mirror of
https://github.com/ytisf/theZoo.git
synced 2025-12-05 20:19:57 -08:00
dbVer --> 1750498935000
Some fresh wipers
This commit is contained in:
@@ -1 +1 @@
|
|||||||
1712294860000
|
1750498935000
|
||||||
BIN
conf/maldb.db
BIN
conf/maldb.db
Binary file not shown.
@@ -1,3 +1,4 @@
|
|||||||
|
python
|
||||||
import sqlite3 as lite
|
import sqlite3 as lite
|
||||||
from imports import globals
|
from imports import globals
|
||||||
import sys
|
import sys
|
||||||
@@ -6,59 +7,61 @@ import sys
|
|||||||
class DBHandler:
|
class DBHandler:
|
||||||
|
|
||||||
def __init__(self):
|
def __init__(self):
|
||||||
|
self._connect()
|
||||||
|
|
||||||
|
def _connect(self):
|
||||||
try:
|
try:
|
||||||
self.con = lite.connect(globals.vars.db_path)
|
self.con = lite.connect(globals.vars.db_path)
|
||||||
self.cur = self.con.cursor()
|
self.cur = self.con.cursor()
|
||||||
except lite.Error as e:
|
except lite.Error as e:
|
||||||
print("An error occurred:", e.args[0])
|
print(f"An error occurred: {e.args[0]}")
|
||||||
sys.exit()
|
sys.exit()
|
||||||
|
|
||||||
def get_full_details(self):
|
def get_full_details(self):
|
||||||
return self.cur.execute("SELECT * FROM Malwares").fetchall()
|
return self.cur.execute("SELECT * FROM Malwares").fetchall()
|
||||||
|
|
||||||
def get_partial_details(self):
|
def get_partial_details(self):
|
||||||
return self.cur.execute("SELECT ID, TYPE, LANGUAGE, ARCHITECTURE, PLATFORM, NAME FROM Malwares").fetchall()
|
query = "SELECT ID, TYPE, LANGUAGE, ARCHITECTURE, PLATFORM, NAME FROM Malwares"
|
||||||
|
return self.cur.execute(query).fetchall()
|
||||||
|
|
||||||
def get_mal_list(self):
|
def get_mal_list(self):
|
||||||
return self.cur.execute("SELECT ID, NAME, TYPE From Malwares").fetchall()
|
query = "SELECT ID, NAME, TYPE FROM Malwares"
|
||||||
|
return self.cur.execute(query).fetchall()
|
||||||
|
|
||||||
def get_mal_names(self):
|
def get_mal_names(self):
|
||||||
|
query = "SELECT NAME FROM Malwares"
|
||||||
# Sqlite3 returns a tuple even if a single value is returned
|
return [val[0] for val in self.cur.execute(query).fetchall()]
|
||||||
# We use x[0] for x to unpack the tuples
|
|
||||||
return [val[0] for val in self.cur.execute("SELECT NAME FROM Malwares").fetchall()]
|
|
||||||
|
|
||||||
def get_mal_tags(self):
|
def get_mal_tags(self):
|
||||||
return [val[0] for val in self.cur.execute("SELECT DISTINCT TAGS From Malwares WHERE TAGS IS NOT NULL").fetchall()]
|
query = "SELECT DISTINCT TAGS FROM Malwares WHERE TAGS IS NOT NULL"
|
||||||
|
return [val[0] for val in self.cur.execute(query).fetchall()]
|
||||||
|
|
||||||
def get_mal_info(self, mid):
|
def get_mal_info(self, mid):
|
||||||
return self.cur.execute("SELECT TYPE, NAME, VERSION, AUTHOR, LANGUAGE, DATE, ARCHITECTURE, PLATFORM, TAGS From Malwares WHERE ID =" + str(mid)).fetchall()
|
query = (
|
||||||
|
"SELECT TYPE, NAME, VERSION, AUTHOR, LANGUAGE, DATE, ARCHITECTURE, PLATFORM, TAGS "
|
||||||
|
f"FROM Malwares WHERE ID = {mid}"
|
||||||
|
)
|
||||||
|
return self.cur.execute(query).fetchall()
|
||||||
|
|
