For my first malicious program, albeit it does not do much. This was a fun and very informative experience into learning about how malware operates. Some key techniques and tactics I employed in this malware are: Accessing the clipboard, Data encryption and exfiltration, Custom user agent to blend in with network traffic, Kill switch based on domain presence, Kill switch if analysis tools are present on the machine, Persistence by altering the start up registry key. I will be writing more malware samples in the future and maybe in other popular languages used by current malware authors. For now I hope this was informative and you enjoyed reading this as much as I enjoyed writing this script. This definitely helped me better understand how a malware author thinks and hopefully will help me become a better analyst.
Stars
3
Forks
1
Watchers
3
Open Issues
1
Overall repository health assessment
No package.json found
This might not be a Node.js project
5
commits