Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Macro detected by windows defender. #20

Closed
Viss opened this issue Jun 29, 2016 · 7 comments
Closed

Macro detected by windows defender. #20

Viss opened this issue Jun 29, 2016 · 7 comments

Comments

@Viss
Copy link

Viss commented Jun 29, 2016

Looks like the format of the macro is being picked up by windows defender.
It may be a good idea to poach the output format of empire's macro payload, since that still doesn't get detected :D

@trustedsec
Copy link
Collaborator

Hehe, I don't like snagging other peoples stuff.. I'll write a stub encoder for it.. Have plenty of space to play with. Should be done next couple days

@trustedsec
Copy link
Collaborator

Thanks for letting me know btw! Appreciate it.

Does it get snagged upon opening and enabling the macro or as soon as its downloaded?

@Viss
Copy link
Author

Viss commented Jun 29, 2016

windows 10, newish office install, defender pops when you try and open it.

I wager rearranging the payload and perhaps obfuscating the powershell.exe string will likely be enough, but I havent tried myself

On June 28, 2016 7:05:38 PM PDT, trustedsec notifications@github.com wrote:

Thanks for letting me know btw! Appreciate it.

Does it get snagged upon opening and enabling the macro or as soon as
its downloaded?


You are receiving this because you authored the thread.
Reply to this email directly or view it on GitHub:
#20 (comment)

@beethical
Copy link

Same problem here!
Today, I checked the latest Macro created via unicorn (and veil) through every available Antivirus, and some of them detected the Macro as a Trojan,even before opening the document ! :)
The screenshot below shows the results:

photo_2016-06-30_13-43-17

@trustedsec
Copy link
Collaborator

tested macro injection and normal ps1 - looks to get around windows defender with the update I just pushed out - let me know your experience but closing this for now. Will re-open if that differs. Thanks for the report!

@Viss
Copy link
Author

Viss commented Jul 16, 2016

THANK YOU SIR <3

@Viss
Copy link
Author

Viss commented Jul 16, 2016

I will test.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants