From fb8847b5c5bd970cffebfbc4406f7103527bc0fa Mon Sep 17 00:00:00 2001 From: Ilija Lazoroski Date: Fri, 4 Feb 2022 14:06:48 +0100 Subject: [PATCH] Agent: Remove sambacry binaries from monkey spec PR #1698 --- CHANGELOG.md | 2 +- monkey/infection_monkey/monkey.spec | 9 --------- 2 files changed, 1 insertion(+), 10 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 3b637b3dd..b51cc9321 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -21,7 +21,7 @@ Changelog](https://keepachangelog.com/en/1.0.0/). ### Removed - VSFTPD exploiter. #1533 - Manual agent run command for CMD. #1570 -- Sambacry exploiter. #1567 +- Sambacry exploiter. #1567, #1693 - "Kill file" option in the config. #1536 - Netstat collector, because network connection information wasn't used anywhere. #1535 - Checkbox to disable/enable sending log to server. #1537 diff --git a/monkey/infection_monkey/monkey.spec b/monkey/infection_monkey/monkey.spec index 2d767c8c2..dc9a90868 100644 --- a/monkey/infection_monkey/monkey.spec +++ b/monkey/infection_monkey/monkey.spec @@ -22,7 +22,6 @@ def main(): cipher=block_cipher ) - a.binaries += get_binaries() a.datas = process_datas(a.datas) pyz = PYZ(a.pure, a.zipped_data, cipher=block_cipher) @@ -63,10 +62,6 @@ def process_datas(orig_datas): return datas -def get_binaries(): - return get_sc_binaries() - - def get_hidden_imports(): imports = ['_cffi_backend', '_mssql'] if is_windows(): @@ -75,10 +70,6 @@ def get_hidden_imports(): return imports -def get_sc_binaries(): - return [(x, get_bin_file_path(x), 'BINARY') for x in ['sc_monkey_runner32.so', 'sc_monkey_runner64.so']] - - def get_monkey_filename(): name = 'monkey-' if is_windows():