Close this connection and start the crypt.
We use the Data Encoder shared STUB (Bronze Package) in this test. Add your payload and choose your injection.
If you don’t know how it works, leave it to the crypter to choose the best injection method.
We have not explained some features in this tutorial. Some users may employ these options for their goals.
Change the assembly to get FUD results. Note: Most detections are from assembly and icons, so use clean ones.
Clone assembly from not-popular apps is the best option.
Also, the “Compress” or “Increase File Size” option can help get FUD results.
You can Clone the certificate option too.
Choose a file name that matches the assembly.
Click on the ENCODE button on crypter and choose the right name.
Now run the encrypted file and wait for the connection.
We chose the InstallUtil injection, and your file process name will change to it. Read the crypter process hollowing and PE Injection for more details.
And finally, the encrypted njRAT payload gets a successful connection and you made FUD njRAT payload.
We recommend join our Support BOT for any problem.