• XSS.stack #1 – первый литературный журнал от юзеров форума

IORI_Loader - Bypass EDRs

xmyriy

HDD-drive
Пользователь
Регистрация
18.01.2020
Сообщения
46
Реакции
35
FUD advanced Loader implementing dynamic indirect syscall with syscall number and syscall instruction Unhooking with Halosgate technic. Shellcode in UUIDs format to avoid static analysis, syscall instructions and syscall number don't exist in the binary opcode which makes it avoid static analysis and they get resolved at run time. also it gets the API addresses from the PEB by offsets and the comparison is done by hashing.

 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх