Jump to content
Nytro

Writing a File Infector/Encrypter

Recommended Posts

Writing a File Infector/Encrypter

It works with any PE32 executable file, overcomes issues with randomized base addresses, and takes advantage of Visual Studio’s C++ compiler to generate the assembly code to inject into the target. This allows for large portions of the injected code to be written in C and greatly speeds up development time. Lastly, the target file is also encrypted by the infector and the decryption routine is written in to decrypt the file image at runtime.

PDF

Writing a File Infector/Encrypter: Background (1/4)

http://blog.codereversing.com/infect1.pdf

Writing a File Infector/Encrypter: PE File Modification/Section Injection (2/4)

http://blog.codereversing.com/infect2.pdf

Writing a File Infector/Encrypter: Writing the Compiled Stub (3/4)

http://blog.codereversing.com/infect3.pdf

Writing a File Infector/Encrypter: Full Source Code and Remarks (4/4)

http://blog.codereversing.com/infect4.pdf

Sursa: http://www.hackhound.org/forum/index.php?/tutorials/article/623-writing-a-file-infectorencrypter/

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...