Skip to content
This repository was archived by the owner on Mar 5, 2020. It is now read-only.

Digital-Vault/Malware

Repository files navigation

Team Project

Members

  • Brian Smith
  • Abiram Kaimathuruthy

Software Requirements

  • Python 3.7
  • pynput
  • paramiko
  • SFTP server

Installation and Removing

In order to make it easier for you, we have created install and uninstall bash scripts that take care of installing and removing the libraries and output files.

Assumptions

We have made the following assumptions:

  • SFTP server is running on port 22
  • SFTP server is located on localhost
  • There exist a lab user with a home
  • The password for the the lab user is lab

Running Software

Before we begin, you can configure some options. The following directories need to be present before running the python file (This is created for you in install script):

  • /home/lab/Erebus/input
  • /home/lab/Erebus/output

The following files need to be in /home/lab/Erebus/input directory:

  • keyLogger.py
  • reverseShell.py
  • commands A text file with commands to run on the infected machine. One entry per line.

IMPORTANT: The program sleeps for long durations between commands. If you want to test it quickly you can adjust the sleep timers in keyLogger.py and reverseShell.py files.

Please execute secretSanta.py. Note that the malicious part is not executed every time and therefore you might have to run it a couple of times. To see more information, please take a look at the use case 1.

You can run the following to check if it is running after the main program has ended.

ps aux | grep 'secretSanta'

Use Case 1

Actors

  • IT employee

Trigger

User runs the program

Pre-Condition

secretSanta.py has been executed by the user

Post-Condition

  • Key logs are uploaded to SFTP server
  • Command results are uploaded to SFTP

Normal Flow

  1. The system will ask the user for a gift.
  2. The user inputs a value.
  3. The system executes the malicious part of application*. It downloads all the required pieces of code from the SFTP server and executes them.
  4. The system starts logging the keystrokes and runs commands periodically.
  5. The system displays the confirmation message to the user.

Alternative flow

The malicious part of the application runs about 40% of the time to avoid being predictive.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •