-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Windows Detections #42
Comments
Could be detections, do you have "Add Windows Defender Exclusions" enabled? I haven't ever really experienced any instability, if I open a bound file with 2 files in it a hundred times then it opens the files correctly every time. Also, if you have a "Start Delay" enabled then there will be a delay. Can you press "Save" in the builder and then zip the .xml file and send it here? |
Is "Run as Administrator" supposed to be disabled? Or are you running it as administrator in some other way?
Which antiviruses runtime scans are you trying to avoid, only Windows Defender or all of them? You should be able to inject a converted python file since it's most likely a native file.
Well antiscan and other no-distribute scanners don't do all scans such as "Cloud Protection" since using them would distribute the file so they're not entirely accurate. Windows Defender usually doesn't ignore exclusions with the exception of being Assembly.Load (because it's in memory) though that can be bypassed by using an AMSI bypass so that shouldn't really be a problem. |
If you inject it then they will see the file that you injected into, since that's the point of injection. You could of course create a "fake" file in the real location and inject into that but that would be a bit reduntant.
If you inject something there it shouldn't really get detected by Windows Defender. |
Well injection is nearly instant so injecting the three programs shouldn't even take a second.
Doesn't really matter usually, but you can do that if you want.
I'm not fully sure how your entire flow is set up, but I don't really understand what you're saying here.
How it is should work fine, I just tested it like it currently is myself and it worked well for me on both my main computer and VM.
For Windows Defender it shouldn't really matter, it doesn't generally detect injections. |
Is it a native application? And is it 32-bit or 64-bit? |
The injector (if you took the one from the miner) is only for 64-bit so make sure that it's built as 64-bit. |
Both probably. |
Yes that seems fine, and you can have a .bat file sure, it would probably help. |
yo btw whats the progress with the clipper and the stealer? |
Now I'm working on the miner again since I got some inspiration from my other projects, but the clipper is basically done though I've gotten quite a few requests not to release it because it would be bad for crypto, and that it's also more malicious in nature compared to everything else I have released. |
Sure, looks good. |
Since you have a try catch inside the functions then they're not really needed outside around the call of the function. It's better to have it inside the function usually since then you only have to do one. |
Sure you can have them there, since you're calling multiple functions but otherwise for the most part you call functions without any arguments. |
Does the converted python program work if you start it normally?
Not sure what you mean, what would the C# DLL do and what tool would you include it in? If you want to include it in a C# program then just make it a resource and then load it, if it's for another language then there are other ways instead (such as using bin2h to make it into a header file for C/C++). |
i meant putting the stealer injection and miner drop in the C# dll itself and then calling the dll function from the "real app" that the victim will download, but idk how to do that without the dll getting flagged or the person thinking its a suspicious dll |
Well, you can embed the DLL into the real app, and then add exclusions in the real app before loading the DLL (might have to use and AMSI bypass first). |
some streamer opened my binded file, the problem was that it seemed that it didnt drop the real app and open it, i guess due to detections? or what could have caused that, he managed to get it to work but he had to open it like 7 times. also what could i do to make it more stabily drop and open process? since it doesnt seem to work or isnt stable this way
The text was updated successfully, but these errors were encountered: