Skip to content

Latest commit

 

History

History
45 lines (36 loc) · 1.4 KB

File metadata and controls

45 lines (36 loc) · 1.4 KB

About:

  • Title: malware_exec
  • Description: malware_exec fetches malware hosted on Internet and executes it on targets system.
  • AUTHOR: drapl0n
  • Version: 1.0
  • Category: Exfiltaration
  • Target: Unix-like operating systems .
  • Attackmodes: HID, Storage

malware_exec: malware_exec fetches malware hosted on Internet and executes it on targets system making it autorun on shell execution and persistent without root privileges.

Features:

  • Executes Malware.
  • Trigger malware on shell execution/autorun malware on shell execution.
  • Persistent Malware.
  • No root privileges required.

Workflow:

  1. Prevent storing history.
  2. Fetching BashBunny's block device.
  3. Mounting BashBunny.
  4. Executing Malware.
  5. Making malware autorun and persistent (optional).
  6. Unmounting BashBunny.

Usage:

  • Change Testing URL on line 36 to your custom URL.
  • Uncomment line 46 to 56 to make malware persistent and autorun it on shell execution.

LED Status:

  • SETUP : MAGENTA
  • ATTACK : YELLOW
  • FINISH : GREEN

Directory Structure of payload components:

FileName Directory
payload.txt /payloads/switch1/
payload.sh /payloads/library/malware_exec/
  • Note: Create directory named malware_exec in /payloads/library/

Support me if you like my work: