Microsoft has stated the embedded Python won't run locally. Instead it will be executed on Azure containers so it won't have access to a potential victim's local files or systems. So maybe we won't see embedded Python solely being used to download and execute payloads. However, I think this will lead to very interesting additional obfuscation layers. At least until someone figures out an exploit to let the Python run local.
Here's my final project for the Sektor7's Maldev Intermediate Course. It's a 3-stage attack that uses sRDI to inject into VeraCrypt and hooks WideCharToMultiByte() to sniff passwords for encrypted containers.
#malware #infosec #redteam #proofofconcept #hooking #hacking #srdi #injection
Shoutout to @hackNpatch who hooked me up with an old #quasar decryptor. I was able to modify it to also work for the newest version.
Decrypts the version and C2 servers from QuasarRAT versions 1.3.0 and 1.4.0 - GitHub - Krkn-Sec/QuasarRAT-Decryptor: Decrypts the version and C2 servers from QuasarRAT versions 1.3.0 and 1.4.0