EvilClippy and Metasploit implementation
anonuser78 opened this issue · 1 comments
anonuser78 commented
Is there any ways to bypass the virus/malware detection of the metasploit payload documents (macros attached) with EvilClippy? Google Gmail still marks it as a virus even when I run it through EvilClippy.
stanhegt commented
If AV detects a macro after EvilClippy is applied, then the problem is usually one of the following:
- SRP streams - these are artefacts that get created in a document after running a macro. Solution: either remove the SRP streams with a CFBF editor or make sure that you do not save the document after running a macro.
- Static strings or byte sequences that remain in Pcode after VBA source code is removed. Solution: obfuscation of your macro.