https://github.com/cocomelonc/2022-07-21-malware-tricks-22
Run payload like a Lazarus Group (UuidFromStringA). C++ implementation
https://github.com/cocomelonc/2022-07-21-malware-tricks-22
Last synced: 12 days ago
JSON representation
Run payload like a Lazarus Group (UuidFromStringA). C++ implementation
- Host: GitHub
- URL: https://github.com/cocomelonc/2022-07-21-malware-tricks-22
- Owner: cocomelonc
- Created: 2022-07-22T04:32:38.000Z (almost 3 years ago)
- Default Branch: master
- Last Pushed: 2022-07-24T09:37:51.000Z (almost 3 years ago)
- Last Synced: 2025-04-01T10:36:13.199Z (about 1 month ago)
- Language: C++
- Size: 328 KB
- Stars: 19
- Watchers: 2
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Malware development trick. Run payload as Lazarus Group. C++ malware implementation.
Malware development: shellcode run via UuidFromStringA and EnumDesktopA (or another suitable candidate). C++ malware implementation example.
[https://cocomelonc.github.io/malware/2022/07/21/malware-tricks-22.html](https://cocomelonc.github.io/malware/2022/07/21/malware-tricks-22.html)