Skip to content

Latest commit

 

History

History
22 lines (18 loc) · 1.43 KB

README.md

File metadata and controls

22 lines (18 loc) · 1.43 KB

LMAOware: Custom Command and Control malware framework.

written by Aidan Nagao (myself), Justin Wong (https://github.com/Jmaxwong), and Edward Chien (https://github.com/edward0326).

Command and Control Framework Features:

  • Implant gathers environment info before running.
    • This specific implant checks for a specific file before running, making it safe to run on an ordinary machine. It will detonate itself before any harm is done, if the file is not found.
  • Stealer functionality for the Google Chrome default user.
  • Implant will send a register request to the server, which will allow commands to be forwarded to the infected host.
  • Commands can be sent from the server to any implant via stegonagraphic images (png).
    • Bit strings are hidden within the image pixel values, leaving the images intact, while also concealing (up to) 3 commands.
    • These images are then deleted once used.

This framework was written using C++, Python, HTML, and MySQL.

  • The malware implant/agent is written with C++.
  • The server is written with Python, using Flask and Gunicorn for hosting.
  • The client (used to send commands to the server) is written with HTML and routing with Flask.
  • Backend database utilizes MySQL.

For some more details regarding this project, especially the steganography, please see our slides here: https://docs.google.com/presentation/d/191optzyMZHfWX9qA45oPp681APqYaaJKk2frK2uthwI/edit#slide=id.g106e742d35d_0_0