Agent: Remove sambacry binaries from monkey spec

PR #1698
This commit is contained in:
Ilija Lazoroski 2022-02-04 14:06:48 +01:00 committed by Mike Salvatore
parent 81bc579aa5
commit 88d4e9b11f
2 changed files with 1 additions and 10 deletions

View File

@ -19,7 +19,7 @@ Changelog](https://keepachangelog.com/en/1.0.0/).
### Removed
- The VSFTPD exploiter. #1533
- Manual agent run command for CMD. #1570
- Sambacry exploiter. #1567
- Sambacry exploiter. #1567, #1693
- "Kill file" option in the config. #1536
- Netstat collector, because network connection information wasn't used anywhere. #1535
- Checkbox to disable/enable sending log to server. #1537

View File

@ -25,7 +25,6 @@ def main():
cipher=block_cipher
)
a.binaries += get_binaries()
a.datas = process_datas(a.datas)
pyz = PYZ(a.pure, a.zipped_data, cipher=block_cipher)
@ -66,10 +65,6 @@ def process_datas(orig_datas):
return datas
def get_binaries():
return get_sc_binaries()
def get_hidden_imports():
imports = ['_cffi_backend', '_mssql']
if is_windows():
@ -77,10 +72,6 @@ def get_hidden_imports():
return imports
def get_sc_binaries():
return [(x, get_bin_file_path(x), 'BINARY') for x in ['sc_monkey_runner32.so', 'sc_monkey_runner64.so']]
def get_monkey_filename():
name = 'monkey-'
if is_windows():