need help with rvn minig : hacking | Torhoo darknet markets
I'm making a silent miner for RVN but there isn't an open source miner there's only Gminer, T-Rex, Nbminer etc but it's closed source and I need a open source project because I need to modify to do process hollowing, GPU limiter etc...
What I can do?
Most silent miners are relying on xmrig for xmr and gminer / nbminer / lolminer for other coins (never heard of T-Rex), the idea is to obfuscate the miner, not to modify it's source code. The only important thing in a "silent miner" is to retrieve and load correctly the actual mining software in memory, without getting detected (It all depends on your spreading technique, but modifying the source isn't a good way to run from AVs, meanwhile a good loading technique is).
If you want to obfuscate / hide the parameters ("-u 0xMyRVNWallet") you can use argument spoofing (usually done by manipulating thePeb->ProcessParameters.CommandLine.Buffer and Peb->ProcessParameters.CommandLine.Length) / remote config files.
why people like you talk for nothing, all this is bs
- but modifying the source isn't a good way to run from AVs, meanwhile a good loading technique is). -
how they gonna understand its a malware if the code is different from the previous, obviously you and OP are dumb and know nothing about it so shutup and go on some research security paper for see how REAL hackers do it.
not with wallet as parameter, the wallet must not be here at all.
Modifying the source code does evade the AV, you are right, but it does it for 3 days, so it's not a good method, where am I wrong?
Changing the code results in different heuristics, so yes you will bypass static, but as long as your loading method is trash, your runtime will be deplorable.
Correct me where I am wrong, how do "real hackers" do it?
"not with wallet as parameter", of course, that's why I said to spoof arguments, how do you parse the pool and wallet settings to the mining software? Does your miner send it into thin air? Are you actually that retarded?
These so called "miners" you see on every forum are a wrapper for the real software that does the mining, so they work pretty similar to a crypter. The stub needs to be good enough to bypass the AV, not the payload (which in this simple case is the mining tool). If you are loading into memory plain payload, but a little bit changed because "oh I modified the code to do X instead of Y" it will take 2 hours at MAX. in the wild to get detected. You want to talk about research? Do this: upload a good loading technique on VT, upload a modified xmrig on VT at the same time. I will promise you that you will get 4 detections max in the first 4 weeks on the loading technique, and 30+ detections on the modified xmrig in the first 3 days.
Not even talking about behavior based which you can't bypass with "small code changes", as the idea itself of paging and using so much resources is pretty suspicious from the start. My suggestion was just: don't spend time on rewriting the miner software, work hard on your loading technique and you will be good to go. Tell me, again, where I am wrong?
Of course it needs parameters as long as you are relying on tools that are made to be customizable, you want to edit the code? Go for it, but most closed source only accept parameters, so you need to work with that. The idea is to adapt not to make it harder for the developer.
Nonetheless, please tell me where I am wrong, and how do real hackers do it, until then you are just unintelligent. This time I really want a talk, so reply with your believes. Thank you.
you readed someone else post and understood everything in the wrong way you have no practical experience and the words you use speak for you, just go check what akamai research tell you and dont try to give me the unintelligent cause you are the dumbass without a mining botnet here and your method dont resolve the fact that those information are still on the machine from 2018 we use proxy that distribute the job into all miner and send share on the server you have such proxy so no parameter at all the proxy is the pool and the wallet can be leaved blank dumbass without experience and neither chatgpt imagining loose so much time for explain nothing cause you dont know how to code and whats a function is
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
"remote config files"... again... Are you retarded?
Proxy doesn't solve arguments, just "moves" them remote, and I already said you can do that.
*The fact that you are using UnamSanctam or some other tool doesn't make you any more capable when discussing on HOW they work, you are seeing the endproduct, he was asking on how to implement it.
no you advised to encrypt and do some weird useless shit for public declare the rvn address then decrypt it on machine while you should ALWAYS HIDE YOUR ADDRESS EVEN XMR SO PROXY SOLVE ARGUMENTS CAUSE YOU DONT NEED THEM ON CLIENT AND AV WILL NOT SAY ANYTHING TO 127.0.0.1
theres no remote config file, nothing is download and using proxy is not same as using a normal config so its not remote config files
kill yourself nigga, i dont even know whats this garbage is UnamSanctam, you seriously doesnt even know how to run a github project? you prooved with your words you know nothing and now you trying to say that i buy software how unintelligent you are
*The fact that you dont know what a proxy and reverse proxy is tell a lot abour your knowledge.
