Skip to content

LSASS Credential Dumper that utilizes the Windows API, in-memory RC4 encryption and Base64 encoding, and HTTPS exfiltration.

Notifications You must be signed in to change notification settings

Meowmycks/catdumper

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

43 Commits
 
 
 
 
 
 
 
 

Repository files navigation

catdumper

Disclaimer

Don't be evil with this. I created this tool to learn. I'm not responsible if the Feds knock on your door.

Overview

catdumper.exe takes a snapshot of the LSASS process, creates a MiniDump of it, RC4 encrypts it with a randomly-generated string, and Base64 encodes it, all in-memory.

While still in-memory, the encrypted MiniDump and its key are exfiltrated over an HTTPS connection to a Python Flask server, exfil.py you run on your machine.

The Flask server decodes and decrypts the data locally before dropping it to the disk. After that, you can open it in Mimikatz like normal.

Compile as a VS2022 project and run as Administrator. You can figure out that part :)

Features

  • Uses polymorphism with compiletime RNG to always generate a unique file signature.
  • Unhooks NtReadVirtualMemory to defeat EDR userland hooking.
  • Also tricks heuristics by performing multiple benign Windows API functions.
  • Encrypting and encoding MiniDump in-memory means AV/EDRs shouldn't flag it.
  • Strings that might raise flags are obfuscated (e.g "lsass.exe").
  • Packet size and time between requests is randomized.

Demo

catdumper_demo

About

LSASS Credential Dumper that utilizes the Windows API, in-memory RC4 encryption and Base64 encoding, and HTTPS exfiltration.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published