https://github.com/uchks/hone-deobf
"Obfuscated" Batch files from https://discord.gg/Hone, but deobfuscated; if you can call it that.
https://github.com/uchks/hone-deobf
deobf deobfuscate deobfuscated deobfuscation hone obfuscate obfuscated obfuscation
Last synced: 2 months ago
JSON representation
"Obfuscated" Batch files from https://discord.gg/Hone, but deobfuscated; if you can call it that.
- Host: GitHub
- URL: https://github.com/uchks/hone-deobf
- Owner: uchks
- Created: 2021-08-02T20:51:19.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2023-10-14T18:28:16.000Z (over 1 year ago)
- Last Synced: 2025-01-08T06:58:09.885Z (4 months ago)
- Topics: deobf, deobfuscate, deobfuscated, deobfuscation, hone, obfuscate, obfuscated, obfuscation
- Language: Batchfile
- Homepage: https://hone.gg
- Size: 6.84 KB
- Stars: 2
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Hone Deobfuscated
This repository contains batch files originally sourced from the [Hone Discord Server](https://discord.gg/Hone), which have been "deobfuscated".
For instance, the file named `Anti-Tracking.cmd` fetches another script through Powershell:```bash
powershell Invoke-WebRequest "https://cdn.discordapp.com/attachments/798652558351794196/870846920778735636/DEOBANTITRACK.cmd" -OutFile "%temp%\DEOBANTITRACK.cmd" >nul 2>&1
```The fetched `DEOBANTITRACK.cmd` utilizes `certutil` to encode their final script, outputting it like so:
```bash
CERTUTIL -f -decode "%~f0" "%Temp%\Honerandomthingthatyoudontwanttoseeipromisepleasejustgetoutofhere.bat" >nul 2>&1
```This produces `Honerandomthingthatyoudontwanttoseeipromisepleasejustgetoutofhere.bat` in your temporary directory, which is essentially the `Anti-Tracking.cmd` file.
## Dealing with "Obfuscation"
The script includes a layer of "obfuscation" consisting of a series of characters, notably in the format:
```
FF FE 26 63 6C 73 0D 0A FF FE 26 63 6C 73 0D 0A FF FE 26 63 6C 73 0D 0A FF FE 26 63 6C 73 0D 0A FF FE 26 63 6C 73 0D 0A FF FE 26 63 6C 73 0D 0A FF FE 26 63 6C 73 0D 0A FF FE 26 63 6C 73 0D 0A
```
Or when translated:
```
ÿþ&cls ÿþ&cls ÿþ&cls ÿþ&cls ÿþ&cls ÿþ&cls ÿþ&cls ÿþ&cls
```You can remove this layer of "obfuscation" using a hex editor like HxD. Once removed, the actual script is revealed.
This deobfuscation method is applicable to the batch files as of August 2nd, 2021.## Credits
This "challenge" is presented by **323170806190440449 / jonathah#1221**.