- Reverse proxy hides YOUR panel, doesn't solve arguments from a developer stand point (even if you have remote config, as said before, which will update automatically the bot with the new information you provide). If you are talking about shims (similar to what Rhadamanthys is currently doing to protect their C2), that's just "acts" like a "middleman", as it's easier to switch shims than it is to switch panels, but again, resolves on remote configs.
- Just to make you understand how retarded your comment is: you don't need the wallet on the client. You don't want the wallet on server (remote config). WHERE THE FUCK DO YOU WANT THE WALLET OR THE OTHER SETTINGS (pool/worker name/algo)? Simply put, it's on the remote server, you just never knew it because you think the remote proxy offers the information back to the client, when in reality the reason you make the bot a proxy is to act as the middleman between the backend and your client to mask/reduce outbound connections from network activity (and possibly to chain it).
- The fact that you keep the wallet encrypted and decrypt it at runtime doesn't "hide" the wallet completely, it only "hides" it from static analysis (depending on how good your encryption is...)
- The fact that you say you don't know what UnamSanctam is, but then say "how to run a github project" clearly says that you are using it. Just a heads up: the panel was/is vulnerable (so at least change the favicon to not get your bots "moved" by scanners), that's why most people moved to something else, and the code is insanely trash (no sanity checks, extremely loud system state checks).
So in the end, you are using tools without knowing anything about them, thank you, that's what I wanted to know. Please do not reply, you are too busy scamming kids and infecting highschool teenagers, and I simply don't want to talk to you, m4st3r h@cker.
why you never had a botnet but you know closed source tools that create "hidden silent miner"??? but not a simple proxy from xmrig??? are you a skid and have no shame to demostrate it???
stick ur tongue to someone else ass, you dont know nothing still and you will never, you neither found the akamai research how dumb are you.
you are a retarded with NO experience into this, why you keep talking? dont tell me this is a remote config cause you are a liar, its different and i explained it already.
https://xmrig.com/proxy this is a simple proxy that hide the wallet - name behind the server and is on github, i dont know UnamSanctam sam altman?
and it dont works as you tried to "explain" it lol, its not a proxy on the client its on the server and pool/worker name/algo all are on the server and can be replaced with random things(not the pool) on client
im not using no tool dumb bitch, proxy distribute equally job with specific difficulties anyways you dont know how to code is clear why you tell me im using someone else code, cause you cant do it.
you are stupid , im not.
you dont even understand that a silent miner is different then have a C2, or a loader that get admin privilege then download miner client that connect to the proxy pool.
the encrypted part is not usefull for noone, the wallet and name should NOT be there.
"So in the end, you are using tools without knowing anything about them, thank you, that's what I wanted to know. Please do not reply, you are too busy scamming kids and infecting highschool teenagers, and I simply don't want to talk to you, m4st3r h@cker." YOU CANT EVEN TALK ABOUT YOURSELF HERE YOU ARE JUST JEALOUS AND A BITCH THAT DOESNT UNDERSTAND SHIT AND KEEP TALKING, FIND A WORK.
"the wallet must not be here at all" -> "theres no remote config file" -> "its not a proxy on the client its on the server"
so is it or not a remote config file? xDD
If you want to obfuscate / hide the parameters ("-u 0xMyRVNWallet") you can use argument spoofing (usually done by manipulating thePeb->ProcessParameters.CommandLine.Buffer and Peb->ProcessParameters.CommandLine.Length) / remote config files.
- but modifying the source isn't a good way to run from AVs, meanwhile a good loading technique is). -
how they gonna understand its a malware if the code is different from the previous, obviously you and OP are dumb and know nothing about it so shutup and go on some research security paper for see how REAL hackers do it.
not with wallet as parameter, the wallet must not be here at all.
Changing the code results in different heuristics, so yes you will bypass static, but as long as your loading method is trash, your runtime will be deplorable.
Correct me where I am wrong, how do "real hackers" do it?
"not with wallet as parameter", of course, that's why I said to spoof arguments, how do you parse the pool and wallet settings to the mining software? Does your miner send it into thin air? Are you actually that retarded?
