Detailed Features
1. Hosting and Server Deployment
Supreme Studio v1.0 is designed to be installed on a hosting or server environment to manage its operations remotely. Users are advised to avoid free hosting services due to bans triggered by the tool’s malicious scripts. Instead, premium cloud platforms like Amazon Web Services (AWS), Google Cloud Platform, or Microsoft Azure are recommended for stability and to evade detection. The setup process involves:
- Uploading the panel to the chosen server.
- Creating a new database and user, then importing predefined tables.
- Configuring the panel via the app/config.php file, where the admin panel password must be converted to an MD5 hash for authentication.
This deployment method allows the attacker to control the malware remotely, managing infected devices and mining operations through a centralized interface.
2. Loader Functionality
The loader component of Supreme Studio v1.0 is responsible for delivering the malicious payload to target devices. It facilitates the initial infection, enabling the miner to be installed and executed without the user’s knowledge. The loader is designed to exploit vulnerabilities or rely on social engineering to infiltrate systems. Once executed, it establishes a connection to the attacker’s server, allowing the panel to manage the infected device as part of a botnet. The exact mechanisms of the loader are not detailed in the sources, likely due to the secretive nature of such tools, but it is implied to be a critical component for spreading the miner.
3. Cryptocurrency Miner (Supreme Miner ++)
The miner, branded as "Supreme Miner ++," is the core payload that utilizes the infected device’s CPU or GPU to mine cryptocurrencies, likely Bitcoin or other supported coins. Key characteristics include:
- Covert Operation: The miner runs in the background, consuming system resources without user consent. After an unspecified period post-infection, a notification about "Supreme Miner ++" appears on the target device’s desktop, indicating its presence, which suggests a lack of stealth in some cases.
- Complex Settings: The miner’s configuration settings are housed within the panel’s settings section, but they are poorly documented and reportedly difficult to understand, even for those deploying the tool. This complexity may limit its effectiveness or customization.
- Resource Intensive: As a cryptocurrency miner, it leverages the infected system’s computational power, potentially causing performance degradation, increased power consumption, and hardware strain.
4. Botnet Capabilities
Supreme Studio v1.0 operates as a botnet, allowing the attacker to control multiple infected devices through the panel. The botnet structure enables:
- Remote management of infected systems, including issuing commands for mining or other tasks.
- Potential for multi-user access to the panel, as suggested by community discussions, though this feature is unconfirmed and lacks detailed documentation.
- Scalability, as the panel can handle infections across numerous devices, depending on the server’s capacity.