Crypter Handbook
Crypter Handbook
Crypter Handbook
In this e-book you will learn how encryption and crypters are
working, all in a easy-understanding way. I think you don't know
how a crypter is working, so we are going to learn it from the
beginning. I hope you will enjoy this e-book, and learn some things
about encryption. So, let's begin...
A little introduction about crypters
RazorCrypt
I think I don't teached you much when I said that, but now we will
learn some more things about this crypters, and over all: the theroy
to make your own!
HOW DOES A CRYPTER WORK
Crypter GUI: This is the interface of the crypter, with all options
etc...
Stub: This is the part that is generated by the crypter and that is
for decrypting the payload when ran. It's a part of the final
encrypted file, but isn't encrypted itself.
So, now we can see the basis of a crypter with this explicative drawing of me :
To resume: the payload is encrypted by the crypter and compiled
together with the stub, which will decrypt the encrypted source and
run it (runtime) or store it (scantime).
Ok, now that you know the theory working of a crypter you can
begin to manage your working space. It's the new chapter of this
book.
CREATE YOUR OWN CRYPTER
- You will have to try your crypter often on MultiAV scan pages to
see if it's undetectable, the problem is that some of these scan
websites distribute your file to the AV's companies.
So don't try your encrypted files on VirusTotal or anything you
found on google after a simple research, use:
-http://Pscan.xyz
-http://NoDistribute.org
The main function of a runtime stub is the RunPE function. You will
need this function for every runtime crypter you create unless
someone (or you) found another way to bypass AV's in RAM.
With these information, you will be able to create your first crypter,
I would just recommend you some languages to create your
crypter:
-AutoIT : Is very easy to learn and quite good for crypters
because you got many tutorials, sources and some
good existing functions.
I wont give you some sources, you should just search by your own
if you really want, but I think that you should think a little to learn.
And you know, the best sensation on the whole world is to finish
your first working crypter, even if it's totally detected, because once
you have this basis, you can add what ever you want to make your
crypter FUD, what brings us to the next part :
MAKING YOUR CRYPTER FUD
Once you finished your first basis crypter, it's UD : undetectable but
not FUD.
In order to make your crypter FUD you have some options to add
to your crypter :
-Junk code
-Informations and Icon changer
-File bumper
-Random stub
-Private stub
-etc...
1)Junk code:
3)File bumper
4)Random Stub
Once you have done that, it's possible that some AV's still detects
your RunPE. To avoid that you need to randomize them : by
creating random variable names, function names etc...
Change everything you can change with a function that randomizes
your RunPE module.
Ok, now that you have your crypter, maybe FUD or not, you should
add some functionalities to it.
CRYPTER FUNCTIONALITIES
Now I will talk about some functionalities you should build into your
crypter in order to make them FUD, or to make the encrypted file
better.
Delay : You can add a delay before the execution of your script.
That helps to bypass Runtime detections from some AV's and there
buit-in sandboxes.
END