This malware isn't intended for real use. Because of this, no advanced techniques will be and have been used. Don't think this is an example of how real malware is written.
This repository contains harmless malware that displays something in a terminal. It sends data to the server, which then sends it to the IngRest proxy.
The goal of this malware is to serve as a model for the MaaS platform.
Below are steps to run the server and the malware locally.
You only need Cargo to build the project. You will also need the
nightly x86_64-pc-windows-msvc target and the rust-src component.
The server will communicate with the IngRest proxy. For this reason, if the data that has been stolen is to be saved in the database, make sure to set up the proxy and a database.
-
Clone the repository
git clone https://github.com/Malware-as-a-Service/SayWare/
-
Change the environment variables file as you like and load it
-
Run the server!
cargo build --bin sayware-server --release
-
Clone the repository
git clone https://github.com/Malware-as-a-Service/SayWare/
-
Change the malware configuration file as you like
-
Build the malware!
cargo build --target x86_64-pc-windows-msvc \ --bin sayware --profile small-size \ -Z build-std=core,std,panic_abort \ -Z build-std-features="optimize_for_size"
After these steps, the malware will be in the
./target/x86_64-pc-windows-msvc/small-size/ directory. For cross-compilation,
please refer to the malware CI/CD.
Contributions are what make the open source community such an amazing place to
learn, inspire, and create.
Any contributions you make are greatly appreciated.
If you want, you can help me with any kind of work, for example:
- Correct our English errors
- Licensing stuff
Distributed under the GPL 3.0 or later license.