-
Notifications
You must be signed in to change notification settings - Fork 597
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Social Engineering - Fake PDF Trojan Horse #78
Comments
Something its wrong then .. step by step1º - does dropper.exe as is icon changed from exe to pdf icon ?
2º - does dropper.exe downloads/executes the pdf document ?
3º - does dropper.exe downloads/executes the Client.exe ?
4º - does venom listenner recive the connection from Client.exe ?
review1º - So review the 2º - Or review the lib used by venom.sh to compile the dropper.exe 3º - OR maybee x64 bits arch compiled payload (agent) its giving an error under target x64 bits... Target machine (windows 10 - x64bit)Attacker machine (Linux Kali - x32bit) |
**>>I did notice that you are using: Sign Executable for AV Evasion (Carbon Copy)
Yes, attacker is now x86 target is x64. |
its not because of this |
Thank you, here is the video:
https://lbry.tv/@MunYa:d/Fake-PDF-Trojan-Horse:0?r=2Doo3VYrEzk9UmEw9kKFmbfEZtFZBjrx
Not messing with Youtube, and 3 strikes, lol, again thanks.
…On Tue, Oct 6, 2020 at 3:28 AM pedro ubuntu ***@***.***> wrote:
Closed #78 <#78>.
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#78 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/ABOUOMB5SHGD45BIVFOZJKTSJLWNDANCNFSM4R74G43A>
.
|
Windows systems (vista|7|8|8.1|10)
8 (Amsi Evasion) | Agent nº5
Version v1.0.17 Changelog
Hey, i was about to do a video for LBRY on Fake PDF Trojan Horse, and i ran upon this hiccup.
Let me know what steps i can take to fix this or help you fix it, thank you!
The text was updated successfully, but these errors were encountered: