Overview
I worked with a team to develop a Python-based crypter used to obfuscate executable files,
allowing them to run on Windows 10 and 11 without interference.
I found communication with my peers was key, ensuring each part of development was properly
coordinated and done to a proper standard.
Tools & How it worked
We used: Python, PyInstaller, AES Encryption, Base64 Encoding, XOR Obfuscation,
Windows API Calls, and PE File Manipulation.
How did it work?
- The crypter encrypted an executable file using AES and XOR to obscure its contents.
- A Python stub was developed to decrypt and inject the payload into memory using Windows API calls.
- To evade detection, we implemented process hollowing and dynamically resolved API functions.
- Base64 encoding and entropy padding helped prevent signature-based detection.
Team Collaboration & Execution
- We divided tasks based on our individual skills. Some worked on encryption methods, while others handled execution techniques.
- We held regular talks to discuss the project and make sure every module of it was working smoothly.
- Code reviews and testing helped us refine the program and make certain that there were no major bugs.
- Clear documentation of each change we made was very useful as it allowed us to go back to fix any mistakes that were made and fix them.
Execution & Evasion
The stub focused on in-memory execution to reduce antivirus detection.
Each encrypted payload was unique, preventing signature-based detection.