• This repository has been archived on 04/Mar/2020
  • Stars
    star
    158
  • Rank 237,131 (Top 5 %)
  • Language
    C
  • License
    BSD 2-Clause "Sim...
  • Created almost 9 years ago
  • Updated almost 7 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

ZeroAccess v3 toolkit

ZeroAccess

Toolkit for ZeroAccess/Sirefef v3

ZeroAccess is an advanced malware family (probably most advanced from all of available), whose first appearance was in the middle of 2009. Initially Win32 kernel mode rootkit, transformed then into user mode toolkit. Uses self made p2p engine for communication (main purpose - download files). Based on modular structure. Survived multiple takedown attempts (they were mostly serving marketing purposes of various so-called security companies/corporations). Has multiple generations of various toolkit modules. This project provide you insights into ZeroAccess v3 code and several instruments to work with ZeroAccess v3 files. Mostly for education purposes.

Project Contents

Umikaze - peer list (@ file) decoder

Processes input file as ZeroAccess peer file, type required for correct port assignation. Result is output file with Time and IP+Port pairs as text.

Usage: zadecode peerlist_filename [type 32 or 64, default 32], for example: zadecode s32 32

Shigure - payload decryptor

Processes input as ZeroAccess payload container, attempting to decode it using RC4 and extract Microsoft Cabinet afterthat.

Usage: zadecrypt inputfile [outputfile], for example: zadecrypt 80000000.@ out.bin

Harusame - payload container verificator

Verifies if given file is valid container for ZeroAccess. Requires EA to be set at input file. More information about verification algorithm can be found in source.

Usage: zacheck inputfile [mode 32 or 64, default 32], for example: zacheck 80000000.@ 32

Yuudachi - ZeroAccess p2p network crawler

GUI application that monitors given p2p botnet network and downloads payload from it. Downloaded files contain all required information for further verification by zacheck tool. Dumps collected peers in ZeroAccess format so they can be used as bootstrap next. Use x86-32 version for win32 botnet and x64 for win64. For work required proper bootstrap list and read/write access to current directory.

Murasame - dropper extractor

Extracts actual bot installation dropper from encrypted resource of high level dropper.

Usage: zaextract inputfile [outputfile] hexkey, for example: zaextract highlvlbot.bin lowlvlbot.bin 0x12345678

System Requirements

Does not require administrative privileges. Some tools may require read/write access for the their directories. Modern compatible NT version required, Windows XP not supported. For best appearance allow zamon32/zamon64 in firewall.

Build

Project comes with full source code written in C. In order to build from source you need: Microsoft Visual Studio 2015 U1 and later versions.

Authors

(c) 2016 ZeroAccess Project

More Repositories

1

UACME

Defeating Windows User Account Control
C
5,920
star
2

KDU

Kernel Driver Utility
C
1,785
star
3

WinObjEx64

Windows Object Explorer 64-bit
C
1,633
star
4

SyscallTables

Windows NT x64 Syscall tables
C
1,039
star
5

TDL

Driver loader for bypassing Windows x64 Driver Signature Enforcement
C
1,001
star
6

VBoxHardenedLoader

VirtualBox VM detection mitigation loader
C
904
star
7

UPGDSED

Universal PatchGuard and Driver Signature Enforcement Disable
C
802
star
8

DSEFix

Windows x64 Driver Signature Enforcement Overrider
C
674
star
9

NtCall64

Windows NT x64 syscall fuzzer
C
533
star
10

WDExtract

Extract Windows Defender database from vdm files and unpack it
C
391
star
11

CVE-2015-1701

Win32k LPE vulnerability used in APT attack
C
284
star
12

WubbabooMark

Debugger Anti-Detection Benchmark
C
270
star
13

LightFTP

Small x86-32/x64 FTP Server
C
232
star
14

VMDE

Source from VMDE paper, adapted to 2015
C
171
star
15

SXSEXP

Expand compressed files from WinSxS folder
C
133
star
16

Stryker

Multi-purpose proof-of-concept tool based on CPU-Z CVE-2017-15303
C
107
star
17

AuthHashCalc

Authenticode Hash Calculator for PE32/PE32+ files
C
97
star
18

MpEnum

Enumerate Windows Defender threat families and dump their names according category
C
85
star
19

Misc

Miscellaneous Code and Docs
C
77
star
20

ROCALL

ReactOS x86-32 syscall fuzzer
C
48
star
21

BSODScreen

BSOD Screensaver
C
38
star
22

AsIo3Unlock

ASUSTeK AsIO3 I/O driver unlock
C
19
star
23

Vault

Various code from the past (for historical purposes)
Pascal
12
star
24

LightFTP_win

C
11
star
25

hfiref0x.github.io

HTML
11
star
26

AR4FFC

Archive repository for fast fact-checks
3
star