EDR Silencer - Embracing the Silence
The blog post presents a take on EDR Silencer, a hack tool that was open sourced. It also throws light on how it works and how to detect.
🤔How does it work?
🔐How to detect?
⏩ 1. Command Line Parameters (Not Recommended)
EDRSilencer.exe blockedr //Created WFP rules for all identified EDRs
EDRSilencer.exe unblockall //Deletes all the rules
EDRSilencer.exe unblock <filter id> //Deletes a specific filter
EDRSilencer.exe block <full path> //Creates a rule for a specific process.
⏩ 2. WFP Policy change - Event log (Recommended)


⏩ 3. Hardcoded GUIDs and Names (Not Recommended)


⏩ 4. Presence of this tool using Yara (Recommended)
⏩ 5. Windows Filtering Platform blocking a connection.

💀 Variants in the wild

🤘Final Thoughts
PreviousQuick Assist: Friend or Foe? How adversaries can exploit this tool and how can you defend?NextDissecting & Detecting Lsass Shtinkering
Last updated