I am happy that my GitHub Repo on Stuxnet has been helpful in the research paper by McDougall & Ugas.
It's been a nice journey, even though I still needed to take breaks, it was fun so it was "sort of" like a break for me. It was, basically - what kept me going! I hope to contribute more to this field.
Yours sincerely,
Will
This is now done! Which is why I am archiving this.
Please see the THANKS_TO.md
file for people I consider helpful in building this repo!
- Introduction
- Malware Samples
- Related Malware
- Stuxnet Overview
- Tree Overview
- Acknowledgments
- Password for Encrypted Files
Stuxnet is a worm (malware) that targeted industrial control systems, specifically power plants. That's Stuxnet in a nutshell.
This repository is a collection of Stuxnet-related files I have gathered from various sources to make it more accessible for researchers and antivirus developers. The repository includes:
- Source files
- Binaries
- PLC Sample Programs
Finding actual samples of Stuxnet and related malware is relatively easy. However, finding de-obfuscated, analyzed outputs, memory dumps, etc., is difficult. This repository aims to fill that gap.
For the malware itself, please visit only_malware.
- If you see
need PK compat. v5.1 (can do v4.6)
, you need to installengrampa
on Linux. I use Qubes for malware and Engrampa to pack infected archives.
- Brutal Kangaroo
- Fanny.bmp - the Precursor/Derivative to Stuxnet
- nls_933w.dll file
- Gauss
- FlamER
Stuxnet is a worm that attacked nuclear power plants through unusual vulnerabilities, known as 0-day vulnerabilities.
Includes:
- Source files (PLC, etc.)
- Binaries (malware, etc.)
- PLC Sample Programs
Fanny (known as fanny.bmp or the classical a, b, c, d, e, ..., j.lnk worm) is malware likely not visible on Windows XP and earlier versions. It propagates through removable USB devices, using a sophisticated rootkit that hides itself and adds itself to startup in the Windows registry. It also has the capability to reprogram hardware, such as HDD firmware, for extreme persistence. It exploited the same vulnerabilities as Stuxnet and was used before Stuxnet.
🌻Click to Expand Tree
Special files |
---|
PLC_ROOTKIT |
STUXNET.DLL_EMBEDDED_RSRCS:
File Name |
---|
bin201.bin |
bin202.bin |
bin203.bin |
bin205.bin |
bin208.bin |
bin209.bin |
bin210.bin |
bin221.bin |
bin222.bin |
bin240.bin |
bin241.bin |
bin242.bin |
bin250.bin |
STEP7:
File Name |
---|
STL-cheat-sheet-by-category.pdf |
STL-cheat-sheet-by-alphabet (1).pdf |
S_ST70_XX_00030V.TIF |
SIMATIC_STEP7_Basic_software.jpg |
HW_e.gif |
25209116_STEP7Example.zip |
BINS:
File Name |
---|
'~WTR4141_J_37FC7C5D89F1E5A96F54318DF1A2B905.dll' |
wincc_kernel32.dll.aslr.00013b86.livebin.exe |
unknown_hook_in_services_memorymod-0x006b0000-0x006b1000.livebin.exe |
S_D102BDAD06B27616BABE442E14461059 |
R_98FBEBD8883021FBE6464C37ACF17938 |
Q_C1CB4117D9998C79AE10C1B890C23A4D |
P_F9BAE53E77B31841235F698955AECE30.dll |
O_CC1DB5360109DE3B857654297D262CA1.dll |
N_CA9EABEAB482524E5797C684398335D5 |
mrxnet.sys.livebin.exe |
mrxnet.sys.593503354.mapped.livebin |
mrxcls.sys.livebin.exe |
mrxcls.sys.1278394761.mapped.livebin |
memorymod-pe-0x10000000-0x10138000.1155327658.mapped.livebin |
memorymod-pe-0x00090000-0x0010a000.1990061290.mapped.livebin |
memorymod-0x006b0000-0x006b1000.450210202.mapped.livebin |
maindll_dropper_memorymod-pe-0x10000000-0x10138000.livebin.exe |
M_1E17D81979271CFA44D471430FE123A5 |
lsass.exe.1373553098.mapped.livebin |
lsass2_memorymod-pe-0x00090000-0x0010a000.livebin.exe |
lsass1_lsass.exe.livebin.exe |
L_4589EF6876E9C8C05DCF4DB00A54887B |
kernel32.dll.aslr.00013b86.1616636409.mapped.livebin |
K_055A3421813CAF77E1387FF77B2E2E28 |
I_F8153747BAE8B4AE48837EE17172151E |
H_A3844A1B6BE3F6FAF9C276858F40960 |
G_F979C6A3E668C5073C4C6506461B034E |
F_335707EABBE7FF256E0650432ACCEC9B |
E_789F6F8DE3F140CF5D73BEF0B8ABAF78 |
desktop.ini |
D_7A4E2D2638A454442EFB95F23DF391A1 |
C_016169EBEBF1CEC2AAD6C7F0D0EE9026 |
B_74DDC49A7C121A61B8D06C03F92D0C13 |
A_30DF51C9F0D9B010350DC09ABE1E4E97.ex$ |
I also want to extend my gratitude to the reverse engineers of the tools that have been essential for my analysis, including:
Fyyre for their repositories, DrvMon and kerneldetective.
Mandiant for their tool flare-floss.
Your contributions have been instrumental in my research.
Yours sincerely,
Will
If you still are sure you want to explore it, below is a clickable element that will display the password to the archive. When you do, no guarantees. Aka you are on your own.
🔒I am sure, I am on my own
- INFECTEDIKNOWWHATIAMDOING
- infected
// notes
If you see a lot of `$\textcolor{red}{\...`, you need to enable JavaScript. It's just red text.