Development on a pause due to personal issues.
elimPawn is a batch-based dropper for sneaky malware, which utilizes the Visual Studio "pre-build setup" in order to run malicious batch code.
/
- Contains all of the pyarmor'd files/EXEs, including the main stealer./DEV/
- Contains all of the files, pre-encoded/pre-obfuscated & encoded/obfuscated.
/elimPawn.py
- The main stealer, pre-var obfuscation, pre-PyArmor/elimPawn-envCheck.exe
- PyArmored environment checker/autosetup.py
- Automatically sets up the stealer/DEV/prePyArmor-elimPawn.py
- Pre-PyArmor stealer/DEV/aware-DEV.py
- Collects information about a system in order to implement it into the environment check./DEV/elimPawn-DEV.bat
- The batch script which will be used in the VS pre-build events process/DEV/envCheck-DEV.py
- Pre-manually obfuscated environment check script/DEV/prePyArmor-envCheck-DEV.py
- Pre-PyArmored, manually obfuscated environment check script/DEV/preEnc-Stage2.ps1
- Pre-encoded stage 2 PowerShell script/DEV/stage2.ps1
- Base64 encoded stage 2 PowerShell script
- [Stage 0 - IP Check]
Checks the IP by comparing the IPs ASN to a list of known bad ASNs, this isn't the best check, but it works for the most part:tm: - if it gets a hit, exits allconhost.exe
,cmd.exe
andpowershell.exe
processes. - [Stage 1 - Elevation]
Elevates the current shell by making and running a VBS script. - [Stage 2 - WinDefender Exclusion]
Excludes theC:\Users\MainUser\AppData\Local
path from Windows Defender using good ole' PowerShell. - [Stage 3 - Environment Check]
Downloads and runs a Python script pre-packaged with PyInstaller and obfuscated using PyArmor, the script checks if it's being ran in a sandbox environment and if there is network debugging, anyone with a brain would be able to bypass this so this should be aimed at dumb people downloading everything off the internet. - [Stage 4 - Payload Drop]
We have now detached from our shitty batch and will run everything from the Python script. The script will drop a secondary payload after all the checks have passed. - [Stage 5 - Execution]
After dropping our payload we will run it as we're already elevated from our command prompt environment.
This is just a proof of concept of how people that think that if it's open source they can simply download the source, look through the code for anything malicious and compile it if they find nothing are dumb (Spoiler alert they never check the pre-build events).