Building Malware (reverse shell) using FatRat

Creating encoded Reverse shells with FatRat

  1. Launch Ngrok — Tunneling with Ngrok
  2. Open a terminal and shift to root access
  3. Launch Fatrat by typing fatrat
  4. You will get a warning about not uploading to virustotal (this prevents create a signature for the file)
  5. Press Enter
  6. This will then bring us to the fatrat homepage. For this writeup, we are going to use option 1 Create Backdoor with msfvenom
  7. Next we will want to choose the option for the device we are attempting to gain a reverse shell from. For this writeup we will be using a Windows 10 machine. So Option 2 Windows >> FatRat.exe
  8. This will then ask for the LHOST and LPORT. This is where we want to point our NGROK data to so that this can accessible externally. We will also want to enter the name of the executable as well as the payload we want to work with. The payload will need to match the end target device
  9. This will then encode and create the executable

  10. From here you will want to transfer the executable to the target device. This can be done through phishing, python server, etc
  11. On our test machine, we are going to run the executable. Before running, we want to make sure to setup a listener on our attacker machine. For this we are going to utilize metasploit
  12. launch msfconsole
  13. use the multi/handler module
  14. Set the LHOST to 0.0.0.0
  15. Set the payload to the same payload that was encoded into the executable
  16. When this is setup, we can launch the executable from the target host. Once run, we get a meterpreter session from the listener