Disclaimer: This post is for educational and research purposes only. No binaries, loaders, or malware will be shared. This is a breakdown of behavior and implementation logic only.
This post explains how ZeroTraceClipper operates —> a simulated RAM-only crypto clipper that executes, swaps clipboard values, and self-wipes from memory in under a minute.
The design focus is clean:
1. Clipboard Hooking (stealth method)
Uses
instead of
avoiding hook detection. If that fails, falls back to clipboard polling with
2. Regex Wallet Detection
Scans clipboard buffer with regex patterns like:
3. Instant Replace Mechanism
Once a match is found, it wipes the clipboard and inserts the attacker’s address using:
4. Self-Wipe After Trigger
If it swaps once, or if 45 seconds pass without a hit, the payload:
is used to wipe mapped shellcode in memory. No trace left.
5. Optional Shellcode Variant (not included)
Using Donut or sRDI, the .exe can be converted into pure shellcode. This allows injection directly into memory with
or
Still memory-only, still vanishing after one use.
This is not malware. It’s a demonstration of how a clipboard-based attack could be implemented in a fileless way — for defensive research, red team education, and detection bypass analysis only.
—
AstraLoom
Thinking of turning this into a fully modular RAM-only clipper toolkit for research & red team simulation.
Would include:
Should I drop it here for the community to test + learn from?
Comment or DM if you're into this kind of low-footprint malware simulation.
—
AstraLoom
This post explains how ZeroTraceClipper operates —> a simulated RAM-only crypto clipper that executes, swaps clipboard values, and self-wipes from memory in under a minute.
The design focus is clean:
- No persistence
- No files dropped
- No log traces
- Memory-only execution
- Wipes itself clean after 1 hit or 45 seconds
1. Clipboard Hooking (stealth method)
Uses
Code:
SetClipboardViewer()
Code:
SetWindowsHookEx()
Code:
GetClipboardData()
- No UI window
- No user interaction
- Low CPU footprint
- Silent monitoring
2. Regex Wallet Detection
Scans clipboard buffer with regex patterns like:
- BTC:Code:
1[a-km-zA-HJ-NP-Z1-9]{25,34}
- ETH:Code:
0x[a-fA-F0-9]{40}
3. Instant Replace Mechanism
Once a match is found, it wipes the clipboard and inserts the attacker’s address using:
- Code:
OpenClipboard()
- Code:
EmptyClipboard()
- Code:
SetClipboardData()
4. Self-Wipe After Trigger
If it swaps once, or if 45 seconds pass without a hit, the payload:
- Clears heap and stack regions
- CallsCode:
VirtualFree()
- Overwrites stub with junk
- ExecutesCode:
ExitProcess()
Code:
RtlSecureZeroMemory()
5. Optional Shellcode Variant (not included)
Using Donut or sRDI, the .exe can be converted into pure shellcode. This allows injection directly into memory with
Code:
VirtualAlloc()
Code:
CreateRemoteThread()
Code:
NtCreateThreadEx()
Still memory-only, still vanishing after one use.
This is not malware. It’s a demonstration of how a clipboard-based attack could be implemented in a fileless way — for defensive research, red team education, and detection bypass analysis only.
—
AstraLoom
Thinking of turning this into a fully modular RAM-only clipper toolkit for research & red team simulation.
Would include:
- Builder (custom wallet injection)
- Shellcode output (for memory-only deployment)
- Manual self-wipe timer config
- Optional C2 pingback (encrypted, research-only sandboxed callback)
Should I drop it here for the community to test + learn from?
Comment or DM if you're into this kind of low-footprint malware simulation.
—
AstraLoom