Added JRTools.dll, roboform.dll, roboform-x64.dll, and MidLrtMd.dll sideloads #161
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Summary:
Added 4 new DLL sideloading configurations across 3 vendors. All entries have been verified with a PoC or existing research.
JRiver Media Center - JRService.exe
Vulnerability: BYO JRService.exe loads JRTools.dll from the current working directory.
Verification: Tested with a custom C++ proxy DLL (MessageBox PoC), seen in IR
Reference: Write up created here for a reference
Siber Systems (RoboForm) - RoboTaskBarIcon.exe
Vulnerability: Binary loads architecture-specific DLLs from its execution path.
x86: RoboTaskBarIcon.exe -> roboform.dll
x64: robotaskbaricon-x64.exe -> roboform-x64.dll
Verification: Based on existing vulnerability data; added separate YAMLs for architecture-specific detection logic.
Microsoft - MdMerge.exe
Vulnerability: MdMerge.exe loads MidLrtMd.dll from the current directory.
Verification: Verified via standard search order hijacking; added to microsoft/external as it is a common developer tool component.