Evasion and bypassing detection within C#
Last updated
Last updated
AV and EDR bypass techniques for C# assembly payloads.
In this experiment we will be using the NTAPI injector as our baseline.
For our baseline we tested the raw injector code without any shellcode in the payload.
Running injector with raw Meterpreter shellcode.
Encrypting the shellcode using AES
So interesting, when executing it a second time Defenders behavioral analysis flagged and blocked execution.
Adding a sleep accelerator check to bypass sandboxing seems to do the trick to bypass this a second time.