Cortex Bypass
by s4ltyt04st - Friday November 10, 2023 at 02:52 PM
#1
Hey there,

I've been developing some malware trying to bypass Cortex's XDR. I have a malware that creates a process and injects a payload into it, I do all this whith syscalls (without the command syscall in my asm code, I do a jump in a memory space where I know that is an instruction syscall and a ret), but Cortex still catching my malware by "Behaviour".
Does anyone now how can Cortex catch this if I ain't using the ntdll.dll so Cortex shouldn't been able to see my actions?

Thanks.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Phishing Platform with 2FA bypass support Loki 142 21,971 3 hours ago
Last Post: fuzzycat
  Bypass AV and EDR - Halos Gate from Sektor7 0x01 121 10,726 02-10-2026, 11:51 AM
Last Post: gilthead22
  PowerShell AMSI Bypass via VEH Loki 41 3,906 02-09-2026, 08:07 AM
Last Post: yuuichi00
  Bypass Cookies Encryption | Working FrancisMDouble 7 987 02-09-2026, 01:50 AM
Last Post: jmpqwordptr
  win-10 uac bypass add exclusion nullvex 0 259 04-01-2025, 12:57 AM
Last Post: nullvex



 Users browsing this thread: 1 Guest(s)