StormWave is our malware. StormWave run like an agent and allow attacker to exec commands.
-
The attacker use the RemoteMouse Exploit to spawn a shell. An evil powershell script will be downloaded and started.
-
Powershell script The script will first download a malicious exe file to disable Windows Defender. The script also download a malicious DLL file and save it in the System32 folder. This DLL will be automatically loaded at startup time with NT Authority System right. allow use to disable the AV and turn off firewall continiously.
The powershell script also install the agent A.K.A Stormware.
- StormWave StormWave detect sandbox and stop his execution if a sandbox is detected. StormWave try to be persitant everytime.
- sandbox detection
- screenshot
- record audio
- upload file
- send file
- ping
- ddos
- get uuid
- get private ip
- get public ip
- get wifi password
- password stealer
- persistence
- zip file
- update config
- windows registry
Node js v19 is required.
cd Stormwave/c2-server/web
npm install
npm run dev
You can change the opened port.
cd Stormwave/c2-server/backend
npm install
npm run dev 4000
Change the gateway ip in configuration.go
.
You need golang and make.
cd Stormwave/malware/stormwave
make compile # make compile-debug if you want a debug version
The output bin is under /bin