DiscoverCybersecurity Tech Brief By HackerNoonVirus.DOS.Kuku: Recreating MS-DOS Malware in Python.
Virus.DOS.Kuku: Recreating MS-DOS Malware in Python.

Virus.DOS.Kuku: Recreating MS-DOS Malware in Python.

Update: 2024-01-16
Share

Description

This story was originally published on HackerNoon at: https://hackernoon.com/virusdoskuku-recreating-ms-dos-malware-in-python.

Reverse engineering the kuku virus in Python and how I did it.

Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity.
You can also check exclusive content about #malware, #retro, #programming, #linux, #windows-10, #computer-virus, #reverse-engineering, #python, and more.




This story was written by: @matejsmycka. Learn more about this writer by checking @matejsmycka's about page,
and for more stories, please visit hackernoon.com.





The original KUKU virus was written in TURBO-BASIC, which is even more painful to read than regular assembly. Kuku means in multiple Slav languages something like "I gotch you" The source code can be found in the VX Underground malware collection.

Comments 
In Channel
loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Virus.DOS.Kuku: Recreating MS-DOS Malware in Python.

Virus.DOS.Kuku: Recreating MS-DOS Malware in Python.

HackerNoon