--- A Concept design of a simple malware executable compiled using rust. The payload is calc.exe.
The file moves itself, renames itself (as backdoor.exe), hides itself, and re-executes itself
inside of the target's AppData folder.
Detailed explanation
The application is a Trojan that moves itself into the users AppData
folder and sets its
attribute to hidden. In my case the payload is calc.exe
You can set this to whatever you want obviously.
If you compile this code as is, it IS NOT malicious in any way shape or form.
- WSL2/Ubuntu (Docker)
make docker-container make docker-build