This February we have a few updates to Veil-Evasion. First, we’ve upgraded the version of PyInstaller that’s used by Veil-Evasion from pyinstaller 2 to 3.1. One extra feature that this allows is the ability to encrypt the bytecode that pyinstaller outputs. We’re using this feature by generating a random key each time Veil-Evasion runs and supplying that when using PyInstaller to convert the python code into a Windows executable.
The other modification to Veil-Evasion is I’ve added some obfuscation to the python payloads themselves. I’ve identified some areas where different AVs are trying to flag the python payloads, so this should help with some of the detection issues. Other possibly signatures have been found as well, but I’m waiting to see how AV companies respond to this new obfuscation.
Thanks, hope that this can help, and good luck! #avlol