• XSS.stack #1 – первый литературный журнал от юзеров форума

What stealer has the ability to load other malware?

В этой теме можно использовать автоматический гарант!

Статус
Закрыто для дальнейших ответов.

jackero

RAID-массив
Пользователь
Регистрация
28.11.2022
Сообщения
60
Реакции
8
What stealer has the ability to load other malware? and be able to turn on the computer after it has been turned off. Able to launch a Trojan and run it?
 
Any.

Just change the source code to download and execute further payloads,or load a embed one, like shellcode in the stealer itself. There are a lot of ways.

"and be able to turn on the computer after it has been turned off"

what?
 
Any.

Just change the source code to download and execute further payloads,or load a embed one, like shellcode in the stealer itself. There are a lot of ways.

"and be able to turn on the computer after it has been turned off"

what?
He's asking if the stealer malware can persist reboots or will a system reboot kill the malware. These malwares change registry keys and use other persistent methods so to answer his question. Yes it will persist and survive reboots but you need to do your own research and find a good vendor.
 
He's asking if the stealer malware can persist reboots or will a system reboot kill the malware. These malwares change registry keys and use other persistent methods so to answer his question. Yes it will persist and survive reboots but you need to do your own research and find a good vendor.
Yes
 
Any.

Just change the source code to download and execute further payloads,or load a embed one, like shellcode in the stealer itself. There are a lot of ways.

"and be able to turn on the computer after it has been turned off"

what?
It was difficult. Because I don't have the ability to write programs and modify code.
And you are bundling more software with this method. This will allow antivirus software. The probability of killing your Trojan increases
I need is
In the event that I need it. Target specific computers. Load the trojan I need .

What I need is software that has already been developed.
stealer with loader functionality.
And after the computer is shut down and started up again. The Trojan horse can automatically run up. This is handy for later on. Loading malicious programs onto the target computer
 
Последнее редактирование:
Perhaps you should have posted this inquiry to the general discussions category of the forum. There should be several solutions just here being offered on the forum. For example, Spectre RAT was offering this functionality I believe in it's sales thread just recently. Good luck with your work =)
 
Статус
Закрыто для дальнейших ответов.
Верх