Kaiser
Fileless persistence, attacks and anti-forensic capabilties.
Install / Use
/learn @NtRaiseHardError/KaiserREADME
Kaiser
File-less persistence, attacks and anti-forensic capabilities (Windows 7 32-bit).
NOTE: This project was NOT designed to evade AV detection.
Related paper: https://github.com/NtRaiseHardError/NtRaiseHardError.github.io/blob/master/_posts/2018-12-06-Anti-forensic-Malware-and-File-less-Malware.md
This project is discontinued.
How to Build/Use:
- Compile Kaiser.dll in Release mode
- Upload Kaiser.dll such that it can be directly downloaded as a raw binary
- Update the BuildKaiser.ps1 script to include the URL for Kaiser.dll
- Run BuildKaiser.ps1 to build the Payload.ps1 script
- Upload the Payload.ps1 script such that it can be directly downloaded as raw text
- Update the BuildKaiser.ps1 script to include the URL of Payload.ps1
- Run BuildKaiser.ps1 to build the Installer.ps1 script
- Run the Installer.ps1 script with administrative privileges on the target machine
Known bugs:
- Threaded
XxxNetSendsends will buffer (reason unknown) PurgeXxxfunctions are not guaranteed to work (perhaps this is because it usesShellExecuteEx- More?
TODO
CommandPrintStatusto print the status of Kaiser?- Convert functions in
firewall.cto WinAPI - [OPTIONAL] Make C2 connection loop until established
- Convert Functions in
registry.cto WinAPI - Send debugging warnings/errors back to C2
- Make
PurgeProcessMonitorasynchronous (IWbemServices::ExecNotificationQueryAsync)
