Disclaimer: Only for educational purposes only. An up-to-date example of how to create a trojan installer and utilize cloud infrastructure to host malicious files as well as control a victim machine.
Before testing, update your variables and directories in the files accordingly.
- mcode: This directory has the peristence and revershell Powershell code.
- terraformscript: Contains the automagic way to create an s3 bucket in aws that can host files.
- CodeSignScript.txt: The code signing script that created from the link below to sign our malicious .exe file. Run as admin.
- demoC.txt: The text file that provides the steps portrayed in the youtube video to recreate the demo.
- mcode.txt: This is the CSharp code to merge with the media installer to initially establish our persistence.
- Last part of the youtube video demonstration shows teardown of the demo
http://gphackingarticles.blogspot.com/2012/06/how-to-bind-two-exe-files-using-windows.html
https://adamtheautomator.com/how-to-sign-powershell-script/