how to setup a RAT

No explicit questions like "how do I hack xxx.com" please!
User avatar
bozotheclown138
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 172
Joined: 07 Feb 2009, 17:00
15
Contact:

how to setup a RAT

Post by bozotheclown138 »

--------------------------
How To Setup A Rat ---
By:bozotheclown138

Well first things first you need a RAT now i personally recommend Poison Ivy, Bifrost, or Cerberus seeing as those in my opinion those are the best.

Where to get them? well poison ivy has its own website so just use google to find that, as the other ones the cerberus website isnt finished yet and bifrost doesnt have one. So you have to find them on your own. HH is where cerberus was made and they have clean versions of Bifrost so try there if you want. ( there are also binders and crypters there too)

newbie tip!
Once you have your RAT make sure before downloading you disable any antivirus you have because it will detect this as a threat, it is just due to the nature of it that it will be detected. Also be sure to add your file to your antiviruses exclusion list.

Poison Ivy
When you first open up Poison Ivy you will want to go
to file and create new client, the settings that are
already there are fine.

Now go to create new server
and name it whatever you want. Now i recommend using a
No-IP account or a DYNDNS account and at the DNS/PORT
replace the 127.0.0.1 with your host you created, but
do not remove the ":3460:0," you require that and then
test the connection if you want.
Now click next.

Now on this screen have everything
checked. For the HKLM/Run name, choose a name that
doesn't sound suspicious. Then generate a random
ActiveX key. Now copy the file to the system folder
and once again name it something unsuspicious. Now
make sure once again all the checkboxes on this screen
are checked and move on.

Now I'd leave the process mutex at what it is. Inject
the server into the default browser and have
persistence. For injecting into a running process I
would choose winlogon.exe or iexplore.exe Enable the
keylogger and for the format leave it as it is. Now move on.

Click the icon and choose an icon of your choice, then
press generate followed by ok and your set! (you can
add plugins from their website if you'd like)

Bifrost
Now choose the builder option and once again setup a
No-IP or DYNDNS account if you have not and remove
127.0.0.1 and replace it with the host you have
created. (Don't use a password) Now go to
installation.

Change the file name when installed to what you would
like, same with the directory to install to, but i
would change it to the system directory personally.
Check Autostart at reboot and generate a random key.
Leave the mutex name at what it is, but change the
registry key to a name of your choice. Include the
extension pack and the offline keylogger with both
exclusion options checked. Try to inject the server
into either iexplore.exe or winlogon.exe Assigned name
doesn't matter and check persistant server. Now move to stealth.

Choose cautious mode and I would delay the connection
for 5min. (So their firewall won't pick up on it
instantly) And then check Everything else... hidden,
melt, older date, hide process, and kernel level
unhooking. Now move to miscellaneous.

Don't use TOR unless you have the plugin and even then
it's not necessary. Choose build and there's your
server! (also once you have clients and you choose the
update function sometimes you may lose some people)

Cerberus
Now in Cerberus choose options first and go to extras
and once again make sure you have a No-IP or DYNDNS
account setup and fill in the inforation required to automatically update it.

Alright now click New. Remove 127.0.01 and put in your host you have made with your No-IP or DYNDNS account. That's all you need to do in
that section move to server installation.

Alright make sure you install the server haha and use system and
rename it to what you would like. And probably you
will want to keep it an application, but you can
rename server if you want. Now move on to boot methods.

Now check all of them except Explorer Run (You can
choose this, but I find it to cause instability) Now
rename the registry keys to what you would like and
generate an active setup key. Now i personally would
skip Add file and just use binder for that, and for
Anti Debugging just check all of the boxes.

For Misc. Options check Keylogger and check exclude
backspace and leave the filename as it is.
For stealth change the date, hide the files, but I do not
recommend delete on Execution. Make it persistant and
inject it into iexplore.exe or winlogon.exe and rename
the mutex to something you would like.

Display a message if you want, but not necessary.

For the blacklist just name any antiviruses processes
or services you can find and put them in here. (Use
google to find the names of the processes and
services) Now go to create server.

Change the save file as name to what you would like
and uncheck run server in visible mode. You can
compact it if you would like and include the plugin. I
would use an icon and find an icon you'd like and put
it into the icon directory under cerberus to choose
it. Then click create server and there you go! (Once
again when you update you may lose some of your
clients)

Crypters
Now the next thing you will need is a crypter. Well you know once you find one youll want to make sure it has EOF support otherwise it wont work. Then try crypting your server and scan it on novirusthanks.org now its up to you how undetected you want it. so keep trying new crypters until you find one you like. once you have it ready try it on yourself. just open the server and see if you appear on your RAT. if you do this is good it means the server is stable, and then right click and choose uninstall server. (If you don't show up you need another crypter or change your settings for your server, and make sure your connected to your no-ip or dyndns account too)

Binders
Now you'll want to bind it with a folder just get a binder and another program you want to open up with the server. (it's pretty self explanatory once you open up a binder so no need for an indepth look at that) then test it again on your self and upload it to novirusthanks again and if its detected more than it was before try crypting your file after you bind it instead of before.

Then basically your all setup and i wont go through how to infect lots of people because that would be bad :wink: but just send it to who you want it to go to and there you go.

