Skip to content

NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/Skrull). This Nim version takes it a step further by allowing the malware to self protect on first run instead of relying on another binary.

Notifications You must be signed in to change notification settings

OffenseTeacher/NimSkrull

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 

Repository files navigation

NimSkrull

Was presented at NorthSec 2023, available on Youtube

An experiment in improving existing anti-copy techniques. This one allows a binary to rewrite itself on disk after the first execution with the hardcoded function ordinals of the current system instead of function names. As with the original POC (https://github.com/aaaddress1/Skrull), the anti-copy technique won't work between Windows systems that have the same versions of system DLLS.

For more information regarding Nim Offensive developpment, see: [OffensiveNim](https://github.com/byt3bl33d3r/OffensiveNim).
Special thanks to Fabian Mosch [@S3cur3Th1sSh1t](https://twitter.com/ShitSecure) for it's Nim-RunPE repo, which was used as a foundation.

How to use

  • Install Nim on Linux
  • Clone this repo
  • compile NimSkrull.nim
  • Execute it on arbitrary systems

How to cross-compile from Linux to Windows

  • nim c -d=mingw -d=release --app=console --cpu=amd64 NimSkrull.nim

About

NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/Skrull). This Nim version takes it a step further by allowing the malware to self protect on first run instead of relying on another binary.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages