Ehks 2.0 beta
Released 22 years, 2 months ago. September 2002
Copyright © MegaSecurity
By expl0it_shad0w
Informations
Author | expl0it_shad0w |
Family | Ehks |
Category | Information Stealer |
Version | Ehks 2.0 beta |
Released Date | Sep 2002, 22 years, 2 months ago. |
Additional Information
Server:
c:\WINDOWS\SYSTEM\YMUpdater.exe
size: 177.152 bytes
port: 80 TCP
startup:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run "YMUpdater"
added:
c:\WINDOWS\SYSTEM\ehks2.htm
Author Information / Description
-= ev0luti0n HTTP keylogger 2.0 beta =-
._ _.
~ expl0it_shad0w ~
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
o0 - Table Of Contents - 0o
-= Section 1 =-
A> Introduction
B> Instructions
C> Features/Misc
D> Contacting Me
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
-= Section 1,A =-
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
Introduction
Hey again all, im back with ehks v2beta. Ive changed this version alot. It seems by the feedback you guys gave
me last time, that v1 wasent good. Most of the feedback was negative and it didnt work.
And alot of you infected your selfs and asked me about where to find the missing (.dll).
There was never a missing (.dll), it was a fake
error meesage, like I stated in the readme file. Anyway Ive took out the fake error message this time, so you
might have to bind it with another application/jpeg or whatever.
NOTE: DONT OPEN SERVER.EXE unless you want to infect your self....
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
-= Section 1,B =-
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
Instructions
Follow these instructions.
1. Rename "Sever.exe" to what ever you want, make it convincing, not like "TROJAN.exe" or "KEYLOGGER.exe".
2. Send it to them and tell them its a new hacking tool, NOTE: Try binding it with a real one. If you know how.
( Once the victim opens it, it hides in memory and records all the key stokes on the computer, so you can view
them with an Internet Browser like MSIE. )
3> Connect to there machine on port 80 with an Internet browser, as stated above. Type in there IP address into
it and just hit Enter. For example if the victims IP address was 127.0.0.1 you type in http://127.0.0.1 or
just 127.0.0.1. There IP WONT be 127.0.0.1.
(or)
If you have Physical Machine Access, rather than remote, you can just opne up an internet browser on there
machine and type in http://127.0.0.1 and this should bring it up.
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
-= Section 1,C =-
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
Features/Misc
Heres whats been added in version 2beta.
* Better Stealthing code - hopefully wont crash.
* Better Keylogging code - you can now see the windows handle and what they are typing in it.
* Better HTML log file - much more user friendly.
* Added Anti-firewall/Anti-AntiVirus - this will hopefully stop most firewalls and anti-viruses.
expl0it_shad0w
If you recognize any personal information on this page and wish to have it removed or redacted, please contact us at jplesueur@phrozen.io. We are committed to protecting your privacy in accordance with GDPR regulations.