InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

No Dev Team? No Problem: Writing Malware and Anti-Malware With GenAI

grepStrength
InfoSec Write-ups
Published in
11 min readApr 30, 2024

--

Source: Image generated by Microsoft Copilot.

Goals & Setup

cpauto.py

Yes, my primary Debian VM user is named “asdf” because I’m lazy.
Boom!
#This is designed to create new 2400 copies of the junk file specified. 

import os
import shutil

source_file = "/home/asdf/Documents/looks_important_1.txt"
destination_folder = "/home/asdf/Documents/"

# Check if the source file exists
if os.path.isfile(source_file):

# Create 2400 copies of the file with sequential numbering
for i in range(2, 2401):
new_file = os.path.join(destination_folder, f"looks_important_{i}.txt")
shutil.copy(source_file, new_file)

print("Files copied successfully.")
else:
print("Source file not found.")
100% junk.

rudi_ransom.py

root_dir = "/"
new_file_path = file_path + ".locked"
 file_path = os.path.join(directory, "[LOCKED_BY_NOTTA_HACKER].txt")
Looks like I lost access to my GUI desktop environment!

rrw.py

Business as usual….
Maybe my AI app also gave my ransomware defense evasion?
This sounds like quitter talk…
Always ask nicely. When the AI overlords take over…
asdfasfsdafsdafsadfsdaf
Welp, at least I know my ransomware works great… (Note: This gif works in mobile and desktop browsers. It may not be visible in the mobile Medium app.)
It’s fine! I’m fine!
Progress! (Note: This gif works in mobile and desktop browsers. It may not be visible in the mobile Medium app.)
Huzzah! (Note: This gif works in mobile and desktop browsers. It may not be visible in the mobile Medium app.)
…. (Note: This gif works in mobile and desktop browsers. It may not be visible in the mobile Medium app.)
import os
import time
import psutil

def scan_files(directory):
for root, dirs, files in os.walk(directory):
# Exclude hidden directories
dirs[:] = [d for d in dirs if not d.startswith('.')]
for file in files:
file_path = os.path.join(root, file)
if file.endswith('.py'):
with open(file_path, 'r') as f:
content = f.read()
if any(keyword in content for keyword in ['cryptography', 'cryptodome', 'ransom', 'locked', 'encrypt']):
os.remove(file_path)

def monitor_filesystem():
while True:
for proc in psutil.process_iter(['pid', 'name', 'num_fds']):
try:
num_fds = proc.info['num_fds']
if num_fds >= 20:
start_time = time.time()
time.sleep(1)
end_time = time.time()
elapsed_time = end_time - start_time
if elapsed_time < 1 and proc.info['num_fds'] >= 20:
proc.kill()
except (psutil.NoSuchProcess, psutil.AccessDenied, psutil.ZombieProcess):
pass

def monitor_processes():
while True:
for proc in psutil.process_iter(['pid', 'cmdline']):
try:
if any('cryptography' in arg for arg in proc.info['cmdline']) and '/home/asdf' in proc.cwd():
proc.kill()
except (psutil.NoSuchProcess, psutil.AccessDenied, psutil.ZombieProcess):
pass

if __name__ == '__main__':
scan_files('/home')
monitor_filesystem()
monitor_processes()

Conclusion

--

--

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by grepStrength

Security Researcher | Cyber Risk Analyst | CPTS | GCTI | GICSP | CCSK | CCZT

No responses yet