Hacker, Researcher and Author.

Hide Keyloggers and Trojans with Binders

You would have probably heard that never run a .exe file if you are not confirmed about the authenticity of the person who send you that particular file, The reason why you might have heard that because Trojans, Keylogger, Spywares and Adwares use .exe format by default


So what do you think are you completely safe that you run untrusted MP3,JPEG files?

The answer is no, Its because you never know that virus has came with which format, It can take any format, It could be in JPEG, It could be in MP3 and it could be in almost any Format, So in this article I will tell you how hackers hide Keyloggers,Trojans and other harmful viruses in other files

 What is a Binder?

 A Binder is a software used to bind or combine to or more files under one name and extension, The files to be binded can have any extension or icon, Its all up to you and you have the choice to select the name, icon and various attributes of binded file, The Binded files can be even worse when they are crypted, because Bintext would not be able to find it and at the same time it could also bypass antivirus detection then you are almost guaranteed to be infected


Popular Binders

Here are some of the popular binders used by hackers to hide keyloggers and Trojans:

Simple Binder



Simple binder is one of my favorite binders of all time, I give thumbs up to the maker "Nathan", Its so easy to use and even a script kiddie can easily use it to bind keylogger or backdoors with other files


Weekend Binder


Weekend Binder can be used to bind two or more files under one extension and icon, If the binded file contains an application, the application also runs along with the actual binded files .


How to detect Crypted Binded files?



As I told you before that if a trojan or keylogger is binded with a file and it's crypted in order to bypass antivirus detection then its very difficult to detect it, However there is a great piece of software called resource hacker which is really effective when it comes to keylogger protection, It detects whether the file is binded or not.

15 comments:

  1. thats really an awsome technique to detect binders!!!.....bro i wanted to learn frm u about how to convert a "link",say suppose http://www.xyz.com into a .jar file.......bro could u pls help me with the softwares downloads used for converting it......as i have seen many mobile sites use this method to create "bookmark" for their website!!
    Thanks Bro!

    ReplyDelete
  2. @Satyam
    Satyam you need to contact a person who has good knowledge of JavaScripting

    @Wamiq Ali and John
    I am glad that you liked it, Looking forward to h ear more from you

    ReplyDelete
  3. Thanks bro,Bro i need to share with u about the latest released tool "Havij 1.13",m sure u must be known to it....and i think its the best available advanced tool which could be used to carry out automated SQl Injection on the vulnerable targets......
    But bro,i have one doubt with this tool, the tool accepts target in the format http://www.target.com/index.asp?id=123.....so now my question is how to get a website in the given format.....i mean which exploit scanner would be the best one to identify n make the target available in the above given target!!

    Thanks Bro!

    ReplyDelete
  4. where is the download link to dwnload binder?

    ReplyDelete
  5. Simple Binder is Removed from Rapidshare... Upload to Multiple Servers Please.
    and Also you havnt given a Link to Weekend Binder.
    Please Update Both The Links.
    Nice Post Though. ;)

    ReplyDelete
  6. @Tyson
    Tyson Just Google them and you will find it

    ReplyDelete
  7. Thanks bro,Bro i need to share with u about the latest released tool "Havij 1.13",m sure u must be known to it....and i think its the best available advanced tool which could be used to carry out automated SQl Injection on the vulnerable targets......
    But bro,i have one doubt with this tool, the tool accepts target in the format http://www.target.com/index.asp?id=123.....so now my question is how to get a website in the given format.....i mean which exploit scanner would be the best one to identify n make the target available in the above given target!!

    Thanks Bro!

    ReplyDelete
  8. How to make crypted binary files??

    ReplyDelete
  9. Are there any binders that you can recommend for Mac? I haven't had much luck Google. Thank you! :]

    ReplyDelete
  10. @D Agnes
    I think you won't find any free binders for mac as Malware is usually made for windows, A good option is to use Sniperspy for mac it has build in binder I guess.

    ReplyDelete
  11. sir please i installed a keylogger in my system and my antivirus keeps deleting some of the keylogger files, i dont need my antivirus to be detecting them as trojans, plz i need help........kachi

    ReplyDelete
  12. Rafay, will you please explain the actual process? Specifically, do you open the keylogger as File 1 or File 2? Does the order even matter?

    Also, both programs are only allowing me to save the finished product as an .exe. Doesn't that defeat the purpose? What is the significance of "EXE Pump"? Binding is not as simple as simple for beginners as you may have thought, but you are a fantastic teacher and I look forward to a speedy reply. Thanks!

    ReplyDelete
  13. where is the the link to download binder ???

    ReplyDelete

© 2016 All Rights Reserved by RHA Info Sec. Top

Contact Form

Name

Email *

Message *

Powered by Blogger.