AtomLdr: An advanced DLL loading tool with evasion features

0 25
1. Independent CRT library;2. The final DLL file can run the Payload by loading...

AtomLdr: An advanced DLL loading tool with evasion features

1. Independent CRT library;

2. The final DLL file can run the Payload by loading the DLL (executing its entry point) or by executing the exported 'Atom' function via the command line;

3. The DLL unhooks from the \KnwonDlls directory and does not have an RWX field;

4. The encrypted Payload is stored in the resource field and can be retrieved through custom code;

5. The Payload is encrypted using AES256-CBC;

6. AES key and IV encryption;

7. Indirect system calls are used with ROP gadgetsHellHall

8. Payload injection is implemented using APC call;

9. Payload execution is implemented using APC;

10. Two different CRC32 string hash algorithms are used to implement API hash;

11. The entire tool code mentions very little;

Working mechanism

Tool download

Researchers can use the following command to clone the source code of this project locally:

git clone https://github.com/NUL0x4C/AtomLdr.git

Tool usage

1.PayloadBuilderIt needs to compile and execute with the specified Payload, which will output a PayloadConfig.pc file containing the encrypted Payload and its encryption key and IV;

2. The generated PayloadConfig.pc file needs to replace the【PayloadConfig.pc】;

3. Compile the AtomLdr project into an x64 version;

4. To enable debug mode, please select【Here】Uncomment here;

Tool usage examples

Example 1

Execute AtomLdr.dll, run rundll32.exe, runHavocPayload, the tool interface is shown as follows:

Import address table of AtomLdr.dll:

Example 2 - Debug Mode

Run PayloadBuilder.exe, encrypt demon[111].bin (a Havoc Payload file):

Run AtomLdr.dll using rundll32.exe:

After Payload execution, Havoc captures the screen shot:

license agreement

The development and release of this project followApache-2.0Open source license agreement.

Project address

AtomLdr:【GitHub Gateway

Reference materials

https://github.com/NUL0x4C/AtomLdr/blob/main/maldevacademy.com

https://github.com/bitcoin-core/ctaes

https://github.com/Maldev-Academy/HellHall

https://www.x86matthew.com/view_post?id=writeprocessmemory_apc

https://github.com/vxunderground/VX-API

https://github.com/HavocFramework/Havoc

你可能想看:

Distributed Storage Technology (Part 2): Analysis of the architecture, principles, characteristics, and advantages and disadvantages of wide-column storage and full-text search engines

b) It should have the login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal logins, and automatically exiting when the lo

b) It should have a login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal login attempts, and automatically logging out w

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

Deception defense for advanced threat detection: enhance security orchestration, automation, and response capabilities

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

4.5 Main person in charge reviews the simulation results, sorts out the separated simulation issues, and allows the red and blue teams to improve as soon as possible. The main issues are as follows

Five, YamlPropertiesFactoryBean loads YAML files

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

最后修改时间:
admin
上一篇 2025年03月27日 08:41
下一篇 2025年03月27日 09:03

评论已关闭