{ "command_servers": [ "41.50.73.31:5000" ], "internet_services": [ "monkey.guardicore.com", "www.google.com" ], "keep_tunnel_open_time": 60, "range_class": "RelativeRange", "range_fixed": [ "" ], "blocked_ips": [""], "current_server": "41.50.73.31:5000", "alive": true, "collect_system_info": true, "depth": 2, "dropper_date_reference_path_windows": "%windir%\\system32\\kernel32.dll", "dropper_date_reference_path_linux": "/bin/sh", "dropper_log_path_windows": "%temp%\\~df1562.tmp", "dropper_log_path_linux": "/tmp/user-1562", "dropper_set_date": true, "dropper_target_path": "C:\\Windows\\monkey.exe", "dropper_target_path_linux": "/tmp/monkey", "kill_file_path_linux": "/var/run/monkey.not", "kill_file_path_windows": "%windir%\\monkey.not", "dropper_try_move_first": true, "exploiter_classes": [ "SSHExploiter", "SmbExploiter", "WmiExploiter", "ShellShockExploiter", "ElasticGroovyExploiter", "SambaCryExploiter", ], "finger_classes": [ "SSHFinger", "PingScanner", "HTTPFinger", "SMBFinger", "MySQLFinger" "ElasticFinger", ], "max_iterations": 3, "monkey_log_path_windows": "%temp%\\~df1563.tmp", "monkey_log_path_linux": "/tmp/user-1563", "ms08_067_exploit_attempts": 5, "ms08_067_remote_user_add": "Monkey_IUSER_SUPPORT", "ms08_067_remote_user_pass": "Password1!", "ping_scan_timeout": 10000, "rdp_use_vbs_download": true, "smb_download_timeout": 300, "smb_service_name": "InfectionMonkey", "retry_failed_explotation": true, "scanner_class": "TcpScanner", "self_delete_in_cleanup": true, "serialize_config": false, "singleton_mutex_name": "{2384ec59-0df8-4ab9-918c-843740924a28}", "skip_exploit_if_file_exist": false, "exploit_user_list": [], "exploit_password_list": [], "exploit_lm_hash_list": [], "exploit_ntlm_hash_list": [], "sambacry_trigger_timeout": 5, "sambacry_folder_paths_to_guess": ["", "/mnt", "/tmp", "/storage", "/export", "/share", "/shares", "/home"], "sambacry_shares_not_to_check": ["IPC$", "print$"], "local_network_scan": false, "tcp_scan_get_banner": true, "tcp_scan_interval": 200, "tcp_scan_timeout": 10000, "tcp_target_ports": [ 22, 445, 135, 3389, 80, 8080, 443, 3306, 8008, 9200 ], "timeout_between_iterations": 10, "use_file_logging": true, "victims_max_exploit": 7, "victims_max_find": 30 }