def __injection_method()

in nightMARE/src/nightmare/malware/blister/configuration.py [0:0]


    def __injection_method(self) -> str:
        if BlisterFlags.OWN_PROCESS_REFLECTIVE_INJECTION_METHOD.value & self.flag:
            return "Reflective injection"
        elif BlisterFlags.EXECUTE_SHELLCODE_METHOD.value & self.flag:
            return "Execute shellcode"
        elif BlisterFlags.OWN_PROCESS_HOLLOWING_METHOD.value & self.flag:
            return "Process hollowing current executable (rundll32.exe in case of a DLL sample)"
        elif BlisterFlags.REMOTE_PROCESS_HOLLOWING_METHOD.value & self.flag:
            return "Process hollowing IE or Werfault"
        else:
            raise RuntimeError("Injection method missing in configuration")