Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/bdr-pro/silent-penguin-malware-script
mining script can be injected to ligit exe to make the victim mine monero for you
https://github.com/bdr-pro/silent-penguin-malware-script
Last synced: about 2 months ago
JSON representation
mining script can be injected to ligit exe to make the victim mine monero for you
- Host: GitHub
- URL: https://github.com/bdr-pro/silent-penguin-malware-script
- Owner: BDR-Pro
- License: mit
- Created: 2023-05-05T23:30:23.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2024-02-12T19:31:00.000Z (11 months ago)
- Last Synced: 2024-02-12T20:41:13.718Z (11 months ago)
- Language: PowerShell
- Size: 15 MB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# My mining virus
```diff
+ This is part of my malware devolping projects please make sure you follow any updates
```![image](https://github.com/BDR-Pro/My-first-mining-malware-script/assets/91114465/ec89a426-1ae7-4535-8e32-b6e1468dd7c5)
![image](https://github.com/BDR-Pro/Silent-Penguin-malware-script/assets/91114465/6b4aca66-c217-4e6c-b95b-53b718bd9224)
[REPORT](https://www.virustotal.com/gui/file/5215d83ffe963bae62ff36e990c9cb1e3194ec7f1d189284077a16de6a42a62d/detection)mining script can be injected to ligit exe to make the victim mine monero for yo
embeded to make with download the start and the word , runing the word directly
start to make sure the mining task is persistanceThe provided text appears to be a PowerShell script with malicious intent, designed to conduct unauthorized activities on a targeted machine, typically associated with cyber threats such as malware or a crypto miner. Here's a breakdown of its key components and functionalities:
1. **Aliases and Variable Initializations**: The script starts by setting aliases for common PowerShell cmdlets, presumably to obfuscate its actions from casual observation or automated analysis tools.
2. **Remote File Downloads**: It constructs URLs from concatenated strings to download files from remote locations. This technique is often used to bypass simple string matching detection mechanisms.
3. **Execution of Downloaded Files**: After downloading, it executes the files, which is a common behavior in malware to run payloads retrieved from remote servers.
4. **Sleep Commands**: The script uses sleep commands to delay operations, possibly to evade time-based detection mechanisms.
5. **Obfuscation Techniques**: It employs character code arrays and string joins to hide the actual commands being executed, making analysis and detection more challenging.
6. **Disabling Security Features**: Commands such as disabling real-time monitoring and sample submission settings of Windows Defender indicate an attempt to weaken the host's defenses.
7. **Cryptocurrency Miner Installation**: The script downloads and installs XMRig, a legitimate tool often misused by attackers for unauthorized cryptocurrency mining on compromised machines.
8. **Persistence Mechanisms**: It makes modifications to system settings and places files in specific locations to ensure the miner runs continuously, including setting up the miner to start with Windows.
9. **Concealment**: The script sets files and directories to hidden, aiming to avoid detection by the user or simple file system scans.
10. **Execution with Elevated Privileges**: It attempts to run processes with elevated privileges, which is necessary for certain operations like modifying system settings or installing software without user prompts.
11. **Obfuscated Final Note**: The script ends with an encoded message, which, when decoded, seems to serve as a form of signature or a message from the author, indicating success in malware analysis if found.
This script is a serious security threat and should not be executed on any machine. If you've encountered this script during a security analysis or as part of an incident response, it's crucial to isolate the affected system, conduct a thorough investigation to understand the full scope of the compromise, and apply necessary remediation steps.