Skip to content

Latest commit

 

History

History
41 lines (22 loc) · 1.26 KB

README.md

File metadata and controls

41 lines (22 loc) · 1.26 KB

ExecutePeFromPngViaLNK

Extract and execute a PE embedded within a PNG file using an LNK file. The PE file is encrypted using a single-key XOR algorithm and then injected as an IDAT section to the end of a specified PNG file.

Quick Links

Maldev Academy Home

Maldev Academy Syllabus

Maldev Academy Pricing


Usage

  1. Use InsertPeIntoPng.py to create the embedded PNG file and generate the extraction LNK file:

image

The generated LNK file will have the icon of a PDF file by default, and it will expect the embedded PNG file to be in the same directory when executed. PE files will be stored under the %TEMP% directory for execution.

image


Demo - Executing Dll

DllToPngExecViaLNK.mp4

Demo - Executing Exe

ExeToPngExecViaLNK.mp4