60
Antivirus Evasion Reconstructed - Veil 3.0 @ChrisTruncer

Antivirus Evasion Reconstructed - Veil 3

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Antivirus Evasion Reconstructed - Veil 3

Antivirus Evasion Reconstructed -

Veil 3.0@ChrisTruncer

Page 2: Antivirus Evasion Reconstructed - Veil 3

Christopher TruncerPrevious Sys Admin turned Red

Red Team LeadOpen Source Developer

EyeWitnessVeil Framework :)

Page 3: Antivirus Evasion Reconstructed - Veil 3

What’s this talk about?◈ Veil-Framework History◈ Veil-Framework 2.0◈ Problems with Veil◈ Veil-Framework 3.0

⬥ All the new stuff :)◈ Public Release◈ Questions

Page 4: Antivirus Evasion Reconstructed - Veil 3

Veil - 1.0

Page 5: Antivirus Evasion Reconstructed - Veil 3

The Inception◈ The idea for Veil came after many pen tests◈ The problem - time◈ Will Schroeder and myself began developing

different toolsets, and I released Veil◈ First choice for developing payloads?

⬥ Python

Page 6: Antivirus Evasion Reconstructed - Veil 3
Page 7: Antivirus Evasion Reconstructed - Veil 3

Veil 1.0◈ This was probably my second script, ever◈ It was just one giant file◈ Tons of random functions◈ Easy for me to develop with, but probably no

one else◈ Not extensible, would be a pain to add new

features

Page 8: Antivirus Evasion Reconstructed - Veil 3

Veil 1.0◈ At this point, Will began combining both

codebases◈ We wanted a framework to allow drag and

drop payloads⬥ Just create your own private module and the

framework will pick it up!◈ We wanted something that was easy to use

and fast

Page 9: Antivirus Evasion Reconstructed - Veil 3

Veil - 2.0

Page 10: Antivirus Evasion Reconstructed - Veil 3
Page 11: Antivirus Evasion Reconstructed - Veil 3

Veil 2.0◈ This is the Veil (Veil-Evasion) that everyone

knows today◈ Original Veil 2.0 didn’t include really any of

our own research⬥ Why reinvent the wheel?⬥ We just packaged existing research into the

framework◈ But we slowly started to add our own flair

Page 12: Antivirus Evasion Reconstructed - Veil 3

Veil 2.0◈ We largely wanted to focus on usability

⬥ Seems funny, but it’s important⬥ If you can’t use it, then it’s worthless

◈ Included some of the basics such as:⬥ Tab completion

⬦ Payloads⬥ Error checking

⬦ Users….. :)◈ Wanted to be able to easily help people

Page 13: Antivirus Evasion Reconstructed - Veil 3
Page 14: Antivirus Evasion Reconstructed - Veil 3

Veil 2.0◈ Veil was designed to be language agnostic

⬥ Write payloads in any language we can!◈ Currently support 7 different languages, plus

native executables and auxiliary modules⬥ C, C#, Go, Perl, PowerShell, Python, and Ruby

◈ Anything that can access Windows functions can be used as a stager

◈ Built in native compilation everywhere we could

Page 15: Antivirus Evasion Reconstructed - Veil 3

Problems I’ve Encountered

Page 16: Antivirus Evasion Reconstructed - Veil 3

Shellcode and Metasploit◈ Veil can generate shellcode for its payloads

within the tool⬥ That whole usability thing…

◈ But Veil simply invokes msfvenom⬥ It’s not created within Veil

◈ This makes our life easier..◈ … until msfvenom gets updated...

Page 17: Antivirus Evasion Reconstructed - Veil 3

Shellcode and Metasploit◈ This happened one time early on after Veil

2.0’s release⬥ It completely broke Veil’s ability to receive/parse

shellcode from msfvenom◈ This was pretty easily fixed once we

understood the new output format⬥ But it identified a problem

◈ We needed to remove complete reliance on msfvenom

Page 18: Antivirus Evasion Reconstructed - Veil 3
Page 19: Antivirus Evasion Reconstructed - Veil 3
Page 20: Antivirus Evasion Reconstructed - Veil 3
Page 21: Antivirus Evasion Reconstructed - Veil 3

Shellcode and Metasploit◈ Doesn’t seem widely used, but it has its

advantages for us⬥ I control the output, so no unforeseen changes⬥ It supports what we believe are the most widely

used payloads⬥ It’s faster for use vs. using msfvenom⬥ Simply patching the shellcode allows for an

immediate return of results

Page 22: Antivirus Evasion Reconstructed - Veil 3

AV Trying to Signature Veil

Page 23: Antivirus Evasion Reconstructed - Veil 3

AV Signature◈ About a year after Veil 2.0’s release, we

received word of a signature

Page 24: Antivirus Evasion Reconstructed - Veil 3
Page 25: Antivirus Evasion Reconstructed - Veil 3
Page 26: Antivirus Evasion Reconstructed - Veil 3
Page 27: Antivirus Evasion Reconstructed - Veil 3
Page 28: Antivirus Evasion Reconstructed - Veil 3
Page 29: Antivirus Evasion Reconstructed - Veil 3
Page 30: Antivirus Evasion Reconstructed - Veil 3
Page 31: Antivirus Evasion Reconstructed - Veil 3
Page 32: Antivirus Evasion Reconstructed - Veil 3

