Xcode - The tool, which is designed on the TRACER FIRE, represents a macro "virus" for Microsoft Office documents.

Xcode – The tool, which is designed on the TRACER FIRE, represents a macro “virus” for Microsoft Office documents.

This tool / software is made in purpose of education ONLY, usage of it is at Your own risk and responsibility. All possible damage made to Your computer or third party by using any part or whole of this tool / software is at Your own responsibility.
What is the Xcode:
The tool, which is designed on the TRACER FIRE, represents a macro “virus” for Microsoft Office documents whose purpose is by launching Microsoft Office document with the victim’s computer takes over logs, passwords, files and submit them to the attacker server. The tool is designed for educational purposes only. TRACER FIRE is made by the development team JTRIG (Joint Threat Research Intelligence Group), which is a unit of Government Communications Headquarters (GCHQ), the British intelligence agency [33] The existence of TRACER FIRE is not officially confirmed, but according to documents released publicly by Edward Snowden [34] such a tool exists. The author of this work is reading the description of the tools presented in the above PDF file, got the idea to create a tool that would have the same outcome. The software used to extract information is NIR Soft Web Browser Pass View [35]. It is a console and graphical tool that can extract history, user names and passwords from all popular Web Browser. EXE file is transcoded in base64 and as such has been included in the macro that is implemented in a Word document. Since VBA script that was used to write this tool has a limit on the number of characters in a row, so this tool has to abide this restriction, so transcoding divided by the number of characters in a row. For every 512 encoded characters is a new row or a new variable.

The tool, which is designed on the TRACER FIRE, represents a macro "virus" for Microsoft Office documents whose purpose is by launching Microsoft Office document with the victim's computer takes over logs, passwords, files and submit them to the attacker server.

The tool, which is designed on the TRACER FIRE, represents a macro “virus” for Microsoft Office documents whose purpose is by launching Microsoft Office document with the victim’s computer takes over logs, passwords, files and submit them to the attacker server.

EXE document is changed by adding additional content to the end of the file, analogous to the method described in Chapter 5, but additionally packaged exe archiver UPX [36]. The content is added to avoid detection of Web Browser Pass View software by anti-virus, because almost all the known detected as spam software. A Ultimate Packer for executable (UPX) is used to EXE file size as much decreased. The reason of using NIR soft tools is that this tool proof of concept, ie detection of NIR soft tools by antivirus software could be bypassed by making a VBA script written by an analogous procedure that would work like NIR soft tools.

xcode:The tool, which is designed on the TRACER FIRE, represents a macro "virus" for Microsoft Office documents whose purpose is by launching Microsoft Office document with the victim's computer takes over logs, passwords, files and submit them to the attacker server.

xcode:The tool, which is designed on the TRACER FIRE, represents a macro “virus” for Microsoft Office documents whose purpose is by launching Microsoft Office document with the victim’s computer takes over logs, passwords, files and submit them to the attacker server.

This Microsoft Word document is executed in full only on Windows operating systems. In order to achieve complete coverage of all the Office tools such as Libre Office, Open Office, Microsoft Office for OS X will be necessary to write in the appropriate script language, as well as paths to adjust operating systems, but also to adapt the procedure for extracting the operating system or make tool analogous NIR soft for Linux and OS X. and use the appropriate software to the appropriate operating system.

Download : Master.zip  | Clone Url
Source : https://github.com/dpanic