Skip to content

scriptchildie/Malicious-XLL-csharp

Repository files navigation

Malicious-XLL-csharp

Malicious excel Plugin (xll) writen in c#

  • XLL Downloads a triple-XOR encoded payload.
  • Writes it to memory
  • in memory decryption (only works for x32 office) in this case triple xor. For x64 the decryptor should be modified.

The code included two functions:

  • DownloadAndExecute() - Downloads and executes the shellcode
  • DownloadAndInject(1231) - Downloads and injects the shellcode to the process with the provided PID

Encoder code is not really polished. When it's done with execution it generates 7 files with names 0 1 2 3 4 5 6

  • cat 0 1 2 3 4 5 6 > encoded.bin
  • Host the encoded.bin file on a webserver for the xll to download.

As of 31/07/2022 runs undetected by Defender for Endpoint (used both sliver and metasploit)

A good guide on how to write an excel plugin. https://bettersolutions.com/csharp/excel-interop/excel-dna-getting-started.htm

About

Malicious excel Plugin (xll) writen in c#

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published