Anti-Virus Evasion

GitHub Code:

Ebowla works by encoding the payload of the executable using environment variables. In this example, we are going to use the following environmental variables. This variables can be easily gathered from a victim box using systeminfo, hostname, ect....

Hostname: boxy01 Domain: WTH

The Config File

These are the basic things to change in order to get going with Ebowla. Basically, you specify the output type you want (GO, python or Powershell). You tell the code what kind of payload its going to be fed to the software (DLL, EXE, etc...) and finally you use specific the environment variables to have some sort of control over the way the payload gets encrypted and executed. This is extremely useful because if you just want to target a single user, you can just specify the username and the generated code won't work if executed under other usernames. However if you want to be able to use this code under all computers under a domain such as WTH.LOCAL, you can this as the environmental variable and the code will work on ALL computers as long as they part of the domain specified.

Template output
Type of file being fed to Ebowla
Environment Variables

Our Config

Generate the Executable

Running Ebola with Payload

This generates the GO file.

Building the Final Executable

Uses for the executable

This can be easily used with Rotten Potato. You can get the exe file from this GitHub page and execute it on the target.

Last updated