EAGLE MONITOR RAT REBORN 3.2.1.0 ADVANCED REMOTE ADMINISTRATION TOOL + SOURCE CODE

EAGLE MONITOR RAT REBORN 3.2.1.0 ADVANCED REMOTE ADMINISTRATION TOOL + SOURCE CODE:)

The creator and all those associated with the development and production of this program are not responsible for any actions and or damages caused by this software. You bear the full responsibility of your actions and acknowledge that this software was created for educational purposes only. This software's intended purpose is NOT to be used maliciously, or on any system that you do not have own or have explicit permission to operate and use this program on. By using this software, you automatically agree to the above.

What kind of malware is Eagle Monitor?

Eagle Monitor is the name of a remote access Trojan (RAT) written in C# and Visual Basic programming languages. It allows the attackers to remotely control infected computers. Typically, RATs are used to steal sensitive information, inject additional malware, spy on victims, etc. We have discovered Eagle Monitor on a hacker forum

How did Eagle Monitor infiltrate my computer?

Most cybercriminals use emails, fake updaters, cracked software download pages, and other unreliable sources for downloading files/programs to distribute malware. Either way, their goal is to trick users into downloading and executing malware by themselves.

Emails used to deliver malware contain links or attachments. As a rule, they are disguised as important/urgent letters from legitimate companies. Examples of unreliable sources for downloading files/programs are P2P networks, unofficial pages, third-party downloaders, and free file hosting pages.

Most threat actors attempt to trick users into opening malicious Microsoft Office, PDF documents, JavaScript files, archives like ZIP, RAR (their contents), and executable files.

How to avoid installation of malware?

Do not trust irrelevant and suspicious emails received from unknown addresses. Usually, opening links and files (attachments) presented in such emails leads to computer infections. Also, always use official pages and direct links as sources for downloading software (and files). Avoid using other sources (examples are mentioned in the previous section).

Keep the operating system and installed programs up to date. Update and activate them with tools or functions provided by the official developers. If you believe that your computer is already infected, we recommend running a scan with Combo Cleaner Antivirus for Windows to automatically eliminate infiltrated malware.

 

                        Download :) Click here

Click the Button Below to Download the File.

click here


What's new ?

  • [Beta] Ransomware plugin (RSA 4096 + AES 256)
  • Multiple hosts (and support of dynamic hosts)
  • Offline keylogger fully independant
  • Client built with MSBuild + CSC (instead of patching with DnLib)
  • Directory size in file manager (only top files)

How to Downlaod:)


Eagle Monitor in detail:)

We have found that Eagle Monitor can steal usernames, passwords, and browsing history from Google Chrome (and possibly other) browsers. Also, it can download, rename, delete and execute files stored on the infected computer, and create shortcuts for those files. Its process manager feature allows it to kill, suspend, resume and inject processes (and see the details of the running processes).

Also, Eagle Monitor includes a keystroke logging feature that allows the attackers to record keyboard input (gather data entered with the keyboard) in online and offline modes. Its remote camera and desktop viewer features can capture screenshots and webcam feed. Another feature available in the EagleMonitor is a shellcode injection that can be used to exploit vulnerable programs.

Additionally, the EagleMonitor can hide (and show) the taskbar, change the wallpaper, increase and decrease volume, show and hide desktop icons, and get the CPU information. Also, it can shut down and restart a computer, log out from Windows, launch the BSoD (Blue Screen of Death), lock the screen, etc.

Current features:)

  • Passwords recovery
  • History recovery
  • Autofill recovery
  • Keywords recovery
  • Remote camera viewer (+ save pictures)
  • Remote microphone (auto saved)
  • Remote desktop control (+ save pictures)
  • Remote keyboard
  • Remote mouse
  • Remote chat
  • Remote DotNet Code Execution (VB + C#)
  • Process manager
  • Kill process (native techniques)
  • Suspend process (native techniques)
  • Resume process (native techniques)
  • ShellCode injection (NtWriteVirtualMemory + NtCreateThreadEx)
  • ShellCode injection (NtMapViewOfSection + NtCreateThreadEx)
  • Shutdown system
  • Reboot system
  • Suspend system
  • Hibernate system
  • Log out user
  • BSOD
  • Lock workstation
  • Offline keylogger (automatically saved)
  • Realtime keylogger (automatically saved)
  • Managed pe execution (current process)
  • Unmanaged pe execution (current process)
  • Managed dll execution (current process)
  • Unmanaged dll execution (current process)
  • Shellcode execution (current process)
  • Blur screenlocker
  • Audio up
  • Audio down
  • Hide + show taskbar
  • Hide + show desktop icons
  • Set wallpaper
  • File manager
  • Delete file
  • Download file
  • Rename file
  • Upload file
  • Get information (CPU, hardware, system)
  • Shortcuts (download, desktop and documents paths)
  • Logs (automatically saved)

Notes:)

  • All saved stuff (logs, passwords...) are saved in csv format except offline keylogger
  • All external dlls used are in folder "DLLs + Package"
  • This remote access tool can also be used as stealer & payloads loader.
  • Build the project in "release mode" only (change x64 bit for Server and clients)
  • If you update with installer, you will have to backup your configs + logs (.dat, .json, Logs folder)
  • Under license (AGPL)


*

إرسال تعليق (0)
أحدث أقدم