• XSS.stack #1 – первый литературный журнал от юзеров форума

[source code ] CobaltStrike undetectable loader

В этой теме можно использовать автоматический гарант!

Статус
Закрыто для дальнейших ответов.

ORCA

HDD-drive
Забанен
Регистрация
02.08.2021
Сообщения
30
Реакции
5
Депозит
0.00
Пожалуйста, обратите внимание, что пользователь заблокирован
im selling New loader for cobalt strike, this is another post on an earlier one i have created, but here im talking in details;

1. First ACHLYS detects the environment of the machine its being in, by checking sandboxes and debuggers presents.

2.second when the check succeeded achlys will download a pdf file (u created by a python script that comes with it)
the pdf file is the payload, the reason why its a pdf file is that avs won't even upload to there servers for analysis,
thats bcz it assume its personal information - review kaspersky av for example -

3.then it will start to inject the pdf file into the memory 5 bytes at a time, and not all the shellcodes at once, it will sleep for 1 sec
after each 5 bytes are injected.

4. After the injection succeeds it will sleep again for 10 secs before executing the shellcode.

5.here comes the interesting part:

- when the shellcode is executed it will be mapped as rwx [normal situations], thus some avs can scan it, and some blue teamers tools will too.

- but i made a new way of evading this kind of act, the shellcode will be in rwx for milliseconds only, and that's when cobalt strike
sends the heartbeat [network traffic] ... if it carried a command it will run it, so it won't affect anything.

- achlys will in the time of the dead connection between the server and the client be mapping the shellcode memory part to 'no access', thus it will
prevent any scanning tech for the memory signatures, because there is no such thing as "payload" in memory.

- it will map the shellcode part to rwx when the connection of the server is alive again [by default each 1 min on cobalt]

- so during this 1 min, [by default] the shellcode will be in 'no access' permissions.

- if ur not getting it, we will allow the avs to detect the shellcode only for milliseconds, and since there is many processes, and many other things to scan during
our processes [that's if the av choose us at first] other than our nice shellcode, it's impossible for the av to catch it. [it will have to choose our process and the memory part in which we have the
shellcode located to scan it and get the results in milliseconds - during our heartbeat communication!]

6.in addition to that achlys uses sysalls obtained by hashes during [runtime], thats to bypass edrs / avs so in the code u will not see something as
ntallocatevirtualmemory but instead u will see its hash, plus it will check if these syscalls are hooked and will unhook them.

achlys is sold with a profile, that changes the network traffic signatures.
and with a python file to make ur shellcode a pdf.
and a usage.txt file to know how to build it.

its a [c / cpp / assembly] project and cost 150 $ as [eth or btc] coins.

for any other details, feel free to ask!


the pdf file [which is the payload file; cobalt strike shellcode]:

1628506239826.png

1628506188178.png




If u are interested in a vd clip or u wanna purchase the code, contact me at Mr-ORCA666@protonmail.com
[i will only be selling for 5 other guys now only, and thats to make it last]
 
Последнее редактирование:
Пожалуйста, обратите внимание, что пользователь заблокирован
why the fuck on virustotal?
its the payload lol, the 'pdf' file wont get distributed / analyzed .
cz simply av will mark it as personal data, they cant distribute ur personal data .
 
Пожалуйста, обратите внимание, что пользователь заблокирован
its the payload lol, the 'pdf' file wont get distributed / analyzed .
cz simply av will mark it as personal data, they cant distribute ur personal data .
You are so stupid if you think so. This is one of the masquerading forms: attack.mitre.org/techniques/T1036, and every AV know about this.
I'll probably surprise you now, but AV's at first checking the file content, not extension.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
You are so stupid if you think so. This is one of the masquerading forms: attack.mitre.org/techniques/T1036, and every AV know about this.
I'll probably surprise you now, but AV's at first checking the file content, not extension.
ill send u the same file scan 10 days later, we will see whos the stupid my friend
 
Пожалуйста, обратите внимание, что пользователь заблокирован
im not registered there plus i dont have a jabber, but this is antiscanme scan [at least its free]: https : //antiscan.me/scan/new/result?id=HOxifL5UGhTm
and i know its static scan only, but im not willing to pay 25$ so i can prove something i already know :)
Try to upload your super-dooper undetectable loader with CS shellcode to Dyncheck.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
i suggest you do a runtime at dyncheck, it is a guarantee for anyone that's interested
how do you make CS loader and sell it if you can't afford dyncheck and no jabber))) 10 usd
i send them videos clip, for interested people. or i can send them the exe they can try it .
 