Veil 3.0

Page 33: Antivirus Evasion Reconstructed - Veil 3

Veil 3.0◈ Veil 3.0 has multiple changes in the tool

when compared to version 2.0⬥ First and foremost, Veil has been completely

rewritten in Python 3⬥ Python 3 is the way forward with using Python⬥ I did not want to refactor the code in Python 2

now, to need to update to Python 3 when Py2 is end-of-life (2020)

Page 34: Antivirus Evasion Reconstructed - Veil 3

Veil 3.0◈ Refactoring the codebase while updating to

Python 3 was a challenge⬥ It went beyond just changing print statements into

functions◈ Handling shellcode in Python 3 is completely

different from Python 2◈ Creating a Python payload that injects

shellcode into memory is different

Page 35: Antivirus Evasion Reconstructed - Veil 3

Veil 2.0

Page 36: Antivirus Evasion Reconstructed - Veil 3

Veil 3.0

Page 37: Antivirus Evasion Reconstructed - Veil 3

Veil 2.0

Page 38: Antivirus Evasion Reconstructed - Veil 3

Veil 3.0

Page 39: Antivirus Evasion Reconstructed - Veil 3

Veil 3.0

Page 40: Antivirus Evasion Reconstructed - Veil 3

Python 3◈ Why else did I choose Python3?

⬥ I discovered some AntiVirus companies are trying to flag Veil Python payloads simply by the environment it was compiled in

Page 41: Antivirus Evasion Reconstructed - Veil 3

Python 3◈ How did I determine this?

⬥ Generated payload - caught⬥ Removed shellcode - caught⬥ Renamed CTypes - caught⬥ Commented Windows function calls - caught

⬦ From 1 to all of them⬥ Deleted EVERYTHING and did a hello world

program - ...take a guess...

Page 42: Antivirus Evasion Reconstructed - Veil 3

Python 3

Page 43: Antivirus Evasion Reconstructed - Veil 3

Python 3◈ Next…

⬥ Use the same payload source code⬥ Copied it to Windows VM⬥ “Compiled” the Python code in Windows using

Pyinstaller⬥ Scanned the new executable

Page 44: Antivirus Evasion Reconstructed - Veil 3

Python 3

Page 45: Antivirus Evasion Reconstructed - Veil 3

Python 3◈ Updating the version of Python used changes

the environmental signature it was “compiled” in

◈ Easily bypass this detection method◈ Try to get AV to go the smarter route and

actually analyze the executable vs. develop poor signatures

Page 46: Antivirus Evasion Reconstructed - Veil 3

Veil 3.0 Menu

Page 47: Antivirus Evasion Reconstructed - Veil 3
Page 48: Antivirus Evasion Reconstructed - Veil 3
Page 49: Antivirus Evasion Reconstructed - Veil 3

Shellcode Generation◈ MSFVenom is still available to generate

shellcode⬥ Supports all of the payload built into MSF⬥ Still requires instantiating the “simple” framework

object◈ Veil-Ordnance is the default choice

⬥ Quickly generate shellcode⬥ In the event msfvenom output changes again, this

is a fallback (or use it by default :))

Page 50: Antivirus Evasion Reconstructed - Veil 3

Ordnance Payloads◈ Veil-Ordnance Payloads

⬥ reverse_tcp⬥ reverse_http⬥ reverse_https⬥ reverse_tcp_dns⬥ reverse_tcp_all_ports⬥ bind_tcp

Page 51: Antivirus Evasion Reconstructed - Veil 3

Ordnance Encoder◈ Veil-Ordnance does have a single encoder

⬥ Thanks to @sixdub◈ This can be used when needing to avoid bad

characters◈ I’d love to have more encoders added into

Ordnance⬥ Send any my way! :)

Page 52: Antivirus Evasion Reconstructed - Veil 3

Veil 3.0◈ So… what else is new with Veil payloads?

Page 53: Antivirus Evasion Reconstructed - Veil 3
Page 54: Antivirus Evasion Reconstructed - Veil 3

Environmental Checks◈ Nearly all payloads now have the ability to

set pre-execution environmental checks◈ Set just one, or all of the checks◈ All checks need to pass in order for the

payload to execute⬥ All or nothing

◈ Each check developed in its respective language

Page 55: Antivirus Evasion Reconstructed - Veil 3

Environmental Checks◈ Current supported environmental checks:

⬥ Computer domain⬥ System hostname⬥ Payload expiration⬥ Number of processors⬥ Current username

◈ There’s room for more checks to be added in⬥ Want to find an easy way to contribute, add a new

environmental check!

Page 56: Antivirus Evasion Reconstructed - Veil 3

Environmental Checks◈ These are here to try to combat a few things:

⬥ Prevent analysis of the end payload by an automated malware analysis solution

⬥ If payload is run in sandbox prior to execution, it will (hopefully) prevent malicious detection

⬥ Allow the end user to create highly targeted malware

Page 57: Antivirus Evasion Reconstructed - Veil 3

New Languages◈ While we’re at it, let’s add two new languages

⬥ AutoIt3⬥ Lua

◈ Lua - currently generates source code⬥ Can’t do native compilation, yet

◈ AutoIt3 - Generates code and can be compiled within Linux

Page 58: Antivirus Evasion Reconstructed - Veil 3
Page 59: Antivirus Evasion Reconstructed - Veil 3

Future Work◈ Add in additional environmental checks◈ Always looking for new languages and

payloads to support◈ Additional encoders to Ordnance

Page 60: Antivirus Evasion Reconstructed - Veil 3

Questions?◈ Questions?◈ Veil -

https://github.com/Veil-Framework/Veil◈ Get in touch!

⬥ @ChrisTruncer⬥ @VeilFramework