This repository contains the leaked source code of CraxsRat, a sophisticated Android remote access trojan (RAT) developed by "EVLF DEV". CraxsRat has been used in various cyber-attacks to grant cybercriminals extensive control over infected devices.
Warning: Im not the code writer ,the source code got leaked by another person on telegram, This repository contains malicious code and is intended for cybersecurity research and educational purposes only. The use of this code for any unauthorized or illegal activities is strictly prohibited and punishable by law. By using this code, you agree to use it responsibly and comply with all applicable laws and regulations.
- Device Location Retrieval: Obtain the precise location of the infected device.
- Contact Exfiltration: Extract contacts from the device.
- Storage Access: Access and manipulate files stored on the device.
- Message and Call Log Compromise: Access and manipulate SMS messages and call logs.
- Obfuscation and Anti-Removal: Generate highly obfuscated packages to evade detection and prevent removal.
- Accessibility Exploitation: Modify the accessibility settings page to maintain persistence.
- Google Play Protect Bypass: The latest version, v7.4, can bypass Google’s built-in antivirus system, Google Play Protect.
-
.vs
- Visual Studio project settings and configuration files.
-
bin
- Directory containing compiled binaries and executable files for the project.
-
My
- Possibly a user-defined directory for additional resources or files.
-
obj
- Intermediate files and object files generated during the build process.
-
Properties
- Directory containing project properties and settings, typically includes
AssemblyInfo.cs
.
- Directory containing project properties and settings, typically includes
-
-Module-.cs
- Placeholder or template module file.
-
-Module-{14C782A-EBF2-4C59-8120-8B1FAF654264}.cs
- Module file with a unique identifier in its name.
-
-ProjectType-.cs
- Placeholder or template project type file.
-
1.cs
- Source code file, likely one of the early files in the project.
-
1~1.cs
- Backup or temporary file for
1.cs
.
- Backup or temporary file for
-
2.cs
- Another source code file, possibly a continuation or related to
1.cs
.
- Another source code file, possibly a continuation or related to
-
2~1.cs
- Backup or temporary file for
2.cs
.
- Backup or temporary file for
-
3.cs
- Another source code file, following
2.cs
.
- Another source code file, following
-
3~1.cs
- Backup or temporary file for
3.cs
.
- Backup or temporary file for
-
4.cs
- Another source code file, following
3.cs
.
- Another source code file, following
-
4~1.cs
- Backup or temporary file for
4.cs
.
- Backup or temporary file for
-
5.cs
- Another source code file, following
4.cs
.
- Another source code file, following
-
5~1.cs
- Backup or temporary file for
5.cs
.
- Backup or temporary file for
-
6.cs
- Another source code file, following
5.cs
.
- Another source code file, following
-
6~1.cs
- Backup or temporary file for
6.cs
.
- Backup or temporary file for
-
AssemblyInfo.cs
- Contains metadata about the assembly, such as version information and attributes.
-
App.xaml
- Defines the application-level properties, resources, and event handlers.
-
App.xaml.cs
- Code-behind file for
App.xaml
, containing application logic.
- Code-behind file for
-
MainWindow.xaml
- Defines the user interface for the main window of the application.
-
MainWindow.xaml.cs
- Code-behind file for
MainWindow.xaml
, containing the logic for the main window.
- Code-behind file for
-
PrismModuleA.csproj
- Project file for the
PrismModuleA
project, containing build configurations and project settings.
- Project file for the
-
PrismModuleA.csproj.user
- User-specific project settings, such as user preferences and settings.
-
Sample.xlam
- Excel Add-In file, likely a sample or template for Excel extensions.
-
sample1.csv
- Sample CSV file, possibly containing data for testing or demonstration.
-
Template.xaml
- Defines a XAML template, potentially for UI components or styles.
- Android device (target)
- Builder application to create the RAT payload
-
Clone the Repository:
git clone https://github.com/maxamin/CraxsRat-v6.8-Source-LEAK.git cd raxsRat-v6.8-Source-LEAK
-
Open it with vs & Builder Configuration:
- Open the project .sln file with vs
- Follow the instructions in the builder directory to set up and configure the RAT payload.
- Customize the payload to suit your specific requirements.
-
Payload Deployment:
- Distribute the RAT payload through social engineering, malvertising, or other methods.
- Ensure the payload is installed on the target device.
-
Control the Infected Device:
- Use the command and control (C2) server to send commands to the infected device.
- Retrieve location, contacts, messages, call logs, and access stored files.
-
Maintain Persistence:
- Utilize the obfuscation features to keep the RAT hidden from the user and security software.
- Ensure the RAT's accessibility settings are enabled to maintain control over the device.