In a previous article about RATS, I discussed PRORAT: Remote PC Access Software. We have previously discussed how antivirus software can detect RATs as hacking software/viruses, and that hackers need to use crypters to avoid antivirus detection for RATs. In this post, we will discuss crypters – hacking software for bypassing antivirus detection. I have provided a link for a software download.
What is a crypter?
As mentioned above, a crypter is a hacking program or application used to hide our viruses or RATs from antiviruses so that they are not detected and deleted. A crypter allows users to crypt the source code of their program. Generally, antiviruses work by splitting the source code of an application and then searching for a certain string within the code.
If the antivirus detects a specific malicious string, it either stops the scan or deletes the file as a virus.
What does a crypter do?
Crypters assign hidden values to each individual code within the source code. Thus, the source code becomes hidden. This allows our crypted trojan and virus to bypass antivirus detection we successfully hack them them without any AV hindrance. Not only does this crypter hide source code, it will unpack the encryption once the program is executed.
What is FUD?
FUD is acronym for Fully UnDetectable. With increased use of crypters to bypass antiviruses, AV became more advanced and started including crypter definitions to detect crypter strings within code. So, the use of crypter to hide RATs became more complicate. These days, no publicly available crypter is FUD.
If you crypt RATs with publicly available crypters, they are bound to be detected by antiviruses. Most public FUD crypters remain “FUD” for only a day or two after their public release. To obtain FUD crypters, you have to either search for them in hacking forums or make one yourself. Making one is somewhere tedious, I am currently working on one.
How do I get a crypter?
There are many crypters available on the web, but most of them are not FUD. As stated above, you either have to search for a FUD crypter or make one.
In my next article, I will teach you how to use crypters to hide our trojans and bypass antivirus detections.