Anti-Virus Evasion
GitHub Code:
Ebowla works by encoding the payload of the executable using environment variables. In this example, we are going to use the following environmental variables. This variables can be easily gathered from a victim box using systeminfo, hostname, ect....
Hostname: boxy01 Domain: WTH
The Config File
These are the basic things to change in order to get going with Ebowla. Basically, you specify the output type you want (GO, python or Powershell). You tell the code what kind of payload its going to be fed to the software (DLL, EXE, etc...) and finally you use specific the environment variables to have some sort of control over the way the payload gets encrypted and executed. This is extremely useful because if you just want to target a single user, you can just specify the username and the generated code won't work if executed under other usernames. However if you want to be able to use this code under all computers under a domain such as WTH.LOCAL, you can this as the environmental variable and the code will work on ALL computers as long as they part of the domain specified.



Our Config
Generate the Executable
Running Ebola with Payload
This generates the GO file.
Building the Final Executable
Uses for the executable
This can be easily used with Rotten Potato. You can get the exe file from this GitHub page and execute it on the target.
Last updated