Skip to content
/ elimPawn Public

A batch-based dropper for sneaky Visual Studio Prebuild Event malware - educational purposes only.

Notifications You must be signed in to change notification settings

Ixve/elimPawn

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

34 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Dev Pause

Development on a pause due to personal issues.

elimPawn

elimPawn is a batch-based dropper for sneaky malware, which utilizes the Visual Studio "pre-build setup" in order to run malicious batch code.

File Structure

  • / - Contains all of the pyarmor'd files/EXEs, including the main stealer.
  • /DEV/ - Contains all of the files, pre-encoded/pre-obfuscated & encoded/obfuscated.

Files

  • /elimPawn.py - The main stealer, pre-var obfuscation, pre-PyArmor
  • /elimPawn-envCheck.exe - PyArmored environment checker
  • /autosetup.py - Automatically sets up the stealer
  • /DEV/prePyArmor-elimPawn.py - Pre-PyArmor stealer
  • /DEV/aware-DEV.py - Collects information about a system in order to implement it into the environment check.
  • /DEV/elimPawn-DEV.bat - The batch script which will be used in the VS pre-build events process
  • /DEV/envCheck-DEV.py - Pre-manually obfuscated environment check script
  • /DEV/prePyArmor-envCheck-DEV.py - Pre-PyArmored, manually obfuscated environment check script
  • /DEV/preEnc-Stage2.ps1 - Pre-encoded stage 2 PowerShell script
  • /DEV/stage2.ps1 - Base64 encoded stage 2 PowerShell script

Stages

  • [Stage 0 - IP Check]
    Checks the IP by comparing the IPs ASN to a list of known bad ASNs, this isn't the best check, but it works for the most part:tm: - if it gets a hit, exits all conhost.exe, cmd.exe and powershell.exe processes.

  • [Stage 1 - Elevation]
    Elevates the current shell by making and running a VBS script.

  • [Stage 2 - WinDefender Exclusion]
    Excludes the C:\Users\MainUser\AppData\Local path from Windows Defender using good ole' PowerShell.

  • [Stage 3 - Environment Check]
    Downloads and runs a Python script pre-packaged with PyInstaller and obfuscated using PyArmor, the script checks if it's being ran in a sandbox environment and if there is network debugging, anyone with a brain would be able to bypass this so this should be aimed at dumb people downloading everything off the internet.

  • [Stage 4 - Payload Drop]
    We have now detached from our shitty batch and will run everything from the Python script. The script will drop a secondary payload after all the checks have passed.

  • [Stage 5 - Execution]
    After dropping our payload we will run it as we're already elevated from our command prompt environment.

Educational Purposes Only

This is just a proof of concept of how people that think that if it's open source they can simply download the source, look through the code for anything malicious and compile it if they find nothing are dumb (Spoiler alert they never check the pre-build events).

About

A batch-based dropper for sneaky Visual Studio Prebuild Event malware - educational purposes only.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published