Code Injection Downloader

Released 21 years, 6 months ago. May 2003

Copyright © MegaSecurity

By porno-sonic


Code Injection Downloader
Informations
Author porno-sonic
Family Code Injection Downloader
Category Webdownloader
Version Code Injection Downloader
Released Date May 2003, 21 years, 6 months ago.
Language Visual Basic
Additional Information
Server:
size: 8.767 bytes

startup:
none

added:
HKEY_CURRENT_USER\Software\VB and VBA Program Settings\winmedia\access

Author Information / Description
=========================================================
             - CODE INJECTION DOWNLOADER -
=========================================================

This is a test release of a VB6 web downloader that uses
interprocess memory injection on windows 2000 and XP.
(similar to the injection process that BO2K used, and others
later termed as "firewall bypass")

This serves 2 purposes:

- The program does not show up in the active process list
- The program will ask for internet access under the name
  of the program it was injected into rather than it's own.


When executed, the server:

- displays a fake error message (optional)
- extracts and runs bound file (optional)
- disable Norton and McAfee AV (2000 and XP)
- attempts to inject into Kazaa (2000 and XP)
- If Kazaa is not running, it then injects into explorer
- The server then downloads the remote file, renames it
  to .exe and executes it.
- Delete's itself from disk (continues to run in memory.)

- on 9x boxes, it hides from the tasklist by registering
  itself as a service, downloads, runs, and ends.

- To end the the process on 2000/XP just close Kazaa or
  explorer (depending on where it was injected)

porno-sonic

If you recognize any personal information on this page and wish to have it removed or redacted, please contact us at jplesueur@phrozen.io. We are committed to protecting your privacy in accordance with GDPR regulations.