NotSoHarmfulDLL is a Windows DLL that simulates malware-like behavior for cybersecurity research and training. This module is inspired by the Pikabot malware campaign and replicates some of its anti-analysis techniques, including:
✅ Checking system language (exits if Russian ru-RU or Ukrainian uk-UA is detected).
✅ Ensuring a single instance by creating a hardcoded mutex ({A77FC435-31B6-4687-902D-24153579C738}).
✅ Designed for educational use and does not perform harmful actions.
🔗 Research References:
🚨 This project is for educational purposes only. It does not contain malicious code but simulates anti-analysis techniques used by real malware. Use responsibly in authorized research environments.
- Uses
GetUserDefaultUILanguage()to detect system language. - If the system language is Russian (0x0419) or Ukrainian (0x0422), execution is stopped.
- Write output to a text file before exiting.
- Uses
CreateMutexA()to prevent multiple instances of the DLL from running. - If another instance is found, execution immediately exits.
To compile the DLL on a Linux system:
x86_64-w64-mingw32-gcc -shared -o notsoharmfuldll.dll notsoharmfuldll.c -Wall✔ This generates notsoharmfuldll.dll, which can be executed on Windows.
To execute the DLL on Windows, run:
rundll32.exe notsoharmfuldll.dll,RunNotSoHarmful👨💻 Created for cybersecurity research & education. Use responsibly! 🚀