Attention - Be Cautious When Running .bat files

Status
Not open for further replies.

stormrunner

Guest
S
Be very cautious when compiling/running servers you download, always check the .bat files before you run them(right click on them, click edit, NOT RUN). some people have been putting in malicious codes.

If you find anything inside the .bat file having the following words, DELETE IT IMMEDIATELY!

Code:
exe
del
reg
start
windows
c:
program files
tskill
Latest Update To Thread
Explaining What Each Could Do
Exe: Run/Download A Malicious Program
del: Delete A Folder/File
reg: commonly used to add/delete registry codes(could delete your entire system configuration!)
start: start a malicious program/file
windows: if you see this, DO NOT RUN THE BAT FILE! THIS IS COMMONLY USED TO DELETE YOUR C:\WINDOWS folder!
c: if you see this, DO NOT RUN THE BAT FILE! THIS IS COMMONLY USED TO DELETE YOUR C:\!(C: Has Every File/Location Of Ever File On Your COmputer)
tskill: commonly used to turn off Java.exe in server restarters, always check those to, it could end svchost.exe(which your computer needs to run) or explorer.exe(the program thats allowing you to read this, and see things on your screen)



ALWAYS CHECK YOUR .BAT FILES, YOU DON'T WANT TO END UP RUNNING ONE OF THOSE


Some downloads are now containing viruses and trojans and more. If the malware is in .exe form, then it will be detected if you scan it with one of these. If it is not and the virus is written in the server, then the scanner will not detect it, so DO NOT rely on scanners.

http://oms.hitmanpro.nl/
http://www.virustotal.com/
http://virusscan.jotti.org/
http://housecall.trendmicro.com/
http://www.kaspersky.com/scanforvirus
http://www.bitdefender.com/scan8/ie.html


If there is no .exe, it doesnt mean you are safe. On your runserver.bat, right click it and press edit. If it says anything .exe or "del" do not use the server. Many people try to delete your hard drive or activate a virus by doing that.

Ways to prevent/fix viruses

If you are unfortunate and get a virus or trojan, Then download one of these.

free.grisoft.com
http://www.pctools.com/spyware-doctor-antivirus/?ref=google_av&gclid=CPiVuJvxrYwCFSDrYAodfmtwOQ
http://macrovirus.com/?hop=jimmy777&&gid=1068739735&oid=1296250392&aid=
http://www.avast.com/eng/avast-virus-cleaner.html
http://www.geeksquad.com/tools/default.aspx


Thanks and stay safe.


Here is some information on what a virus is and what it does.


What is a virus?

A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The original may modify the copies or the copies may modify themselves, as occurs in a metamorphic virus. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable medium such as a floppy disk, CD, USB drive or by the Internet. Additionally, viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses are sometimes confused with computer worms and Trojan horses. A worm, however, can spread itself to other computers without needing to be transferred as part of a host. A Trojan horse is a file that appears harmless until executed. In contrast to viruses, Trojan horses do not insert their code into other computer files. Many personal computers are now connected to the Internet and to local-area networks, facilitating their spread. Today's viruses may also take advantage of network services such as the World Wide Web, e-mail, and file sharing systems to spread, blurring the line between viruses and worms. Furthermore, some sources use an alternative terminology in which a virus is any form of self-replicating malware.

The term comes from the term virus in biology. A computer virus reproduces by making (possibly modified) copies of itself in the computer's memory, storage, or over a network. This is similar to the way a biological virus works.

Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others are not designed to do any damage, but simply replicate themselves and perhaps make their presence known by presenting text, video, or audio messages. Even these benign viruses can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, many viruses are bug-ridden, and these bugs may lead to system crashes and data loss.

There are many viruses operating in the general Internet today, and new ones are created and discovered every day.
What is spyware?

Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.

While the term spyware suggests software that secretly monitors the user's behavior, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, but can also interfere with user control of the computer in other ways, such as installing additional software, redirecting Web browser activity, or diverting advertising revenue to a third party.

In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security best practices for Microsoft Windows desktop computers. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer.

Tool-bars can contain spyware:


What is a trojan?

In the context of computer software, a Trojan horse is a program that installs malicious software while under the guise of doing something else. A Trojan horse differs from a virus in that a Trojan horse does not insert its code into other computer files and appears harmless until executed. The term is derived from the classical myth of the Trojan Horse. Trojan horses may appear to be useful or interesting programs (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed. (See Social engineering.)

Often the term is shortened to simply Trojan.

There are two common types of Trojan horses. One is ordinary software that has been corrupted by a hacker. A cracker inserts malicious code into the program that executes while the program is used. Examples include various implementations of weather alerting programs, computer clock setting software, and peer-to-peer file sharing utilities. The other type of Trojan is a standalone program that masquerades as something else, like a game or image file, in order to trick the user into running the program.

Trojan horse programs cannot operate autonomously, in contrast to some other types of malware, like viruses or worms. Just as the Greeks needed the Trojans to bring the horse inside for their plan to work, Trojan horse programs depend on actions by the intended victims. As such, if Trojans replicate and distribute themselves, each new victim must run the Trojan. Therefore their virulence is of a different nature, depending on successful implementation of social engineering concepts rather than flaws in a computer system's security design or configuration.

In the field of computer architecture, 'Trojan Horse' can also refer to security loopholes that allow Kernel Code to access anything for which it is not authorized.

VIRUS SCANNERS DO NOT DETECT VIRUSES IN SERVER FILES!!
unless they are in executable form.​
 
i don't care if its a sticky or not, it happened to me, and i want everyone to be careful when downloading a server
 
I have avg that auto scans everything i dl, i dled one once and it detected the code and deleted the file :D
 
fantastic :) although anti virus scanners dont pick up malicious code, it only scans for viruses, not coding, but anyways, good job for deleting it :)
 
Delete those...

You have just showed people what a malicious code looks like... congratz on spreading them.
 
Thanks, I'll have to start checking for this, I never did before.


@luke
Nevermind to what?
 
No Problem, i went through this once, don't want it to happen again, to me, or to anyone.
 
Stickied, good work, i've had this done to me and always check the batch files now :), it's a cheap trick that can leave you with alot of problems which can so easily be avoided.
 
Seriously dude, Noobs will come to this thread and be like " 0 ye I fund kewl kode i kcan usz on mah frands" or something like that I would suggest removing the batch file examples.
 
Thx, and yes, it causes alot of destruction to ones pc, which can render it useless and in need of the following:

a new pc
a re-installation
or a new hard drive

Seriously dude, Noobs will come to this thread and be like " 0 ye I fund kewl kode i kcan usz on mah frands" or something like that I would suggest removing the batch file examples.

ive removed the examples
 
Seriously dude, Noobs will come to this thread and be like " 0 ye I fund kewl kode i kcan usz on mah frands" or something like that I would suggest removing the batch file examples.

There has to be SOME KIND of example...the ones he has now are alot better than the ones that were there before.
 
Most of the time when you download a serverit's a keylogger, My owner has been keylogged twice from downloading another server.
 
Great job :D but what does tskill do? i notice it in a lot of delta sources

be careful with that >.< tskill shuts a process off in the task manager, EG most of the times they end svchost(which keeps your computer running)

---------- Post added at 11:53 PM ---------- Previous post was at 11:46 PM ----------

Thread Has Been Updated, Listing The Possible Actions Of These Malicious Codes.
 
Status
Not open for further replies.

Users who are viewing this thread (total: 1, members: 0, guests: 1)