Skip to content
This repository has been archived by the owner on Dec 6, 2023. It is now read-only.

Add KeePass trigger abuse module #637

Merged
merged 6 commits into from Oct 13, 2022
Merged

Conversation

d3lb3
Copy link
Contributor

@d3lb3 d3lb3 commented Sep 4, 2022

A module to automatically abuse KeePass trigger system in order to perform a cleartext export of the database.
The underlying theory is described at the end of this harmj0y's blogpost (Exfiltration Without Malware – KeePass’ Trigger System).

Basic module usage :
image

Various options are also available, for which I can write a tutorial blog post / entry on CME wiki if needed :
image

@mpgn mpgn added the module label Sep 7, 2022
@mpgn mpgn added the all good tested in my lab label Oct 10, 2022
@mpgn
Copy link
Contributor

mpgn commented Oct 10, 2022

image

@d3lb3
Copy link
Contributor Author

d3lb3 commented Oct 10, 2022

Thanks for the review !

I would argue that if you don't force KeePass restart (and just wait for a "natural" reload, for example when the targeted user launches KeePass the next morning) the module is pretty opsec safe as it only uploads/downloads files and execute benign PowerShell commands (list process, look for files) compared to "louder" actions like dumping a process or injecting DLL "à la KeeThief".

Switching between ENCODE and PS1 for PSH_EXEC_METHOD I managed to execute the module against with no detection by popular EDRs such as Trend and Kaspersky. I jut can't figure out why Trend flags a simple powerhsell -e dwBoAG8AYQBtAGkA by default, as it is just a whoami... 😑​

@mpgn mpgn merged commit dad8413 into byt3bl33d3r:master Oct 13, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
all good tested in my lab module
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants