in nightMARE/src/nightmare/malware/blister/configuration.py [0:0]
def __injection_method(self) -> str:
if BlisterFlags.OWN_PROCESS_REFLECTIVE_INJECTION_METHOD.value & self.flag:
return "Reflective injection"
elif BlisterFlags.EXECUTE_SHELLCODE_METHOD.value & self.flag:
return "Execute shellcode"
elif BlisterFlags.OWN_PROCESS_HOLLOWING_METHOD.value & self.flag:
return "Process hollowing current executable (rundll32.exe in case of a DLL sample)"
elif BlisterFlags.REMOTE_PROCESS_HOLLOWING_METHOD.value & self.flag:
return "Process hollowing IE or Werfault"
else:
raise RuntimeError("Injection method missing in configuration")