• XSS.stack #1 – первый литературный журнал от юзеров форума

Trojan Filetype??

GGHTC

RAM
Забанен
Регистрация
30.04.2023
Сообщения
127
Реакции
8
Пожалуйста, обратите внимание, что пользователь заблокирован
Hi,
After Macros and stuff dont work anymore i wanna know what i can use as a first trojan to execute a cmd command for example.
I know about hta´s etc but they are suspicious and well known.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Hi,
After Macros and stuff dont work anymore i wanna know what i can use as a first trojan to execute a cmd command for example.
I know about hta´s etc but they are suspicious and well known.
750mb exe ;)
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Smartscreen etc? I need something that you could attach to gmail
Hm, i never personally used pumping methods, but as I know 750mb file in zip will b compressed, the zip will be something about 2mb, set password on it (any simple, 123 is would be good too), and you are ready to go :)
Write me in pm if need any more help.
P.S. AVs are not scanning big files, it SHOULD not trigger Smartscreen.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Hm, i never personally used pumping methods, but as I know 750mb file in zip will b compressed, the zip will be something about 2mb, set password on it (any simple, 123 is would be good too), and you are ready to go :)
Write me in pm if need any more help.
P.S. AVs are not scanning big files, it SHOULD not trigger Smartscreen.
tnx buut exe looks reallyyy malicious
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Пожалуйста, обратите внимание, что пользователь заблокирован
SmartScreen has nothing to do with file detection. It's all about a unsigned or signed file with a non trusted certificate being downloaded from the web.

To bypass that in direct binaries, you will have to use a signed .exe file with a trusted cert or using a legit .exe and dll sideloading for example OR using something as a first stage like .lnk that will use native trusted binaries already on the machine(LOLBINS) to start the execution chain.

Using vbs or jscript for example, even with the file clean, will show the MOTW warning + the user has to already have chosen to execute this type of scripts before.

And file pump is skid stuff.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
SmartScreen has nothing to do with file detection. It's all about a unsigned or signed file with a non trusted certificate being downloaded from the web.

To bypass that in direct binaries, you will have to use a signed .exe file with a trusted cert or using a legit .exe and dll sideloading for example OR using something as a first stage like .lnk that will use native trusted binaries already on the machine(LOLBINS) to start the execution chain.

Using vbs or jscript for example, even with the file clean, will show the MOTW warning + the user has to already have chosen to execute this type of scripts before.

And file pump is skid stuff.
You'r right.
But do you think that for casuall spreading getting an cert is a good idea? You will burn it fast.
 
You'r right.
But do you think that for casuall spreading getting an cert is a good idea? You will burn it fast.
I only use certs in very specific cases.

For more casual campaigns I don't think is needed if you use the others alternatives I said above. Also for the sake of saving money, if you don't have the resources.
 
Usually I use something like this. Containerize the malware in ISO to get through from MOTW. A .LNK file masquerading as a PDF that does 2 things. One, it executes a hidden implant with hidden attribute set inside the ISO. Two, it deploys the decoy PDF so the target doesnt suspect anything. This is still a bit meh. You can use sideloading in here as well. There are some new research on ClickOnce applications as well. You can check that out. What marauda18 said is also pretty good.
 
You'r right.
But do you think that for casuall spreading getting an cert is a good idea? You will burn it fast.
if youre lucky you can probably find leaked certificates. but its a really hectic process. i havent been able to find one either but i havent looked too much. you can try.
 
There are tons of ways to get your payload through! Try putting a decoy in a zip (like a .LNK payload)!
 
SmartScreen has nothing to do with file detection. It's all about a unsigned or signed file with a non trusted certificate being downloaded from the web.

To bypass that in direct binaries, you will have to use a signed .exe file with a trusted cert or using a legit .exe and dll sideloading for example OR using something as a first stage like .lnk that will use native trusted binaries already on the machine(LOLBINS) to start the execution chain.

Using vbs or jscript for example, even with the file clean, will show the MOTW warning + the user has to already have chosen to execute this type of scripts before.

And file pump is skid stuff.
legit.exe still got motw when being download from non official domain. And how is it possible to pack the dll with the exe in a way the victim not seeing the dll ?
 
legit.exe still got motw when being download from non official domain. And how is it possible to pack the dll with the exe in a way the victim not seeing the dll ?
Some cases we have see with success has the user download a "installer" zip. Sometimes, installers come with MANY files and folders...simply hijack the legit binary with one of your DLLs in the folder. They will not notice if there are many other files (READMEs, 'configs', etc.)
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх