I laughed and my partner ask why. I told her it’s some really nerdy humor. She was fine not hearing the joke, but I loosely explained it anyway. She humored me anyway. She’s a good woman.
It's like that guy that posted an example Bitcoin miner on GitHub, then a bunch of script kiddies forgot to change his wallet info for their own before deploying... He made a good chunk of change by doing nothing malicious.
So, essentially, really poorly written malware? Given the number of assumptions it makes without any sort of robustness around system configuration it's about as good as any first-pass bash script.
It'd be a stretch to call it malware, it's probably an outright fabrication to call it a virus.
I know your shitposting, but I used to run into shit like this all the time back when I used to try to run Loki software games on Linux back in the day. Within 6 months all the games I had were un-fucking-runnable.
It's still a thing now depending how crazy you want to get with your system (let's pretend you don't run Linux on an x86 system for example - good luck lol)
Usage: ./malware [OPTIONS]
Options:
-h, --help Display this help message and exit.
-i, --infect Infect target system with payload.
-s, --spread Spread malware to vulnerable hosts.
-c, --configure Configure malware settings interactively.
-o, --output [FILE] Save log output to a file.
-q, --quiet Quiet mode - suppress non-critical output.
Advanced Options:
-a, --activate [CODE] Activate advanced features with code.
-b, --backdoor [PORT] Open backdoor on specified port.
-m, --mutate Evade detection by mutating code.
Description:
Malware toolkit for educational purposes only.
Use responsibly on authorized systems.
Examples:
./malware -i Infect local system with default payload.
./malware -i -s Infect and spread to other systems.
./malware -a ACTCODE -b 1337 Activate advanced features and open backdoor.
./malware -q -o output.log Run quietly, save logs to 'output.log'.
Even if it were inspired, it is significantly different the way it's written. I've hit these same challenges before, so I'm more inclined to think it is independent discovery.
That certainly was a blog with many emotions. Coming at this with no context, it looks like the kind of content that would be beautiful satire, except it's probably not.
Downloaded a virus for Linux lately and
unpacked it.
Tried to run it as root, didn't work.
Googled for 2 hours, found out that
instead of /usr/local/bin the virus
unpacked to /usr/bin for which the
user malware doesn't have any write
permissions, therefore the virus couldn't
create a process file.
Found patched .configure and .make
files on some Chinese forum, recompiled
and rerun it.
The virus said it needs the library
cmalw-lib-2.0.Turns out
cmalw-lib-2.0 is shipped with CentOS
but not with Ubuntu. Googled for hours
again and found an instruction to build
a.deb package from source.
The virus finally started, wrote some
logs, made a core dump and crashed.
After 1 hour of going through the logs
I discovered the virus assumed it was
running on ext4 and called into its disk
encryption API. Under btrfs this API
is deprecated. The kernel noticed and
made this partition read-only
Opened the sources, grep'ed the Bitcoin
wallet and sent $5 out of pity.