/OSRipper

AV evading OSX Backdoor and Crypter Framework

Primary LanguagePythonMIT LicenseMIT

Screenshot



                          ,-.----.               ,----..
        ,-.----.     ,---,\    /  \             /   /   \   .--.--.   ,--,     ,--,  
        \    /  \ ,`--.' ||   :    \           /   .     : /  /    '. |'. \   / .`|  
        ;   :    \|   :  :|   |  .\ :         .   /   ;.  \  :  /`. / ; \ `\ /' / ;  
        |   | .\ ::   |  '.   :  |: |        .   ;   /  ` ;  |  |--`  `. \  /  / .'  
        .   : |: ||   :  ||   |   \ :        ;   |  ; \ ; |  :  ;_     \  \/  / ./   
        |   |  \ :'   '  ;|   : .   /        |   :  | ; | '\  \    `.   \  \.'  /    
        |   : .  /|   |  |;   | |`-'         .   |  ' ' ' : `----.   \   \  ;  ;     
        ;   | |  '   :  ;|   | ;            '   ;  \; /  | __ \  \  |  / \  \  \     
        |   | ;\  \   |  ':   ' |             \   \  ',  / /  /`--'  / ;  /\  \  \   
        :   ' | \.'   :  |:   : :              ;   :    / '--'.     /./__;  \  ;  \  
        :   : :-' ;   |.' |   | :               \   \ .'    `--'---' |   : / \  \  ; 
        |   |.'   '---'   `---'.|                `---`               ;   |/   \  ' | 
        `---'               `---`                                    `---'     `--`  




        1. Create Bind Backdoor (opens a port on the victim machine and waits for you to connect) 
        2. Create Encrypted TCP Meterpreter (can embed in other script) (recommended)
        3. Create Obfuscated file with custom code
        ##########################################################################################
                                                Miners
        4. Create a silent BTC miner


Please select a module:

CodeFactor

OSripper is a fully undetectable Backdoor generator and Crypter which specialises in OSX M1 malware. It will also work on windows but for now there is no support for it and it IS NOT FUD for windows (yet at least) and for now i will not focus on windows.

Gen 3 OSRipper backdoor results

https://www.virustotal.com/gui/file/e7e654893cec4e1f1aa76e2bbfa4bb1e0c6a15adf19236845948877e93013aea (py) https://www.virustotal.com/gui/file-analysis/MjM2MTJiMjI3YTMzM2JjYzExMTJhMzhiMGY4ODQxZjA6MTcwMTcyOTE3MQ== (unix binary)

Update

Hey sorry ive been lost in action revently. happy to say this project still works and the binaries are FUD. Will try to continue as planned

This is the first v0.3 Release. The payloads will now be double staged in order to evade av detection. Please keep in mind that i develop on arch and only test on a few platforms so there are sure to be bugs and you should open issues for them. Biggest difference to last release is that this project isnt focused on macOS anymore but on all platforms. It also now features a web server on which the staged payload is stored. I will develop this server into a C2 to which data will be pushed from the victim. With this update the developtment is officially back in progress.

Scheme of concept

        +-----------------+
        |   Generated     |
        |    Binary       |
        +-----------------+
                 |
                 | Execute
                 |
                 v
        +------------------+
        |oBFUSCATED dropper|
        +------------------+
                 |
                 | GET request
                 |
                 v
        +-----------------+
        |                 |
        |    C2 SERVER    |
        |                 |
        +-----------------+
                 |
                 | Download
                 |
                 v
        +-----------------+
        |    Meterpreter  |
        |   Staged Payload|
        |    (Stage 1)    |
        +-----------------+
                 |
                 | Download
                 |
                 v
        +-----------------+
        |    C2 Server    |
        +-----------------+
                 |
                 | Socket
                 |
                 v
        +-----------------+
        |    Meterpreter  |
        |   Staged Payload|
        |    (Stage 2)    |
        +-----------------+

Features

  • Staged payloads
  • FUD (for macOS)
  • Cloacks as an official app (Microsoft, ExpressVPN etc)
  • Dumps; Sys info, Browser History, Logins, ssh/aws/azure/gcloud creds, clipboard content, local users etc. (more on Cedric Owens swiftbelt)
  • Encrypted communications
  • Rootkit-like Behaviour
  • Every Backdoor generated is entirely unique
  • ngrok support

Description

Please check the wiki for information on how OSRipper functions (which changes extremely frequently)

https://github.com/SubGlitch1/OSRipper/wiki

Here are example backdoors which were generated with OSRipper

Screenshot

Screenshot

Screenshot macOS .apps will look like this on vt

Getting Started

Dependencies

You need python. If you do not wish to download python you can download a compiled release. The python dependencies are specified in the requirements.txt file.

Since Version 1.4 you will need metasploit installed and on path so that it can handle the meterpreter listeners.

Installing

Linux

apt install git python -y
git clone https://github.com/SubGlitch1/OSRipper.git
cd OSRipper
sudo python3 setup.py

Windows

git clone https://github.com/SubGlitch1/OSRipper.git
cd OSRipper
python3 setup.py

or download the latest release from https://github.com/SubGlitch1/OSRipper/releases/tag/v0.3

Executing program

Only this

sudo python3 main.py

Contributing

Please feel free to fork and open pull repuests. Suggestions/critisizm are appreciated as well

Roadmap

v0.1

  • ✅ Get down detection to 0/26 on antiscan.me
  • ✅ Add Changelog
  • ✅ Daemonise Backdoor
  • ✅ Add Crypter
  • ✅ Add More Backdoor templates
  • ✅ Get down detection to at least 0/68 on VT (for mac malware)

v0.2

  • ✅ Add AntiVM
  • [] Implement tor hidden services
  • ✅ Add Logger
  • ✅ Add Password stealer
  • [] Add KeyLogger
  • ✅ Add some new evasion options
  • ✅ Add SilentMiner
  • [] Make proper C2 server

v0.3

  • ✅ Add c2
  • ✅ Double staged Web delivery
  • ⏳ Backdoor pushes data to c2 through POST request
  • ❔❓Add post exploitation Modules? (im not sure if this would be helpful)
  • ⏳ Add shells with modules instead of python meterpreter

Help

Just open a issue and ill make sure to get back to you

Changelog

  • 0.2.1

    • OSRipper will now pull all information from the Target and send them to the c2 server over sockets. This includes information like browser history, passwords, system information, keys and etc.
  • 0.1.6

    • Proccess will now trojanise itself as com.apple.system.monitor and drop to /Users/Shared
  • 0.1.5

    • Added Crypter
  • 0.1.4

    • Added 4th Module
  • 0.1.3

    • Got detection on VT down to 0. Made the Proccess invisible
  • 0.1.2

    • Added 3rd module and listener
  • 0.1.1

    • Initial Release

License

MIT

Acknowledgments

Inspiration, code snippets, etc.

Disclaimer

I am not responsible for what is done with this project. This tool is solely written to be studied by other security researchers to see how easy it is to develop macOS malware.