Howdy,
One of the most important features of Shellter, is the ability to obfuscate its stubs by mixing the effective instructions with other junk instructions and/or generate a specific output with variable instructions. This has been improved a lot in Shellter Pro already, but we wanted to make things even better.
Obfuscating the code by itself doesn’t really mean anything. The way the obfuscation works is the key part.
In a few words we want the obfuscated code to look as ‘normal’ as possible. This can be achieved by randomly using a variety of instructions of variable length.
The number of instructions used each time should also be randomized. This helps against not just in terms of finding patterns to target from the AV perspective, but also to have variable ranges between instructions that could be otherwise grouped together by an AV signature in a specific code block.