Hey, i share my downloader, i make it for fun and instructive purpose;
my downlader just use UrlDownloadToFile and CreateProcess, all dynamcally for bypass some avs. I could have use the PEB to perfom a better downloader but im lazy :].
Posted 25 October 2013 - 07:26 AM
Hey, i share my downloader, i make it for fun and instructive purpose;
my downlader just use UrlDownloadToFile and CreateProcess, all dynamcally for bypass some avs. I could have use the PEB to perfom a better downloader but im lazy :].
Posted 25 October 2013 - 06:51 PM
Nice contribute. Just so you know this isn't dynamic since the API addresses are still hard-coded.
Posted 25 October 2013 - 08:09 PM
They are not hard-coded, and this is dynamic because the functions used are not reported in the IAT, unless GetProc & LoadLibrary, but i could have use PEB to hide them.
Hard-coded suppose the addresses are already known (not in this case), and in other words it's impossible to known in advance the addresses, (ASLR) every reboot the DLL/EXECUTABLE change their execution addresses.
Posted 25 October 2013 - 09:09 PM
EpicOut, on 25 Oct 2013 - 8:09 PM, said:
They are not hard-coded, and this is dynamic because the functions used are not reported in the IAT, unless GetProc & LoadLibrary, but i could have use PEB to hide them.
Hard-coded suppose the addresses are already known (not in this case), and in other words it's impossible to known in advance the addresses, (ASLR) every reboot the DLL/EXECUTABLE change their execution addresses.
I meant for if you were to turn this into a shellcode, the addresses for GetProcAddresses and LoadLibraryA would be static. Sorry I completely forgot to finish my comment before I posted it Since you are creating an executable and not just a binary, you can use Invoke instead of directly calling them from Kernel32.
![]() |
Malware Analysis & Reverse Eng. →
Malware Samples →
Very first cross platform open source RAT still under development !!!! :)Started by Hess , 07 Nov 2013 ![]() |
|
![]()
|
![]() |
Malware Analysis & Reverse Eng. →
Malware Samples →
![]() Sakura Exploit KitStarted by Hess , 07 Nov 2013 ![]() |
|
|
![]() |
source
Programming →
Basic →
Resources →
![]() [VB6] BVNC - Blosh's VNC Scanner - 1.0Started by BlosheRoca , 05 Nov 2013 ![]() |
|
|
![]() |
Malware Analysis & Reverse Eng. →
Malware Samples →
![]() Some HTML KeyloggerStarted by Hess , 04 Nov 2013 ![]() |
|
|
![]() |
Programming →
C & C++ →
Resources →
Plain C & Win32 - Playing with windowsStarted by testacc , 02 Nov 2013 ![]() |
|
|