-
Notifications
You must be signed in to change notification settings - Fork 792
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Investigate injecting strings into agent binaries #3224
Comments
Signed agent binariesAppending random data to the Windows agent binary may not invalidate the signature.
Source: https://velociraptor.velocidex.com/verifying-executables-on-windows-1b3518122d3c Experimentally, it seems that windows believes the modified binary to be unsigned. While it would be nice for modified binaries to remain signed, this approach is acceptable as long as binaries do not have invalid signatures. |
Spike
Objective
A common way of detecting malware is to search for strings in the binary. It could improve the fidelity of malware emulation if strings (or other data) could be injected into the agent binary at runtime by the island. The objective of this spike is to prototype an approach for injecting data into pyinstaller binaries.
Approach and Considerations
Based on some simple testing, it appears that arbitrary data can be appended to the end of an executable (Linux or Windows) with no ill effects. More thorough testing is required.
Strings should be separated with null characters.
Testing the PoC
Output
A report detailing:
The text was updated successfully, but these errors were encountered: