How to [FUD 1/35] Gdog: Use Gmail as Command and Control Server

Jun 8, 2016 07:50 PM
636009870301778804.jpg

Gdog

A stealthy Python based Windows backdoor that uses Gmail as a command and control server

Requirements

Python 2.x

PyCrypto module

WMI module

Enum34 module

Netifaces module

Features

Encrypted transportation messages (AES) + SHA256 hashing

Generate computer unique id using system information/characteristics (SHA256 hash)

Job IDs are random SHA256 hashes

Retrieve system information

Retrieve Geolocation information (City, Country, lat, long, etc..)

Retrieve running processes/system services/system users/devices (hardware)

Retrieve list of clients

Execute system command

Download files from client

Upload files to client

Execute shellcode

Take screenshot

Lock client's screen

Keylogger

Lock remote computer's screen

Shutdown/Restart remote computer

Log off current user

Download file from the WEB

Visit website

Show message box to user

Related Articles

637263493835297420.jpg

How to Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)

636455706472146367.jpg

How to Hide DDE-Based Attacks in MS Word

Comments

No Comments Exist

Be the first, drop a comment!