Droppers & Downloaders
udurrani
Parent node can scan and find the vulenrable node remotely. Only then the parent node will inject the evil payload into the address space of vulnerable application. All the intelligence will also be shared with the child node.
In some cases, right after injection the parent node will go to passive mode. Since child has all the intelligence, it will be used to further propagation. This is to avoid running scans from one node ONLY. Think of it a linked list where a node can easily point to the root node and the next node as well.
Dropped payload could be an installer or a downloader. It will download another payload. I will have some examples later. Downloader would require an internet connection to download other payloads or stages.
In the video I am trying to show a very basic concept, where first stage drops a payload. Payload is an http(s) frame work that can dwonload other payloads. Eventually the final payload is a basic keylogger that runs in the foreground.
If we look at the first stage, we can see the PE header
Or the embedded file could be completely encrypted / encoded not just the header. This simply means that file is benign on disk, on execution payload will be decrypted either in the memory or to the disk, we will talk about it later