Пожалуйста, обратите внимание, что пользователь заблокирован
im selling New loader for cobalt strike, this is another post on an earlier one i have created, but here im talking in details;

1. First ACHLYS detects the environment of the machine its being in, by checking sandboxes and debuggers presents.

2.second when the check succeeded achlys will download a pdf file (u created by a python script that comes with it)
the pdf file is the payload, the reason why its a pdf file is that avs won't even upload to there servers for analysis,
thats bcz it assume its personal information - review kaspersky av for example -

3.then it will start to inject the pdf file into the memory 5 bytes at a time, and not all the shellcodes at once, it will sleep for 1 sec
after each 5 bytes are injected.

4. After the injection succeeds it will sleep again for 10 secs before executing the shellcode.

5.here comes the interesting part:

- when the shellcode is executed it will be mapped as rwx [normal situations], thus some avs can scan it, and some blue teamers tools will too.

- but i made a new way of evading this kind of act, the shellcode will be in rwx for milliseconds only, and that's when cobalt strike
sends the heartbeat [network traffic] ... if it carried a command it will run it, so it won't affect anything.

- achlys will in the time of the dead connection between the server and the client be mapping the shellcode memory part to 'no access', thus it will
prevent any scanning tech for the memory signatures, because there is no such thing as "payload" in memory.

- it will map the shellcode part to rwx when the connection of the server is alive again [by default each 1 min on cobalt]

- so during this 1 min, [by default] the shellcode will be in 'no access' permissions.

- if ur not getting it, we will allow the avs to detect the shellcode only for milliseconds, and since there is many processes, and many other things to scan during
our processes [that's if the av choose us at first] other than our nice shellcode, it's impossible for the av to catch it. [it will have to choose our process and the memory part in which we have the
shellcode located to scan it and get the results in milliseconds - during our heartbeat communication!]

6.in addition to that achlys uses sysalls obtained by hashes during [runtime], thats to bypass edrs / avs so in the code u will not see something as
ntallocatevirtualmemory but instead u will see its hash, plus it will check if these syscalls are hooked and will unhook them.

achlys is sold with a profile, that changes the network traffic signatures.
and with a python file to make ur shellcode a pdf.
and a usage.txt file to know how to build it.

its a [c / cpp / assembly] project and cost 150 $ as [eth or btc] coins.

for any other details, feel free to ask!


the pdf file [which is the payload file; cobalt strike shellcode]:

