Packaging Trojans with any file
Using App Data
Steps
- Install Pyinstaller
- Downloading Icon :
- Download Icon from IconFinder
- set filters to free and choose high resolution.
- download icon
- Changing downloaded png to ico
- Visit ICO convert or OnlineConvert.com
- Upload image
- choose desired settings
- convert and download ico file
-
If using requests use 2.5.1
Bypassing AV using UPX
- Download UPX
- Extract files
- Use UPX to compress pyinstaller generated executable
-
Syntax:
Spoofing File Type
- Copy Right to left override character (U+202E). copy from below or from unicode-explorer website
-
file_name-
(type_everything_in_reverse_order)
and paste copied character after-
. -
eg : sample_pdf-
fdp.exe
- file_name : sample_pdf
- spoofing_extension : pdf
- reverse order of spoofing extension : fdp
- file_extension : exe
-
spoofed file_name : sample_pdf-fdp.exe
-
Search words ending with exe (if windows executable) and remove
-
to make trojan to look like a real file. - word ending with exe : al
exe
- spoofed file_name : spoofed_al
exe.pdf
- actual file_name : spoofed_al
fdp.exe
Send File to victim
- Send file to victim through using attacks or social engineering.