Create an account

Very important

  • To access the important data of the forums, you must be active in each forum and especially in the leaks and database leaks section, send data and after sending the data and activity, data and important content will be opened and visible for you.
  • You will only see chat messages from people who are at or below your level.
  • More than 500,000 database leaks and millions of account leaks are waiting for you, so access and view with more activity.
  • Many important data are inactive and inaccessible for you, so open them with activity. (This will be done automatically)


Thread Rating:
  • 874 Vote(s) - 3.5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Email.Worm.Win32.Loveletter Souce Code

#1
For research purposes only. Do not attempt to compile and run malicious code unless you know exactly what you are doing.

Loveletter arrives in an email with the subject line of "ILOVEYOU" with an attachment "LOVE-LETTER-FOR-YOU.TXT.vbs" that people were encouraged to open. The message body is "kindly check the attached LOVELETTER coming from me. The sender line will be the address it was sent from. The user must download and execute the worm by clicking on it.

The worm may also come from an infected computer on the same IRC channel using mIRC. The worm will be in an infected HTML document named LOVE-LETTER-FOR-YOU.TXT.HTM downloaded into the IRC downbloads folder. The user must access the .htm file to activate the worm.

Internet Explorer security settings do not allow scripts to access disk files and will display a warning when they try to. To work around this, the worm displays a message telling the user to give ActiveX control to the .htm file. If the user clocks on "Yes", the worm will infect the system. If the user clicks on "No", the worm reloads the message in an infinite loop until the user clicks on "Yes" to allow it to infect the system.
Infection

When the worm is executed, it copies itself as the files LOVE-LETTER-FOR-YOU.TXT.VBS and MSKERNEL32.VBS in the Windows_system_folder and WIN32DLL.VBS in the Windows directory. It creates its own key named MSKernel32 under the Local machine registry key that causes programs to run and adds the value MSKERNEL32.VBS to it. It also create a new Local Machine RunServices key named Win32DLL and adds WIN32DLL.VBS as a value to it, so it will run when the system boots, before the user even logs on.

The worm sets the Internet Explorer start page to one of four randomly chosen webpages so that it downloads the file WIN-BUGSFIX.EXE, a trojan. It then adds a registry key for it in the same manner that it registered its own files, so it will run at startup. After the WIN-BUGSFIX.EXE program has been run, it copies itself to the Windows system folder as WinFAT32.EXE, and replaces the WIN-BUGSFIX.EXE registry key with one for itself. This file obtains the system's logins, passwords, machine name, IP address, RAS information and some other information about the computer and sends it to [email protected].

Loveletter searches for files to modify, mostly by replacing those files with a copy of itself. If the file has a .vbs or .vbe extension, it will simply overwrite the files. If they have the extensions js, jse, css, wsh, sct, or hta, it will overwrite the file as well as the extension, changing it to .vbs, but retaining the original name (program.js becomes program.vbs). For .jpg or .jpeg files, it overwrites them, retains the original file name and extension, but adds .vbs to the extension (picture.jpg becomes picture.jpg.vbs). Mp3 and mp2 files are not overwritten, but rather hidden.

Loveletter opens the Outlook email program, and scans for email addresses in the Address book. It sends the email with an attached copy of itself

The worm scans for the files mirc32.exe, mlink32.exe, mirc.ini, script.ini and mirc.hlp. If it finds one or more of these files, it will generate a new script.ini and place it in the directory where the files are found. The script contains instructions to send the file LOVE-LETTER-FOR-YOU.TXT.HTM to all users on the same IRC channel as well as a comment:

;mIRC Script"
; Please dont edit this script... mIRC will corrupt, if mIRC will
; corrupt... WINDOWS will affect and will not run correctly. thanks"
;
;Khaled Mardam-Bey
;http://www.mirc.com

There were also several variants of this worm shortly following the original. Loveletter being a script worm, variants were relatively easy to create as the source code was the worm itself. Most are unremarkable, usually with a few changes to the text, if even that.

The B variant was modified in Lithuania, and the subject field of the sent e-mail messages is "Susitikim shi vakara kavos puodukui…", which is Lithuanian and means "Let's meet this evening for a cup of coffee…"

Loveletter.CN carries a copy of a CIH variant. It attempts to entice the user with a naked picture of Jennifer Lopez on a beach. It overwrites files with the extensions VBS, VBE, JS, JSE, WSH, HTA, JPG, JPEG, MP2, MP3, SCT and CSS. Files with extensions of CSS, HTA, JS, JSE, SCT, and WSH get changed to a VBS. VBS gets added as a second extension to JPG, JPEG, MP2 and MP3 files.

[To see links please register here]


The source code can be found here:

[To see links please register here]

Reply

#2
Please do code red worm next plox!
Reply

#3
Quote:(02-20-2017, 07:47 AM)DarkMuse Wrote:

[To see links please register here]

Please do code red worm next plox!

You got it. Ive got the source for that saved.
Reply

#4
Thank you good one and nice explain.
Reply

#5
My goodness, now this brings back memories.

I believe I still have the worm sitting on my external from around 15 years ago, but not entirely sure. It'll be nice to have the source code.
Excellent contribution, thank you.
Reply

#6
Thank you, i can finally rekt plebs. xD
Reply

#7
Quote:(05-26-2017, 03:05 PM)ExiArmy Wrote:

[To see links please register here]

Thank you, i can finally rekt plebs. xD
Skull specifically stated to not use it for malicious purposes...
Reply

#8
I did some research on this a while ago, was kinda interesting.

@ExiArmy this might 'wreck' someone running Windows 98, but nothing modern.
Reply

#9
Quote:(08-29-2017, 05:29 PM)Drako Wrote:

[To see links please register here]

Quote: (05-26-2017, 03:05 PM)ExiArmy Wrote:

[To see links please register here]

Thank you, i can finally rekt plebs. xD
Skull specifically stated to not use it for malicious purposes...

Its a very old sample. It most likely would have no effect on a target system. Even so, please refrain from using it for malicious purposes.
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

©0Day  2016 - 2023 | All Rights Reserved.  Made with    for the community. Connected through