Go to file
Daniel Ballard a599792cbe
Merge pull request #5 from vikingSec/feat_cmdlineFile
Adding the ability to pass the EXE name as a commandline argument.
2024-07-15 22:33:11 +01:00
crypt Adding the ability to pass the EXE name as a commandline argument. I like this better than having a hardcoded exe name 2024-07-15 10:43:28 -05:00
stub Adding the ability to pass the EXE name as a commandline argument. I like this better than having a hardcoded exe name 2024-07-15 10:43:28 -05:00
.gitignore Adding the ability to pass the EXE name as a commandline argument. I like this better than having a hardcoded exe name 2024-07-15 10:43:28 -05:00
LICENSE Initial commit 2023-05-17 00:32:30 +01:00
README.md Adding the ability to pass the EXE name as a commandline argument. I like this better than having a hardcoded exe name 2024-07-15 10:43:28 -05:00

Rust Crypter

x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec

Usage

  1. Put your Portable Executable in /crypt/
  2. In /crypt/ cargo run <name_of_pe.exe> (will output encrypted_bytes.bin and key.txt)
  3. move encrypted_bytes.bin and key.txt to /stub/src/
  4. In /stub/ cargo build --target x86_64-pc-windows-gnu --release or build without --release to keep debug symbols
  5. compiled exe will be in /stub/target/debug/ named "stub.exe"

Supported targets

  • Windows x86-64
  • Windows x86

Limitations

  • .NET not supported
  • Files over 600MB not supported

TODO

  • File dialogue choose file instead of renaming code strings/executable names
  • Automatically move encrypted bytes and key into stub for compiling
  • GUI
  • Obfuscated Strings

Disclaimer

This is a tool used to test the Static + Dynamic detection capabilites of AV and EDR, use of this project is at your own risk

MITRE TTPs (Indicators)

  • User Execution: Malicious File T1204.002
  • Deobfuscate/Decode Files or Information T1140
  • Embedded Payloads T1027.009
  • System Checks T1497.001
  • Reflective Code Loading T1620
  • Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder T1547.001

References

https://crates.io/crates/memexec https://crates.io/crates/inside-vm