Skip to content

Indirect Syscall implementation to bypass userland NTAPIs hooking.

License

Notifications You must be signed in to change notification settings

Faran-17/Hellshazzard

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

HellsHazzard

A small POC to bypass NT API hooking using @maldevacademy indirect sycall technique.

The tool consists of the following features -

  1. HellsHall implementation of indirect syscall bypass by @maldevacademy
  2. Mechanism to detect the presence of InetSim sandbox, if detected halts the execution of the malware.
  3. API hashing.
  4. IPv6 shellcode obfuscation.
  5. IAT Obfuscation to evade static analysis.
  6. Debugger check

Here are the screenshot and demo of the tool

InetSim Detection

Before execution, the malware will check if the InetSim, which is a internet simulation sandox to trick malwares to continue to execute and make connection to the C2.

image

IAT Obfuscation

IAT Obfuscation hides the presence of malicious APIs in IAT table to evade basic static analysis.

image

NT API Evasion

Using HellsHall indirect system calls which is a modified version of Tartarus gate logic to evade NT Api hooking by @BestEdrOfTheMarket EDR.

352714034-fc7cb7a9-a33f-4034-94f2-536241dd44ec.mp4

Note - This tool is not tested against commercial EDRs and AV evasion and kernel base detection is out of the scope as well. New features and techniques will be implemented in other tools in near future.

About

Indirect Syscall implementation to bypass userland NTAPIs hooking.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published