Koadic C3 COM Command & Control - JScript RAT

Koadic



Koadic, or COM Command & Control, is a Windows post-exploitation rootkit similar to other penetration testing tools such as Meterpreter and Powershell Empire. The major difference is that Koadic does most of its operations using Windows Script Host (a.k.a. JScript/VBScript), with compatibility in the core to support a default installation of Windows 2000 with no service packs (and potentially even versions of NT4) all the way through Windows 10.
It is possible to serve payloads completely in memory from stage 0 to beyond, as well as use cryptographically secure communications over SSL and TLS (depending on what the victim OS has enabled).
Koadic also attempts to be compatible with both Python 2 and Python 3.

Install

# git clone https://github.com/zerosum0x0/koadic.git
# cd koadic
# pip install -r requirements.txt

Demo



  1. Hooks a zombie
  2. Elevates integrity (UAC Bypass)
  3. Dumps SAM/SECURITY hive for passwords
  4. Scans local network for open SMB
  5. Pivots to another machine

Stagers

Stagers hook target zombies and allow you to use implants.
ModuleDescription
stager/js/mshtaserves payloads using MSHTA.exe HTML Applications
stager/js/regsvrserves payloads using regsvr32.exe COM+ scriptlets
stager/js/wmicserves payloads using WMIC XSL
stager/js/rundll32_jsserves payloads using rundll32.exe
stager/js/diskserves payloads using files on disk

Implants

Implants start jobs on zombies.
ModuleDescription
implant/elevate/bypassuac_eventvwrUses enigma0x3's eventvwr.exe exploit to bypass UAC on Windows 7, 8, and 10.
implant/elevate/bypassuac_sdcltUses enigma0x3's sdclt.exe exploit to bypass UAC on Windows 10.
implant/fun/zombieMaxes volume and opens The Cranberries YouTube in a hidden window.
implant/fun/voicePlays a message over text-to-speech.
implant/gather/clipboardRetrieves the current content of the user clipboard.
implant/gather/enum_domain_infoRetrieve information about the Windows domain.
implant/gather/hashdump_samRetrieves hashed passwords from the SAM hive.
implant/gather/hashdump_dcDomain controller hashes from the NTDS.dit file.
implant/gather/user_hunterLocate users logged on to domain computers (using Dynamic Wrapper X).
implant/inject/mimikatz_dynwrapxInjects a reflective-loaded DLL to run powerkatz.dll (using Dynamic Wrapper X).
implant/inject/mimikatz_dotnet2jsInjects a reflective-loaded DLL to run powerkatz.dll (@tirannido DotNetToJS).
implant/inject/shellcode_excelRuns arbitrary shellcode payload (if Excel is installed).
implant/manage/enable_rdesktopEnables remote desktop on the target.
implant/manage/exec_cmdRun an arbitrary command on the target, and optionally receive the output.
implant/phishing/password_boxPrompt a user to enter their password.
implant/pivot/stage_wmiHook a zombie on another machine using WMI.
implant/pivot/exec_psexecRun a command on another machine using psexec from sysinternals.
implant/scan/tcpUses HTTP to scan open TCP ports on the target zombie LAN.
implant/utils/download_fileDownloads a file from the target zombie.
implant/utils/multi_moduleRun a number of implants in succession.
implant/utils/upload_fileUploads a file from the listening server to the target zombies.

Disclaimer

Code samples are provided for educational purposes. Adequate defenses can only be built by researching attack techniques available to malicious actors. Using this code against target systems without prior permission is illegal in most jurisdictions. The authors are not liable for any damages from misuse of this information or code.

Creators

Koadic C3 COM Command & Control - JScript RAT Koadic C3 COM Command & Control - JScript RAT Reviewed by Haxbaba Tech on 08:31 Rating: 5

No comments:

Powered by Blogger.