Skip to content

Cipher7/ApexLdr

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

37 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ApexLdr

A simple DLL payload loader written in C incorporating the features I have learnt in Malware Development till now.

Features

  • DLL sideloading
  • Shellcode staging via HTTP/S
  • CRT Library Independent
  • Indirect syscalls with Syswhispers3 - jumper_randomized
  • Payload execution via Threadpool API
  • DLL unhooking
  • Import Address Table Camouflage
  • Execution delays via API Hammering
  • API Hashing

Usage

  • Clone the Repository
  • Run make to compile the DLL
  • python310.dll should be generated in the dist\ folder
  • Copy pythonw.exe from DLL-sideload-app to dist\ folder
  • Copy the pythonw.exe and python310.dll to the victim machine
  • Run pythonw.exe
  • It should DLL sideload python310.dll and run the shellcode

usage

Testing with Havoc and Windows Defender

windows-defender

havoc-shell


Note

Shellcode Encryption: The shellcode is being fetched from a remote server, providing SSL Support. I haven't incorporated any shellcode encryption and decryption procedures to keep the loader simple and maintain a low entropy.

EDR Evasion? : This is my first DLL Payload Loader, it can bypass many AV solutions and EDRs but some of the techniques it incorporates aren't the best, so as I keep learning I'll make better loaders!

Signature: Use tools like Sigthief to sign the DLL payload before usage. It may help evade some AVs which focus mainly on signatures.

Recommendation: You can modify this loader easily to sideload other applications. Just modify the dllmain.c file and change Py_Main function to the export function of your application. Make sure to proxy all the other export functions to prevent errors and crashes.

Releases

No releases published

Packages

No packages published

Languages