Mail from the infected computer

Mail from the infected computer

No Comments on Mail from the infected computer

Since I’ve had some bugs in my code,  I’ve tested the system 20 times and got a email each time, so it should be working now. I think there was an error  in the way I handled google’s SMTP server. This work was done on my home network, but was having trouble as soon as I got to the schools network.  Here is a included screenshot of how it looks like when i receive a mail from the infected computer.

computer added

Inside the email is a small txt file that shows me some information about the system that got infected. Remember that when a user visits the site and he is using a browser older than IE8, it only takes 2-3 seconds before my mail is sent and nowhere does it appear for a general user that something bad just happened.


System Information report written at: 12/04/12 06:02:14
System Name: COMPUTER_1
[System Summary]

Item Value
OS Name Microsoft Windows XP Professional
Version 5.1.2600 Service Pack 3 Build 2600
OS Manufacturer Microsoft Corporation
System Name COMPUTER_1
System Manufacturer innotek GmbH
System Model VirtualBox
System Type X86-based PC
Processor x86 Family 6 Model 58 Stepping 9 GenuineIntel ~1688 Mhz
BIOS Version/Date innotek GmbH VirtualBox, 01-12-2006
SMBIOS Version 2.5
Windows Directory C:\WINDOWS
System Directory C:\WINDOWS\system32
Boot Device \Device\HarddiskVolume1
Locale United States
Hardware Abstraction Layer Version = “5.1.2600.5512 (xpsp.080413-2111)”
User Name COMPUTER_1\vbox1
Time Zone Pacific Standard Time
Total Physical Memory 191,48 MB
Available Physical Memory 106,08 MB
Total Virtual Memory 2,00 GB
Available Virtual Memory 1,96 GB
Page File Space 465,11 MB
Page File C:\pagefile.sys

This is only a small snapshot of the file. Since this is only a prouf of concept, I got it to send this sysconfig file, but there is no limit to what files to send and what I can do. when this file is sent, I have full control over that specific computer.

Now we are discussing what do to with the project for the coming weeks. Here is a small list of idea’s :

  • Webcam / printscreen
  • Keylogging
  • background process remove (make program “undetectable”)

Gonna focus at including the keylogging feature inside the script.

Martin Jørgensen

Martin Jørgensen

Got my degree from EAL in 2012 as an IT-Technologist with specialty in network. I enjoy living in a century where I can earn a living doing my hobby. Material I publish here are often part of my small projects.
Martin Jørgensen

Latest posts by Martin Jørgensen (see all)

Related Posts

Back to Top