===================================
0x01 工具介绍
laZzzy 是一个 shellcode 加载程序,它演示了恶意软件通常采用的不同执行技术。laZzzy 是使用不同的开源头文件库开发的。
0x02 安装与使用
python3 -m pip install -r requirements.txt
builder.py
并提供必要的数据。(venv) PS C:MalDevlaZzzy> python3 .builder.py -s .calc.bin -p CaptMeelo -m 1 -pp explorer.exe -sp C:\Windows\System32\notepad.exe -d www.microsoft.com -b C:\Windows\System32\mmc.exe
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣀⣀⣀⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣠⣤⣤⣤⣤⠀⢀⣼⠟⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⣿⣿⠀⠀⠀⠀⢀⣀⣀⡀⠀⠀⠀⢀⣀⣀⣀⣀⣀⡀⠀⢀⣼⡿⠁⠀⠛⠛⠒⠒⢀⣀⡀⠀⠀⠀⣀⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⣿⣿⠀⠀⣰⣾⠟⠋⠙⢻⣿⠀⠀⠛⠛⢛⣿⣿⠏⠀⣠⣿⣯⣤⣤⠄⠀⠀⠀⠀⠈⢿⣷⡀⠀⣰⣿⠃⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⣿⣿⠀⠀⣿⣯⠀⠀⠀⢸⣿⠀⠀⠀⣠⣿⡟⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⢿⣧⣰⣿⠃⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⣿⣿⠀⠀⠙⠿⣷⣦⣴⢿⣿⠄⢀⣾⣿⣿⣶⣶⣶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠘⣿⡿⠃⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣼⡿⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀by: CaptMeelo⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⠉⠁⠀⠀⠀
[ ] XOR-encrypting payload with
[ ] Key: d3b666606468293dfa21ce2ff25e86f6
[ ] AES-encrypting payload with
[ ] IV: f96312f17a1a9919c74b633c5f861fe5
[6c9656ed1bc50e1d5d4033479e742b4b8b2a9b2fc81fc081fc649e3fb4424fec ] Key:
[using ] Modifying template
[ ] Technique: Early-bird APC Queue
[ ] Process to inject: None
[ ] Process to spawn: C:\Windows\System32\RuntimeBroker.exe
[ ] Parent process to spoof: svchost.exe
[ ] Spoofing metadata
[ ] Binary: C:\Windows\System32\RuntimeBroker.exe
[ ] CompanyName: Microsoft Corporation
[ ] FileDescription: Runtime Broker
[10.0.22621.608 (WinBuild.160101.0800) ] FileVersion:
[ ] InternalName: RuntimeBroker.exe
[ ] LegalCopyright: © Microsoft Corporation. All rights reserved.
[ ] OriginalFilename: RuntimeBroker.exe
[ ] ProductName: Microsoft® Windows® Operating System
[10.0.22621.608 ] ProductVersion:
[ ] Compiling project
[ ] Compiled executable: C:MalDevlaZzzyloaderx64ReleaselaZzzy.exe
[ ] Signing binary with spoofed cert
[ ] Domain: www.microsoft.com
[2 ] Version:
[33:00:59:f8:b6:da:86:89:70:6f:fa:1b:d9:00:00:00:59:f8:b6 ] Serial:
[ ] Subject: /C=US/ST=WA/L=Redmond/O=Microsoft Corporation/CN=www.microsoft.com
[06 ] Issuer: /C=US/O=Microsoft Corporation/CN=Microsoft Azure TLS Issuing CA
[04 2022 ] Not Before: October
[29 2023 ] Not After: September
[ ] PFX file: C:MalDevlaZzzyoutputwww.microsoft.com.pfx
[ ] All done!
[ ] Output file: C:MalDevlaZzzyoutputRuntimeBroker.exe
0x03 项目链接下载
推荐站内搜索:最好用的开发软件、免费开源系统、渗透测试工具云盘下载、最新渗透测试资料、最新黑客工具下载……
还没有评论,来说两句吧...