There are many different types of RATs, but those that run on Windows computers are common. paradoxiaRAT is one of them.
Windows Remote Access Trojans (RATs) are a class of malicious software typically installed on the victim’s computer through a variety of means, such as exploiting a vulnerability in an application or tricking the victim into clicking links in spam email messages. Once installed, the RAT gives the attacker the ability to control and monitor the infected computer remotely.
Easy to use
Paradoxia is extremely easy to use, So far the easiest rat!
Automatic Client build
Build Paradoxia Client easily with or without the icon of your choice.
Multithreaded Console server, You can get multiple sessions.
Desktop notification on new session
Configurable values in paradoxia.ini
Kill Sessions without getting in session.
View Session information
View Session information without getting in Session.
Runs in background.
Full File Access
Full access to the entire file system.
Installs inside APPDATA and has startup persistence via Registry key.
Upload / Download Files
Upload and download files.
Chrome Password Recovery
Dump Chrome Passwords using Reflective DLL (Does not work on latest version)
Log Keystrokes and save to file via Reflective DLL.
Geolocate Paradoxia Client.
Get Process information.
Reflective DLL Injection over Socket, Load your own Reflective DLL, OR use ones available here.
Power off the Client system.
Reboot the client system.
MSVC + MINGW Support
Visual studio project is also included.
Stable Reverse Shell.
Maximum size is 30kb without icon.
Installation (via APT)
git clone https://github.com/quantumcored/paradoxiaRAT
chmod +x install.sh
sudo python3 paradoxia.py
Once in paradoxia Console, The first step would be to build the Client, Preferably with an Icon.
After that’s built, As you can see below it is detected by Windows Defender as a severe malware. Which is expected since it IS malware.
I’m going to transfer the client on a Windows 10 Virtual machine and execute it. After Executing it, It appears under Startup programs in task manager.
Also it has copied itself inside Appdata directory and installed under the name we specified during build.
First thing I’d do is get in the session and view information.
There are plenty of things we can do right now, but for example only, I will demonstrate keylogging.
You can see in the image above that It says it successfully injected dll, And in file listing there is a file named log.log, Which contains the logged keystrokes.
Lets view captured keystrokes.
The Developer is not responsible for any misuse of Damage caused by the program. This is created only to innovate InfoSec and YOU.