These so called "miners" you see on every forum are a wrapper for the real software that does the mining, so they work pretty similar to a crypter. The stub needs to be good enough to bypass the AV, not the payload (which in this simple case is the mining tool). If you are loading into memory plain payload, but a little bit changed because "oh I modified the code to do X instead of Y" it will take 2 hours at MAX. in the wild to get detected. You want to talk about research? Do this: upload a good loading technique on VT, upload a modified xmrig on VT at the same time. I will promise you that you will get 4 detections max in the first 4 weeks on the loading technique, and 30+ detections on the modified xmrig in the first 3 days.
Not even talking about behavior based which you can't bypass with "small code changes", as the idea itself of paging and using so much resources is pretty suspicious from the start. My suggestion was just: don't spend time on rewriting the miner software, work hard on your loading technique and you will be good to go. Tell me, again, where I am wrong?
Of course it needs parameters as long as you are relying on tools that are made to be customizable, you want to edit the code? Go for it, but most closed source only accept parameters, so you need to work with that. The idea is to adapt not to make it harder for the developer.
Nonetheless, please tell me where I am wrong, and how do real hackers do it, until then you are just unintelligent. This time I really want a talk, so reply with your believes. Thank you.
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
Proxy doesn't solve arguments, just "moves" them remote, and I already said you can do that.
*The fact that you are using UnamSanctam or some other tool doesn't make you any more capable when discussing on HOW they work, you are seeing the endproduct, he was asking on how to implement it.
theres no remote config file, nothing is download and using proxy is not same as using a normal config so its not remote config files
kill yourself nigga, i dont even know whats this garbage is UnamSanctam, you seriously doesnt even know how to run a github project? you prooved with your words you know nothing and now you trying to say that i buy software how unintelligent you are
*The fact that you dont know what a proxy and reverse proxy is tell a lot abour your knowledge.
- Just to make you understand how retarded your comment is: you don't need the wallet on the client. You don't want the wallet on server (remote config). WHERE THE FUCK DO YOU WANT THE WALLET OR THE OTHER SETTINGS (pool/worker name/algo)? Simply put, it's on the remote server, you just never knew it because you think the remote proxy offers the information back to the client, when in reality the reason you make the bot a proxy is to act as the middleman between the backend and your client to mask/reduce outbound connections from network activity (and possibly to chain it).
- The fact that you keep the wallet encrypted and decrypt it at runtime doesn't "hide" the wallet completely, it only "hides" it from static analysis (depending on how good your encryption is...)
- The fact that you say you don't know what UnamSanctam is, but then say "how to run a github project" clearly says that you are using it. Just a heads up: the panel was/is vulnerable (so at least change the favicon to not get your bots "moved" by scanners), that's why most people moved to something else, and the code is insanely trash (no sanity checks, extremely loud system state checks).
So in the end, you are using tools without knowing anything about them, thank you, that's what I wanted to know. Please do not reply, you are too busy scamming kids and infecting highschool teenagers, and I simply don't want to talk to you, m4st3r h@cker.
stick ur tongue to someone else ass, you dont know nothing still and you will never, you neither found the akamai research how dumb are you.
https://xmrig.com/proxy this is a simple proxy that hide the wallet - name behind the server and is on github, i dont know UnamSanctam sam altman?
and it dont works as you tried to "explain" it lol, its not a proxy on the client its on the server and pool/worker name/algo all are on the server and can be replaced with random things(not the pool) on client
im not using no tool dumb bitch, proxy distribute equally job with specific difficulties anyways you dont know how to code is clear why you tell me im using someone else code, cause you cant do it.
you are stupid , im not.
you dont even understand that a silent miner is different then have a C2, or a loader that get admin privilege then download miner client that connect to the proxy pool.
the encrypted part is not usefull for noone, the wallet and name should NOT be there.
"So in the end, you are using tools without knowing anything about them, thank you, that's what I wanted to know. Please do not reply, you are too busy scamming kids and infecting highschool teenagers, and I simply don't want to talk to you, m4st3r h@cker." YOU CANT EVEN TALK ABOUT YOURSELF HERE YOU ARE JUST JEALOUS AND A BITCH THAT DOESNT UNDERSTAND SHIT AND KEEP TALKING, FIND A WORK.
so is it or not a remote config file? xDD