Hackers’ Toolkit Exposed, Wide Range of Tools from Initial Access to Full Control

by Jabez
31 comments

Cybersecurity researchers have discovered an extensive hacker toolkit, revealing a comprehensive set of tools designed for various stages of cyberattacks.

The toolkit, found in an open directory, showcases the sophisticated methods employed by threat actors to gain and maintain access to compromised systems.

The discovery, made in early December 2023, exposed a collection of batch scripts and malware targeting both Windows and Linux systems. These tools demonstrate the hackers’ ability to perform various malicious activities, from initial system compromise to long-term control and data exfiltration.
Among the most notable tools uncovered were PoshC2 and Sliver, two well-known command and control (C2) frameworks. These open-source tools, typically used by penetration testers and red teams, have been repurposed by malicious actors for nefarious purposes. These frameworks indicate the attackers’ intent to establish persistent remote access to compromised systems.
POSHC2 Capabilities
The toolkit also included several custom batch scripts designed for defense evasion and system manipulation. Scripts such as atera_del.bat and atera_del2.bat were crafted to remove Atera remote management agents, potentially eliminating traces of legitimate administrative tools.
Other scripts like backup.bat and delbackup.bat focused on deleting system backups and shadow copies, a common tactic used to hinder data recovery efforts in ransomware attacks.

DFIR Report Researchers noted the presence of clearlog.bat, a script capable of erasing Windows event logs and removing evidence of Remote Desktop Protocol (RDP) usage. This highlights the attackers’ emphasis on covering their tracks and evading detection.
The toolkit also contained more specialized tools:
cmd.cmd: Disables User Account Control and modifies registry settings
def1.bat and defendermalwar.bat: Disable Windows Defender and uninstall Malwarebytes
disable.bat and hyp.bat: Stop and disable various critical services
LOGOFALL.bat and LOGOFALL1.bat: Log off user sessions
NG1.bat and NG2.bat: Contain Ngrok authentication tokens for proxy purposes
Ngrok.exe: A legitimate tool abused for proxy services
Posh_v2_dropper_x64.exe: PoshC2 dropper for Windows
native_dropper: Linux version of the PoshC2 dropper
py_dropper.sh: Bash script to execute a Python dropper for PoshC2
VmManagedSetup.exe: SystemBC malware executable
WILD_PRIDE.exe: Sliver C2 framework executable
The discovery of this toolkit provides valuable insights into the methods and tools employed by modern cybercriminals. It underscores the importance of robust cybersecurity measures and the need for organizations to remain vigilant against evolving threats.
Tools & Techniques (Source: DFIR Report)
Cybersecurity experts advise organizations to implement comprehensive security strategies, including regular system updates, employee training, and advanced threat detection systems to protect against such sophisticated attack toolkits.
Researchers believe these servers were likely used in ransomware intrusion activity based on the tools presented. They found many scripts attempting to stop services, delete backups and shadow copies, and disable or remove antivirus software. You can find the complete list of IoC’s here.
Are you from SOC and DFIR Teams? Analyse Malware Incidents & get live Access with ANY.RUN -> Get 14 Days Free Access

This information was reported originally by:
Guru Baran
Co-Founder of Cybersecurity News & GBHackers on Security.

 

 

 

 

You may also like

31 comments

Juliet2416 April 23, 2025 - 7:38 am Reply
Emery3368 April 27, 2025 - 1:52 am Reply
Bailey1947 April 27, 2025 - 8:05 am Reply
Layla734 April 28, 2025 - 11:33 pm Reply
Jordyn221 April 29, 2025 - 12:05 pm Reply
Kira3949 May 23, 2025 - 10:36 pm

Good partner program https://shorturl.fm/m8ueY

Reply
Marc3934 May 24, 2025 - 3:27 pm Reply
Lincoln4527 May 25, 2025 - 10:39 pm Reply
Lila3405 May 26, 2025 - 12:34 pm Reply
Ellie4140 May 28, 2025 - 6:33 pm Reply
Leo4417 May 28, 2025 - 7:05 pm Reply
Daphne3457 May 29, 2025 - 12:40 pm Reply
Andrew3384 May 30, 2025 - 7:12 am Reply
Karl3906 May 30, 2025 - 5:43 pm Reply
Marilyn2694 May 30, 2025 - 9:41 pm Reply
Mary172 June 1, 2025 - 11:52 pm Reply
Maxwell472 June 2, 2025 - 6:35 am Reply
Douglas1150 July 17, 2025 - 7:08 am

Maximize your income with our high-converting offers—join as an affiliate! https://shorturl.fm/8xs5E

Reply
Brock4559 July 21, 2025 - 10:47 am Reply
Bernadette3862 July 21, 2025 - 4:23 pm Reply
Duncan2865 July 25, 2025 - 7:46 pm Reply
Florence556 August 2, 2025 - 11:55 pm Reply
Easton3390 August 3, 2025 - 3:13 pm Reply
Steven963 August 6, 2025 - 4:38 pm Reply
Nevaeh3337 August 11, 2025 - 4:48 pm Reply
Abbie2815 August 11, 2025 - 5:42 pm Reply
Aliyah1449 August 19, 2025 - 12:26 pm Reply
Scarlett682 August 23, 2025 - 4:59 pm Reply
Aiden4393 August 25, 2025 - 4:33 am Reply
Nikita4574 September 1, 2025 - 7:16 am Reply
Kirk309 September 9, 2025 - 10:04 am Reply

Leave a Reply to Emery3368 Cancel Reply

This website uses cookies to improve your experience. We will assume you're ok with this, but you can opt-out if you wish. Accept Read More