Hey dudes,
I'm coding a very simple crypter.
This crypter read the bytes from encrypted malware in AES then inject the bytes in memory Calc.exe process, written in Go, so the final malware its fileless.
There are some debugging and VM evasion methods.
Does it enough to be sold?
I'm coding a very simple crypter.
This crypter read the bytes from encrypted malware in AES then inject the bytes in memory Calc.exe process, written in Go, so the final malware its fileless.
There are some debugging and VM evasion methods.
Does it enough to be sold?