In my social engineering hypothetical short story, I introduced a file binder executable which I developed and under @pry0cc 's request, here’s a how-to on using my file binder.
Disclaimer: This is just a PoC so don’t expect anything amazing.
First you want to load up Window’s command shell and find the directory of the executable and execute it like so:
…and you will see the usage format.
Now, simply replace each of the listed command line arguments, for example, using putty.exe
and Answers.txt
:
You will be see a list of debugging output and when that’s completed, it will generate a stub, in this case, it’s binded.exe
. Now simply execute the stub file. Note that it might fail and give you an error but simply remake the stub from the previous step to fix this.
…and voila! Piece of cake.
The file binder has been tested to work with .txt
and .bmp
so that means that it does not necessarily require a .exe
file as the payload. Feel free to experiment with other types of files.
Adding an Icon
My program does not have the feature to add an icon, but I might add it in the future. There are other ways to add an icon by using other tools. In this example, I will be using Resource Hacker.
First, you need to have a .ico
file like so.
Then boot up your tool, load your binded file and then find the option to load an icon (or resource).
Then save it. You’ll get something like this.
Easy!
Click me to get the binary file!
VirusTotal Scan
The scan on VirusTotal has a detection rate of 2/54, probably because malware and file binding are known to be associated. I can personally assure you that there is no hidden malicious code and that the detection is a false positive but it is your choice to download.