||||||
def query(self, query, param=''):
|
def query(self, query, param=''):
|
||||||
if globals.vars.DEBUG_LEVEL is 2:
|
if globals.vars.DEBUG_LEVEL == 2:
|
||||||
print(locals())
|
print(locals())
|
||||||
try:
|
try:
|
||||||
if param is not '':
|
if param != '':
|
||||||
return self.cur.execute(query, param if type(param) is list else [param]).fetchall()
|
params = param if isinstance(param, list) else [param]
|
||||||
else:
|
return self.cur.execute(query, params).fetchall()
|
||||||
return self.cur.execute(query).fetchall()
|
return self.cur.execute(query).fetchall()
|
||||||
except lite.Error as e:
|
except lite.Error as e:
|
||||||
print("An error occurred:", e.args[0])
|
print(f"An error occurred: {e.args[0]}")
|
||||||
sys.exit()
|
sys.exit()
|
||||||
|
|
||||||
def close_connection(self):
|
def close_connection(self):
|
||||||
try:
|
try:
|
||||||
self.cur.close()
|
self.cur.close()
|
||||||
self.con.close()
|
self.con.close()
|
||||||
return
|
|
||||||
except lite.Error as e:
|
except lite.Error as e:
|
||||||
print("An error occurred:", e.args[0])
|
print(f"An error occurred: {e.args[0]}")
|
||||||
sys.exit()
|
sys.exit()
|
||||||
|
|
||||||
def renew_connection(self):
|
def renew_connection(self):
|
||||||
try:
|
self._connect()
|
||||||
self.con = lite.connect(globals.vars.db_path)
|
|
||||||
self.cur = self.con.cursor()
|
|
||||||
except lite.Error as e:
|
|
||||||
print("An error occurred:", e.args[0])
|
|
||||||
sys.exit()
|
|
||||||
1
malware/Binaries/Wiper.BEEP.E/Wiper.BEEP.E.md5
Normal file
1
malware/Binaries/Wiper.BEEP.E/Wiper.BEEP.E.md5
Normal file
@@ -0,0 +1 @@
|
|||||||
|
eb69bd536036b275631b0cdcac3c0963
|
||||||
1
malware/Binaries/Wiper.BEEP.E/Wiper.BEEP.E.pass
Normal file
1
malware/Binaries/Wiper.BEEP.E/Wiper.BEEP.E.pass
Normal file
@@ -0,0 +1 @@
|
|||||||
|
infected
|
||||||
BIN
malware/Binaries/Wiper.BEEP.E/Wiper.BEEP.E.zip
Normal file
BIN
malware/Binaries/Wiper.BEEP.E/Wiper.BEEP.E.zip
Normal file
Binary file not shown.
1
malware/Binaries/Wiper.SAPP.IC/Wiper.SAPP.IC.md5
Normal file
1
malware/Binaries/Wiper.SAPP.IC/Wiper.SAPP.IC.md5
Normal file
@@ -0,0 +1 @@
|
|||||||
|
ae4d661f2bd87e2ff78dedc34e04424e
|
||||||
1
malware/Binaries/Wiper.SAPP.IC/Wiper.SAPP.IC.pass
Normal file
1
malware/Binaries/Wiper.SAPP.IC/Wiper.SAPP.IC.pass
Normal file
@@ -0,0 +1 @@
|
|||||||
|
infected
|
||||||
BIN
malware/Binaries/Wiper.SAPP.IC/Wiper.SAPP.IC.zip
Normal file
BIN
malware/Binaries/Wiper.SAPP.IC/Wiper.SAPP.IC.zip
Normal file
Binary file not shown.
1
malware/Binaries/Wiper.WIPE32.P/Wiper.WIPE32.P.md5
Normal file
1
malware/Binaries/Wiper.WIPE32.P/Wiper.WIPE32.P.md5
Normal file
@@ -0,0 +1 @@
|
|||||||
|
e44327fbec4508158f0f9a119c1b7430
|
||||||
1
malware/Binaries/Wiper.WIPE32.P/Wiper.WIPE32.P.pass
Normal file
1
malware/Binaries/Wiper.WIPE32.P/Wiper.WIPE32.P.pass
Normal file
@@ -0,0 +1 @@
|
|||||||
|
infected
|
||||||
BIN
malware/Binaries/Wiper.WIPE32.P/Wiper.WIPE32.P.zip
Normal file
BIN
malware/Binaries/Wiper.WIPE32.P/Wiper.WIPE32.P.zip
Normal file
Binary file not shown.
Reference in New Issue
Block a user