Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AV prevents execution #3

Open
passwordleak opened this issue Jan 15, 2018 · 2 comments
Open

AV prevents execution #3

passwordleak opened this issue Jan 15, 2018 · 2 comments

Comments

@passwordleak
Copy link

passwordleak commented Jan 15, 2018

o.CreateInstance(entry_class);

It's prevented from executing because of the string "EmpireHost." I tried with a different string and it seems to work.

I suggest instead of releasing the output as the code, release the entire setup, so we can generate our own payloads with randomized entry class names. Or maybe there is an even better way of dynamically generating the entry class? Perhaps this is outside of the scope for the project...

Using Symantec Endpoint Protection.

@sharpbazil
Copy link

What was used to generate the embedded empire host? What was fed into DotNetToJscript?

@thehillionaire
Copy link

Hey @passwordleak what command did you use to deserialize the script?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants