Lime Crypter v3.1 [Crypter / Binder] (Open Source) 10-29-2018, 07:47 PM
#1
An obfuscation tool for .Net + Native files. Applying some evasion techniques to bypass anti-virus software and install a persistence in the machine. Also, the output payload can be binded with a legit application while it bytes are being injected to legit process as well.
Main Features:
•.NET - Coded in Visual Basic .NET, required framework 4.0 dependency.
•USG - Adding some junk methods and rename all variables
•Injection - Hide payload behind a legit process
•Anti Virtual Machines - Uninstall itself if the machine is virtual to avoid scanning or analyzing
![[Image: iMcfDdr.png]](https://i.imgur.com/iMcfDdr.png)
--------------------------------------------------------------------------------------------------------------------
_![[Image: 2usZzEJ.png]](https://i.imgur.com/2usZzEJ.png)
--------------------------------------------------------------------------------------------------------------------
_![[Image: XqfPJMF.png]](https://i.imgur.com/XqfPJMF.png)
--------------------------------------------------------------------------------------------------------------------
Before crypt of a Orcus client file with 'Lime Crypter 3.1'.
![[Image: mpxS440.png]](https://i.imgur.com/mpxS440.png)
Proof: Link
After crypt of a Orcus client file with 'Lime Crypter 3.1'.
![[Image: vbrCn0r.png]](https://i.imgur.com/vbrCn0r.png)
Proof: Link
Virustotal:
Virustotal - EXE --MD5: "ced45f6998154c48d72f053029ecbfc7"
Virustotal - ZIP --MD5: "9778a191ab6550b5415c596d1f41d8e1"
Download:
GitHub
Main Features:
•.NET - Coded in Visual Basic .NET, required framework 4.0 dependency.
•USG - Adding some junk methods and rename all variables
•Injection - Hide payload behind a legit process
•Anti Virtual Machines - Uninstall itself if the machine is virtual to avoid scanning or analyzing
![[Image: iMcfDdr.png]](https://i.imgur.com/iMcfDdr.png)
--------------------------------------------------------------------------------------------------------------------
![[Image: 76CoInF.png]](https://i.imgur.com/76CoInF.png)
![[Image: 2usZzEJ.png]](https://i.imgur.com/2usZzEJ.png)
--------------------------------------------------------------------------------------------------------------------
![[Image: KF2k9w6.png]](https://i.imgur.com/KF2k9w6.png)
![[Image: XqfPJMF.png]](https://i.imgur.com/XqfPJMF.png)
--------------------------------------------------------------------------------------------------------------------
Before crypt of a Orcus client file with 'Lime Crypter 3.1'.
![[Image: mpxS440.png]](https://i.imgur.com/mpxS440.png)
Proof: Link
After crypt of a Orcus client file with 'Lime Crypter 3.1'.
![[Image: vbrCn0r.png]](https://i.imgur.com/vbrCn0r.png)
Proof: Link
Virustotal:
Virustotal - EXE --MD5: "ced45f6998154c48d72f053029ecbfc7"
Virustotal - ZIP --MD5: "9778a191ab6550b5415c596d1f41d8e1"
Download:
GitHub
(This post was last modified: 10-29-2018, 07:48 PM by Mr.z3ro.)