-----------
Last edited by bozotheclown138 on 29 Aug 2009, 14:20, edited 1 time in total.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

Good job, I broke up a large paragraph and just put the title and credits on the page - STICKIED. *thumb* I got no problems with the ethics - because he left out the dirty (but known) tactics to deliver the RAT.

I think it would be ok if you have names of binders and cryptors you use BTW.

If anyone has any questions related to this article specifically, post - this will help resolve any grey areas and complete the tutorial.

DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
bozotheclown138
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 172
Joined: 07 Feb 2009, 17:00
15
Contact:

Post by bozotheclown138 »

haha thanks for the stickie and helping organizing it out, but yeah ill add more details when i find the time

EDIT:Now updated for how to setup each RAT

offshoreposer
suck-o-fied!
suck-o-fied!
Posts: 55
Joined: 02 Jun 2009, 16:00
14
Contact:

Post by offshoreposer »

cant find none of them rats man

User avatar
bozotheclown138
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 172
Joined: 07 Feb 2009, 17:00
15
Contact:

Post by bozotheclown138 »

i believe i posted the links on your other topic well not links but where to find them but i can upload them to this site if you'd like. but give me 2 days im at the wrong house right now and i never put anything bad on this computer this is my best one haha

oh and for some good crypters atm are fly crypter, cryptosy 2.6, and xAVx crypter. those ones are all free and work great

Posts merged by C-Thug

User avatar
computathug
Administrator
Administrator
Posts: 2693
Joined: 29 Mar 2007, 16:00
17
Location: UK
Contact:

Post by computathug »

Please refrain from double posting and use the edit feature unless you are bumping your own post from a later date. Nice work though and thanks for the contribution :wink:
The devil can cite Scripture for his purpose.
-- William Shakespeare, "The Merchant of Venice"
https://tshirt-memes.com

User avatar
bozotheclown138
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 172
Joined: 07 Feb 2009, 17:00
15
Contact:

Post by bozotheclown138 »

sorry about that it wont happen again i just tend to post more when im bored haha and thank you

edit:see no new post! just a quick update i've submitted PI, PI mod, Bifrost 1.2.1, and Cerberus to the download section

and i wont add the crypters just due to i want to respect HH's coders and didn't ask for permission

User avatar
tilo10
forum buddy
forum buddy
Posts: 18
Joined: 28 Sep 2009, 16:00
14

RAT

Post by tilo10 »

haaaaaaaa ,its a great job ,goooooooooooooooooooood . 8)

User avatar
nightkid
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 306
Joined: 27 May 2007, 16:00
16
Location: interwebz

Post by nightkid »

are any of the RATS FUD?
if not what do you suggest to make it so
[img]http://img.photobucket.com/albums/v328/trenchcoatskrilla/biohazard.gif[/img]

User avatar
leetnigga
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 447
Joined: 28 Jul 2009, 16:00
14

Post by leetnigga »

I think it would be nice to add something about features commonly found in RATs that you use. That would be helpful to people who are writing their own.

User avatar
bozotheclown138
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 172
Joined: 07 Feb 2009, 17:00
15
Contact:

Post by bozotheclown138 »

nightkid wrote:are any of the RATS FUD?
if not what do you suggest to make it so
nah no public RAT is FUD and none of the coders really have that as a goal except for DarkcoderSC but im not sure why he cares :?
but you can buy some that are FUD, but in reality it is much easier to use any public cryptor (Fly Cryptor) and if its detected then try hexing.

@leetnigga most are pretty similar cerberus is outdated and the 2Sly hasnt updated it in months (he says hes working on it but taking a while due to a new kid) PI has problems with windows 7 and i think bifrost has some too. the as of date RAT's are Spynet 2.6 (some may be reluctant to use because of previous backdoor problems and Spynet is no longer being developed) Deeper RAT (most stable) Apocalypse which is doing pretty well and Darkcomet RAT but its all beta releases atm so not as useful for now. and cybergate is also supposed to be stable.

common tasks=remote shell, keylogger, registry editor, file manager, program manager(unistall), webcam capture, desktop capture, message appear, chat, one RAT has disable safe mode, download and execute (some mass options some not), then download to your computer well file transfer you can call it, and then i believe spynet would be the most malicious one with a usb and, msn or torrent spreader i forget which and i think it has a "mass ping" option too anyhow that covers most of the common features

ono_efeyu
Newbie
Newbie
Posts: 2
Joined: 18 Oct 2010, 10:38
13

Re: how to setup a RAT

Post by ono_efeyu »

great tutor bro.... *thumb*

User avatar
hacks
Newbie
Newbie
Posts: 1
Joined: 12 Nov 2007, 17:00
16

Re: how to setup a RAT

Post by hacks »

i have never understood difference between Remote login and Rat...

can any one define the difference on this...

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Re: how to setup a RAT

Post by DNR »

Remote Login requires the owner's credentials and password. A RAT is a Remote Access Tool, hinting that it can bypass Login. A RAT is also designed to be covert, while a Remote Login has its prompt screens and popup notifications to the computer user that a Remote Login just occured.

-DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

Dhruvdutt
Newbie
Newbie
Posts: 2
Joined: 14 Nov 2010, 22:16
13

Re: how to setup a RAT

Post by Dhruvdutt »

Thanks
Good for Newbies

Post Reply