Arsenal: Bypass EDR’s/XDR’s and make malware analysis harder

(Direct Syscalls, Sandbox Bypass, API Hashing, AES Encryption)

Introduction

Defense Evasion Arsenal

Defined Procedures
Functions to resolve direct syscalls numbers
Calling with same names as ntdll.dll defined
STATIC ANALYSIS (API CALLS)
AES Encryption in c++
Sandboxes bypass techniques
Random Procedures Names
RANDOM NAMES IN PROTOTYPES
Random function names
Difficult to understand
No Imports and string searches
Windows defender bypassed
Payload in explorer.exe
https://antiscan.me/scan/new/result?id=DpzbbuU1wnXV
Convert exe into shellcode
Execution of Dumpert using Process Injection
Memory Dumps

Author:

--

--

Cytomate emulates, assesses, and validates the most recent attack tactics used by Advanced Persistent Threats (APTs).

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Cytomate

Cytomate emulates, assesses, and validates the most recent attack tactics used by Advanced Persistent Threats (APTs).