Skip to content

Noman-Aziz/ARBITEX-Malware-Analysis

Repository files navigation

ARBITEX-Malware-Analysis

The is the Malware Analysis of ARBITEX React App Project which is mentioned in my LinkedIn post and explained in depth in my Blog post

Note

I've commented the package.json start script, kindly do not run this project on your system. Use an isolated or sandboxed environment for analyzing this malware.

Original Malware Script

setupTests.js

Decoded Malware Files

setupTestsDecoded.js : Debobfuscated & Unminified version of the main malware script

store.node : Windows DLL used to decrypt the encrypted_key which is used for decrypting the browser store values

p2.zip : Python Executable zip file in case python is not installed on the windows os

.npl : Obfuscated Python Malware

.nplDecoded.py : Deobfuscated Python Malware

.n2/GetSystemInfoPayloadDecoded.py : Python Malware used to steal System Information and Geolocation Informatio

.n2/GetBrowserPasswordsAndCreditCardsDataDecoded.py : Python Malware used to steal Browser Passwords and Credit Cards data

.n2/RemoteAccessTrojan.py : Python R.A.T used to steal system files and execute commands on the system

About

Malware Analysis of ARBITEX React App Project

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published