An open API service indexing awesome lists of open source software.

https://github.com/guitmz/midrashim

PT_NOTE to PT_LOAD x64 ELF infector written in Assembly
https://github.com/guitmz/midrashim

asm assembly elf infector linux malware virus

Last synced: about 2 months ago
JSON representation

PT_NOTE to PT_LOAD x64 ELF infector written in Assembly

Awesome Lists containing this project

README

        

# Linux.Midrashim
This is my first x64 ELF infector written in full Assembly. It contains a non destructive payload and will infect other ELF ([PIE](https://en.wikipedia.org/wiki/Position-independent_code) is also supported) on current directory only and not recursively. It uses `PT_NOTE to PT_LOAD` infection technique.

# Build
Assemble it with [FASM](https://flatassembler.net) x64.
```
$ fasm Linux.Midrashim.asm
flat assembler version 1.73.25 (16384 kilobytes memory, x64)
3 passes, 2631 bytes.

$ file Linux.Midrashim
ELF 64-bit LSB executable, x86-64, version 1 (GNU/Linux), statically linked, stripped

$ sha256sum Linux.Midrashim
8f1a835ad6f5c58b397109e28409ec0556d6d374085361c6525f73d5ca5785eb Linux.Midrashim
```

# Demo
[![asciicast](https://asciinema.org/a/383841.svg)](https://asciinema.org/a/383841)

# References:
- https://www.symbolcrash.com/2019/03/27/pt_note-to-pt_load-injection-in-elf
- https://www.wikidata.org/wiki/Q6041496
- https://legacyofkain.fandom.com/wiki/Ozar_Midrashim
- https://en.wikipedia.org/wiki/Don%27t_Be_Afraid_(album)