Посмотреть вложение 25558
Посмотреть вложение 25556



If u are interested in a vd clip or u wanna purchase the code, contact me at Mr-ORCA666@protonmail.com
[i will only be selling for 5 other guys now only, and thats to make it last]
Придется поднять этот топик.. Ребята ВСЕХ ХОЧУ ПРЕДУПРЕДИТЬ ЧТО ДАНИЙ ТС не дает вам полный обход AV. Да он сделал видео как обходит свою виртуальную машину (Defender), но когда я попросил его полезную нагрузку пройти мою виртуалку то услышал очень тупой ответ мол "я занят, и у меня другой покупатель", также предложил проверку админом но и тут что то пошло не так! Он мне начал затирать что его лоадер криптует мою полезную нагрузку но нифига она не делает. НЕ ЗНАЮ КТО ЧТО ПОКУПАЛ У ДАНОГО ТС, но явно что то не чистое за 150$, прошу 100 раз подумать чем ему писать, он потратил свое и мое время... ВОТ КТО ОБЯСНИТ ПОЧЕМУ НЕ КИНУТЬ МНЕ СВОЮ КРИПТОВАНУЮ ПОЛЕЗНУЮ НАГРУЗКУ И ЗДЕЛАТЬ СКРИНШОТ С МОЕЙ ВИРТУАЛКИ? АДМИНОИ ПРОВЕРКУ ТОЖЕ НЕ ХОЧЕТ ПРОХОДИТЬ, ЯБ НАКАТИЛ БЛЕК НО ОН меня не кинул по факту, но надо гнать таких не до кодеров с форума!!! А кометы людей подставных так как если б он делал полный фуд то оно б не стоило 150$ и умный человек на VT свой продукт не зальет
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Придется поднять этот топик.. Ребята ВСЕХ ХОЧУ ПРЕДУПРЕДИТЬ ЧТО ДАНИЙ ТС не дает вам полный обход AV. Да он сделал видео как обходит свою виртуальную машину (Defender), но когда я попросил его полезную нагрузку пройти мою виртуалку то услышал очень тупой ответ мол "я занят, и у меня другой покупатель", также предложил проверку админом но и тут что то пошло не так! Он мне начал затирать что его лоадер криптует мою полезную нагрузку но нифига она не делает. НЕ ЗНАЮ КТО ЧТО ПОКУПАЛ У ДАНОГО ТС, но явно что то не чистое за 150$, прошу 100 раз подумать чем ему писать, он потратил свое и мое время... ВОТ КТО ОБЯСНИТ ПОЧЕМУ НЕ КИНУТЬ МНЕ СВОЮ КРИПТОВАНУЮ ПОЛЕЗНУЮ НАГРУЗКУ И ЗДЕЛАТЬ СКРИНШОТ С МОЕЙ ВИРТУАЛКИ? АДМИНОИ ПРОВЕРКУ ТОЖЕ НЕ ХОЧЕТ ПРОХОДИТЬ, ЯБ НАКАТИЛ БЛЕК НО ОН меня не кинул по факту, но надо гнать таких не до кодеров с форума!!! А кометы людей подставных так как если б он делал полный фуд то оно б не стоило 150$ и умный человек на VT свой продукт не зальет
i didnt say im busy, i limit sold copies, and i had a better buyer than u, u kept asking stupid questions, the ppl who purchased it knows that it is working, and i dont need ur opinion about it, the only thing i refused to do is giving u a full featured loader with the payload encryption, i gave u a sample that doesn't have the encryption algorithm of the payload file. i even sent u 2 vds, one opening the session and the other spawning another one, but it appears u are just another script kiddie here.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
i didnt say im busy, i limit sold copies, and i had a better buyer than u, u kept asking stupid questions, the ppl who purchased it knows that it is working, and i dont need ur opinion about it, the only thing i refused to do is giving u a full featured loader with the payload encryption, i gave u a sample that doesn't have the encryption algorithm of the payload file. i even sent u 2 vds, one opening the session and the other spawning another one, but it appears u are just another script kiddie here.
да не розказуй а пиздуй с форума, малыш тут только ты, потому что веришь в сказки и тебе пора спать потому что рано в школу...если для тебя глупые вопроси аля "давай у меня на виртуалке твой пейлоад запустим и глянем обойдет ли он windows defender, покупателя у тебя не било, если ты честен с людьми то ты даш или модеру на тест или админу а так ты пустослов. Если ти кодер и уверен в своем продукте тебя не один вопрос не смутит, а давать мне просто программу которая дропает файл я и сам тебе такую напишу.... и за 150 продам
 
По моему очевидный скам, один разговор про пейлоад в пдф только чего стоит ))
 
Пожалуйста, обратите внимание, что пользователь заблокирован
We'll have to raise this topic .. Guys ALL WANT TO WARN THAT DANIUM TS does not give you a complete AV bypass. Yes, he made a video of how he bypasses his virtual machine (Defender), but when I asked his payload to go through my virtual machine, I heard a very stupid answer saying "I'm busy, and I have another buyer", he also suggested checking by the admin, but then something went wrong not this way! He began to overwrite me that his loader crypt my payload, but nifiga it doesn’t. I DON'T KNOW WHO BOUGHT WHAT FROM THIS vehicle, but clearly something is not clean for $ 150, I ask you to think 100 times what to write to him, he spent his and my time ... THAT'S WHO WILL EXPLAIN WHY DON'T SHOW ME YOUR CRYPTED USEFUL LOAD AND MAKE A SCREEN WITH MY VIRTUAL? THE ADMINOI'S CHECKING ALSO DOES NOT WANT TO PASS, YAB BROKEN BLACK BUT HE did not throw me in fact, but it is necessary to drive such not to the coders from the forum !!!
why you not working with guarantee ? put admin between you and him, and no worries later.
 
Статус
Закрыто для дальнейших ответов.
Верх