You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jul 20, 2024. It is now read-only.
There seems to be two issues with the way the PrependBytes functionality works within the aggressor script:
The prependBytes call is happening before the modification of the MZ header. As a result, the first 4 bytes prepended will always be overwritten
When calling prependBytes, it seems to be breaking something within the way BokuLoader works, which results to the original reflective loader being loaded. For this one, not entirely sure why it happens as the code running after it doesn't seem to affect it.
How to replicate the issue:
Edit BokuLoader.cna
Go to line 1032 and uncomment the call to prependBytes
Go to line 431 and add 4 characters at the start of the $Nops variable (e.g. "AAAAPS[X"). This is due to the fact that they will be overwritten by the magic_mz
Thank you for the descriptive issue post!
There was some issue with parsing the beacons for the obfuscation and I think that is what is breaking it. I haven’t had time to look into this.
Feel free to send a pull request to fix. Alternatively you can just build the beacon shell code and prepend the bytes on the command line
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Hi,
There seems to be two issues with the way the PrependBytes functionality works within the aggressor script:
How to replicate the issue:
https://github.com/elastic/protections-artifacts/blob/main/yara/rules/Windows_Trojan_CobaltStrike.yar
Example output before and after uncommenting prepend:
The text was updated successfully, but these errors were encountered: