Back to Resources

Malware Demo: SentinelOne VS BatCloak – Detection and Mitigation

In this video, we illustrate SentinelOne’s ability to detect, mitigate and prevent attacks incorporating BatCloak-generated payloads. “BatCloak” refers to a shared engine found in a number of commodity ‘FUD Crypters’ sold in crime forums, marketplaces, Telegram channels and similar venues. Some versions are sold for $25, although the tool is widely available via leaks or alternate forks and repositories. Our demonstration shows a threat actor obfuscating a Redline Stealer payload via the Jlaive/Madera Crypter. The newly-obfuscated payload is then dropped to a victim device and executed. SentinelOne is able to both detect and prevent.

Crypters, or obfuscation tools and packers, are used to evade endpoint security technology such as legacy AV, EDR, and XDR. The name refers to the cloaking of payloads in a nested fashion within .BAT (batch) and .PS1 (PowerShell) files. This cloaking ultimately leads to the execution of the original payload.

Crypter programs associated or incorporating BatCloak’s methods include known tools including CryBat, Jlaive, Madera, ScrubCrypt and others. Many of these are available in open source repositories, or have been leaked to the aforementioned crime forums and markets.

Watch the demo to understand how SentinelOne’s advanced threat detection and prevention capabilities can protect your systems against threats like BatCloak. For more technical insights and cybersecurity updates, subscribe to our channel.

지금 읽기

세계에서 가장 앞선 사이버 보안 플랫폼 경험하기

지능적인 자율형 사이버 보안 플랫폼이 현재와 미래의 조직을 어떻게 보호할 수 있는지 알아보세요.