[Question] CrowdStrike Bypass [Machine Learning]
by lucasm - Thursday August 15, 2024 at 09:01 AM
#1
Hello community,

I tried various methods to bypass edrs and avs. Got success in terms of all the big names there. Just one is creating trouble i.e. Crowdstrike falcon sensor.

The problem is not in dynamic detection, Its pretty smooth. But the problem is in static detection. The detection i am getting is either ML (Machine Learning Based) based or some AI based where it sees and feels like it could be malware.

Obviously the problem is not in CS default config but if the aggressive mode is on, this ML based detection is creating problem.

I wonder if anyone have bypassed that recently or can help/guide me towards it.
Reply
#2
Can you give some more details? Are you using the plain CS binary or packing it?

Often, for machine learning, the following bypasses can help:
- Add good metadata to the file using Metatwin and similar tools.
- If packing, make sure to check the entropy of the file! Use Detect It Easy in advanced mode, you will see a button to view the entropy. This should NOT be higher than 6 bit per byte. Often, Machine Learning just triggers on high entropy, which usually comes from packed payloads. If your entropy is too high, you need to reduce it by modifying your packer.
- Also, again if you're using a custom packer: Add some benign assembly from the .text section of some program (e.g. from VLC or some other popular software) to your executable. This assembly doesn't actually have to be executed at any point, but just it's presence can help make Machine Learning think the whole file is probably fine. Sounds stupid, but it works.
Reply
#3
Doesn't CS Falcon Sensor Work by behavioral analysis?,

also there is a github repo that bypass almost all AVs, it does it by using the firewall to block connections to the
AV server, or something like that. can't remember.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  3 sektor7 free courses NEO123 52 3,762 1 hour ago
Last Post: gowaxok767
  [Sektor7] Full Recent Course Spearr 40 1,512 2 hours ago
Last Post: gowaxok767
  Rust Based Windows Kernel Rootkit Loki 130 9,566 10 hours ago
Last Post: lukaku
  Xordium stealer for Pulsar v2.4.5 nullvex 32 1,609 10 hours ago
Last Post: lukaku
  Sektor7 - Malware Development Advanced - Vol.1 Sh4d0w1X 435 46,769 Yesterday, 07:03 PM
Last Post: AKASHIC

Forum Jump:


 Users browsing this forum: 1 Guest(s)