Skip to content

Enhance T1027/T1027.013 obfuscation tests: character array & password-protected ZIP#3279

Open
vl43den wants to merge 5 commits intoredcanaryco:masterfrom
vl43den:patch-9
Open

Enhance T1027/T1027.013 obfuscation tests: character array & password-protected ZIP#3279
vl43den wants to merge 5 commits intoredcanaryco:masterfrom
vl43den:patch-9

Conversation

@vl43den
Copy link
Contributor

@vl43den vl43den commented Feb 8, 2026

Details:

Adds two new atomic tests for obfuscation techniques:

T1027 Test 11 (Windows): character array obfuscation. It hides PowerShell command by constructing it from ASCII values at runtime, evading string-based detection

T1027.013 Test 3 (Linux/macOS): password protected ZIP extraction - encrypts payload in ZIP archive and extracts at runtime, mimicking Emotet/QBot delivery technique

Testing:

  • T1027 Test 11 verified via Antigravity IDE (Powershell Terminal); executes obfuscated command successfully (Screenshot 1)
  • T1027.013 verified via Invoke-AtomicRedTeam in GitHub Actions workflow; extracts with password, executes payload showing hostname/user/uname (Screenshot 2)
image

T1027.013 verified via Invoke-AtomicRedTeam in GitHub Actions workflow; extracts with password, executes payload showing hostname/user/uname

image

Associated Issues:

N/A

added a new technique for password-protected ZIP payload extraction and execution, commonly used by malware families
added an obfuscated PowerShell command that spawns a child process using character array obfuscation to evade detection.
@patel-bhavin
Copy link
Collaborator

Thank you for the screenshots @vl43den ! This PR looks good for 🚢 ing!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants