Are you a malware Expert ?
by - Thursday, January 1, 1970 at 12:00 AM
Hello Experts i have a question
how do people encrypt Stealers like Redline ? i dont want tool for that, want to learn it by own
i can bypass AV using metasploit and making my ShellCode runner and using Process Hollowing

or patching amsi and etc ..

what about c# tools such us stealers ?
Reply
(June 21, 2022, 06:17 PM)IBMleaker Wrote: Hello Experts i have a question
how do people encrypt Stealers like Redline ? i dont want tool for that, want to learn it by own
i can bypass AV using metasploit and making my ShellCode runner and using Process Hollowing

or patching amsi and etc ..

what about c# tools such us stealers ?


https://github.com/rootpencariilmu/Redlinestealer2020
Don't be that guy
Reply
(June 21, 2022, 06:22 PM)Th3leecher Wrote:
(June 21, 2022, 06:17 PM)IBMleaker Wrote: Hello Experts i have a question
how do people encrypt Stealers like Redline ? i dont want tool for that, want to learn it by own
i can bypass AV using metasploit and making my ShellCode runner and using Process Hollowing

or patching amsi and etc ..

what about c# tools such us stealers ?


https://github.com/rootpencariilmu/Redlinestealer2020
Don't be that guy

i did not understood, i gave redline as example many stealers out their
Reply
hello,

your question is not clear , however..

there are two stages for bypassing AV , stage 1 is using static analysis how AV works
by knowing so , you can iject a fake certificate and injected an ms dll file... etc

by doing so you are in the white list for anything.

stage two , dynamic analysis , by doing so , you can bypass your AV/IDS/IPS by using an encryption gateway such as black hole and blue sky made by the NSA

using the right tool , by mixing the malware into an app / header / process its a vanity

please ask a specific question
Reply


 Users viewing this thread: Are you a malware Expert ?: No users currently viewing.