Golang in Disguise: Building Evasive Loader In Go
In the ever-evolving landscape of AV/EDR (Antivirus/Endpoint Detection and Response) defense mechanisms, traditional syscall execution has become increasingly vulnerable to detection. These tools utilize user-mode hooks and instrumentation callbacks to flag anomalous behavior, such as syscalls that don't return to ntdll.dll.
This blog delves into how to create evasive shellcode loader in GO, fetching and decrypting AES-encrypted shellcode from a server and executing it stealthily using indirect syscalls.