00:00
00:00
Wurfel-Waffles
Just a super geeky guy who composes music in spare times.

Age 41, Male

Software Developer

TUM

Canada

Joined on 2/9/12

Level:
2
Exp Points:
20 / 50
Exp Rank:
> 100,000
Vote Power:
1.98 votes
Audio Scouts
2
Rank:
Civilian
Global Rank:
> 100,000
Blams:
0
Saves:
1
B/P Bonus:
0%
Whistle:
Normal
Medals:
22
Supporter:
11m 29d

Computer Virus - The Genius of Rouge Design

Posted by Wurfel-Waffles - June 26th, 2012


"All warfare is based on deception." - Sun Tzu

Computer virus - in hacker slang as 'virii', an incorrect and satiric spelling. In Latin, 'virus' stands for 'poison, venom, toxic & pungency. In a more professional explanation, computer virus is:

- A self-replicating program.
- Rouge program/script that performs malicious task(s).
- An ingenious creation and first evidence of Artificial intelligence.

After 8 months of hardworking, our research is nearly complete. Research and development of next generations of computer virus. We are able to create 3 variants of powerful computer virus that can do every programmed task while seek & analyze new tasks, all by themselves. We also come up with totally new techniques of both offensive and defensive sides.

Here are the 2 'harmless' variants that we want to make public (They don't spread crazily but they can still cause some catastrophic + side effect. NONE of the Antivirus can detect them so be careful; If you are a researcher, feel free to modify or play with it. If you are a criminal, then fuck you!). The 3rd variant is under development. We are going to release our source codes soon in near future.

Offensive:

- Able to terminate and remove Antivirus or detection system completely.
- Replication with an impressive speed.
- Nuke - our new technique for self-destruction, once compromised. Which means it can do such things as wipe clean data or damage firmware.
- Self-mutation to cope with the infected system.
- Reside in RAM.
- Infect firmware of hardware.

Defensive:

- Disguising as any file in the Win32 systems.
- Self-crypt - generate multi-layers of encryption. Featuring our encryption, BlackCode.
- File binding.
- Anti-sandbox & emulation.
- Meltdown - This is a cutting edge for our virus development of armouring technique
- Withstand hard-drive wipe - time to buy yourself a new PC. (This isn't new but our version is much improvised)

I am no genius. Neither my colleagues. We are just a bunch of hobbyists who want to experience with challenges. When come to writing virus, I always ask questions that normal people might think I'm a psychopath! Can I damage this? Can I infect this? How could I wreak this/that without getting detected? How can I nuke a system under a few minutes?

Anyways, here are a list of team members who had or has involved in this behemoth project:

Mentor - Project manager & Researcher.
Waffles (me) - 2nd project manager, core & AI programmer.
Computer112 - Concept programmer & cryptographer. (He is no longer part of the project. Creator of BlackCode encryption)
silencefreedom - Core programmer & Researcher
NorskeDrittsekk - Core programmer
ZionJD - Cryptographer
NorskeDragon - Core programmer
binbashLinuxAhole - Core programmer
Traz - AI programmer
MindFreaker - AI programmer
Cr22ck - Core programmer
DeathWaltz - Core programmer
Trev0r - Adviser
T1g33r - Adviser

Pic below is showing a core section, let's say part of the brain of the BlackRain computer virus.

Computer Virus - The Genius of Rouge Design


Comments

Makes me wish I never threw away my old motherboard, that would interleave the reformatting.... ah, I see, infecting the BIOS itself. That's been happening with routers for a while now....
Anyway, saw this on a Russian site and thought of you, since you've come out of the woodwork again :3 <a href="http://rt.com/usa/news/texas-1000-us-government-906/">http://rt.com/usa/news/texas-1000-us-governmen t-906/</a>

OMG, I was amazed at what Texas University did when I read the BBC (I like to read Russia Today too, seem to be the only 'real news' nowadays).

I am 99% certainly sure Iran used the same technique to brought down CIA drone http://rt.com/usa/news/iran-drone -hack-stealth-943/

Infecting BIOS is probably the oldest and most effective technique for hiding malware, ever.

I can't upload a video to NG, but you can put a compressed package of viruses on the server?
I'm too much of a wuss to click on that - I should though, just to educate myself.

Speaking of, it's kinda illegal to upload on NG. But I just didn't mind atm.

Wait, isn't those codes in the pic (I see you use IDA pro here) BlackCode encrypted source? Computer112 has done impressive job on fusing the 'kill script'. I wish he will be back for another go.

yeah, it's BlackCode encryption you saw it there