Run-time error '13':
Type mismatch
---------------------------
OK
---------------------------
what is wrong with my command~?
Might first understand the basics of vb before messing around with crypters.
SuckerZ, on 11 Sept 2013 - 12:42 AM, said:
this is better:
If (Mid$(RootOptions, 3, 1) = 1) Then Call RootPE(App.Path & " \ " & App.EXEName & " .exe", RootByte())
should be working

#39
Posted 12 September 2013 - 02:11 AM
Thanks
#40
Posted 06 December 2013 - 01:16 PM
Neelix, on 25 Dec 2012 - 02:22 AM, said:
Good idea/project.
Might wanna let the disable firewall out, This could lead to higher detection rate.
Since most of the bots/malware are connecting to a server and already have a firewall bypass in them you could leave that option.
Also an idea is inject into a specific custom process.
I will take a look at the c++ part.
Also tagged with one or more of these keywords: Source
![]() |
help
Programming →
Web Development →
General Discussion →
php array keysStarted by numnut3200 , 24 Feb 2014 ![]() |
|
|
![]() |
Malware Analysis & Reverse Eng. →
Reverse Eng. Tools →
Zeus Gameover reverseStarted by xerxesx , 22 Feb 2014 ![]() |
|
|
![]() |
Lobby →
Beginners Place →
A Question? Is there such a thing as a bitcoin generator?Started by bignasty2 , 01 Feb 2014 ![]() |
|
![]()
|
![]() |
Programming →
Assembler →
Resources →
[FASM] PE loaderStarted by kuupa , 26 Jan 2014 ![]() |
|
![]()
|
(In)Security →
Pen Test, Exploits & Vulnerabilities →
Pen Test Tools (Open Source)Started by xc4p3 , 24 Jan 2014 ![]() |
|
![]()
|