May 7
Loki RAT
Проект представляет собой троянскую программу удаленного доступа (RAT). Сам RAT удаленного доступа имеет модульность: клиент (жертва) на C++, сервер на C# и фронтенд на Angular. В своем функционале имеет также встроенный Stealer.
- TimeStomping – Alters file timestamps to mimic legitimate binaries.
- Unhook NTDLL – Restores a clean copy of NTDLL to bypass userland hooks.
- Unhook NTDLL Hooks – Replaces hooked NTDLL with a fresh copy to evade AV/EDR instrumentation.
- Command Line Spoofing – Masks malicious processes with benign command lines.
- ETW Patcher – Hooks and disables ETW logging at runtime.
- No-New Thread Execution – Executes shellcode without creating new threads.
- Own VirtualAlloc (Module Stomping) – Executes shellcode within legitimate module memory.
Persistence & Privilege Escalation
- Execute EXE As Admin – Uses UAC bypass to escalate privileges.
- Task Creator – Creates scheduled tasks for persistence.
Privilege Escalation to SYSTEM – Token stealing via SYSTEM process handles.**
- Information Gathering
- List Processes – Enumerates running processes.
- Enumeration – Gathers OS, disk, registry, and network info.
- Security Detector – Checks for antivirus and monitoring tools.
- Mapping Free Handles in Memory – Reuses handles from trusted processes to evade detection.
- Userland Rootkit – Intercepts system API calls.
- File Hider – Hides files and directories.
- File Unhider – Restores hidden files.
- Process Hider – Conceals malicious processes.
- Registry Hider - Hide Registry keys and values
May 7, 09:57
0 views
0 reposts