Skip to content

hidd3ncod3s/DecryptEKbinary

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 

Repository files navigation

DecryptEKbinary (Decrypt Exploit Kit initial binary/dropper)

Decrypt the initial droppers of various exploit kits

The default behaviour of various exploit kits(Angler, Fiesta, Goon, Neutrino, Niteris CottonCastle, Nuclear, SweetOrange) is, it will download an encrypted/encoded binary after the initial successful exploitation. The basic architecture of EK maintainance allow us to create an decryptor for many of the EK. The encryption/encoding logic used by any one exploit kit is same for some duration. This is a tool i used to decrypt those encrypted/encoded binaries for analysis purpose. Many researchers used in-memory dumping for extracting these binaries but many a times i have seen the cases where the hashes are random after the dumping.

I haven't updated this for sometime now. It will definitely work with old pcaps from malware-traffic. It does not consume the pcap file as input. You need to extract that particular encrypted/encoded binary file and give that as input to this tool.

Releases

No releases published

Packages

No packages published