T-SEC-901-LYO_13
StormWave
StormWave is our malware. StormWave run like an agent and allow attacker to exec commands.

Attack
The attacker use the
RemoteMouse Exploit
to spawn a shell. An evil powershell script will be downloaded and started.
Powershell script The script will first download a malicious exe file to disable Windows Defender. The script also download a malicious DLL file and save it in the System32 folder. This DLL will be automatically loaded at startup time with NT Authority System right.
allow use to disable the AV and turn off firewall continiously.
The powershell script also install the agent A.K.A Stormware.
StormWave StormWave detect sandbox and stop his execution if a sandbox is detected. StormWave try to be persitant everytime.
Features
sandbox detection
screenshot
record audio
upload file
send file
ping
ddos
get uuid
get private ip
get public ip
get wifi password
password stealer
persistence
zip file
update config
windows registry
How to run
Node js v19 is required.
Frontend
cd Stormwave/c2-server/web
npm install
npm run dev
Backend
You can change the opened port.
cd Stormwave/c2-server/backend
npm install
npm run dev 4000
Malware
Change the gateway ip in
configuration.go. You need golang and make.
cd Stormwave/malware/stormwave
make compile # make compile-debug if you want a debug version
The output bin is under /bin
Used tools
Sources :