Skip to content

Random executable left in agent dir #1864

@VakarisZ

Description

@VakarisZ

Describe the bug

A file named T1216_random_executable.exe appears in the directory where agent is ran even though no post breach actions were configured:

2022-04-06 09:08:57,227 [5212:CredentialCollectorThread:DEBUG] plugin_registry.get_plugin.39: Plugin 'SSHCollector' found
2022-04-06 09:08:57,228 [5212:PBAThread:DEBUG] automated_master._run_plugins.224: Found 0 post-breach action(s) to run
2022-04-06 09:08:57,229 [5212:CredentialCollectorThread:INFO] ssh_credential_collector.collect_credentials.21: Started scanning for SSH credentials
2022-04-06 09:08:57,229 [5212:PBAThread:INFO] automated_master._run_plugins.231: Finished running post-breach actions
2022-04-06 09:08:57,230 [5212:CredentialCollectorThread:DEBUG] ssh_handler.get_ssh_info.21: Skipping SSH credentials collection because the operating system is not Linux

image

This file might be included into the binary with pyinstaller and then unpacked during execution?

To Reproduce

Steps to reproduce the behavior:

  1. Enable the signed script proxy execution PBA
  2. Run the agent manually, via commandline (I did "monkey-windows-64.exe m0nk3y -s localhost:5000")
  3. See the executable

Machine version (please complete the following information):

  • OS: Windows

Tasks

Metadata

Metadata

Assignees

No one assigned

    Labels

    BugAn error, flaw, misbehavior or failure in the Monkey or Monkey Island.

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions