The information contained in this repo is for educational purposes ONLY! I DO NOT hold any responsibility for any misuse or damage of the information provided in my blog posts, discussions, activities, repositories, or exercises.
- Manipulates local and domain policies
- Disables Windows Firewall.
- Disables Windows task manager.
- Disables selected binaries.
- Deletes Windows Defender AV signature database.
- Deletes Windows Defender.
- Creates a Powershell profile.
- Drops firewall rules
- Starts WinRM & RDP.
- Creates users.
- Remaps powershell aliases
- Hides processes, files, and directories that start with $vmware-{whatever}
- Runs multiple processes to do different tasks mentioned below.
- Removes everything from event manager (The initial deployment)
- Real binary name: KeyChain.exe
- Real binary path: {path}
- Hidden binary name: $vmware-005.exe
- Hidden binary path: {path}
- Description:
- It does something.
- Real binary name: KeyChain.exe
- Real binary path: {path}
- Hidden binary name: $vmware-005.exe
- Hidden binary path: {path}
- Description:
- It sends everything back to :80/bose.php.
- Real binary name: PFRE.exe
- Real binary path: C:\Windows\
- Hidden binary name: $vmware-001.exe
- Hidden binary path: C:\ProgramData\Microsoft\Windows\Caches\
- Description:
- This binary sends back a shell to S-Nemo.py
- Real binary name: WinHypro.exe
- Real binary path: C:\Windows\
- Hidden binary name: $vmware-002.exe
- Hidden binary path: C:\ProgramData\Microsoft\Windows\Caches\
- Description:
- Infects every new file in the system according to your needs.
- Removes for all Sysinternals binaries.
- Real binary name: Wherever you want
- Real binary path: Wherever you want
- Hidden binary name: Has no hidden process
- Hidden binary path: Has no hidden process
- Description:
- This is the implant that downloads, configures, and installs all the needed files.
- It needs to run once. It's the process that starts everything.
- Real binary name: NT.exe
- Real binary path: C:\Program Files\Windows NT\
- Hidden binary name: Has no hidden process since it runs once
- Hidden binary path: Has no hidden process since it runs once
- Description:
- NT.exe is what loads .dll into
- Real binary name: WMSys.exe
- Real binary path: C:\Windows\
- Hidden binary name:$vmware-000.exe
- Hidden binary path: C:\ProgramData\Microsoft\Windows\Caches\
- Description:
- This binary makes sure that Nemo implant is running aka makes sure that Red-Team has a shell by checking that $vmware-001.exe and $vmware-002.exe are running.
- Resets and appends firewall rules
- Real binary name: Wherever you want
- Real binary path: Wherever you want
- Hidden binary name: Has no hidden process
- Hidden binary path: Has no hidden process
- Description:
- This binary cleans almost every evidence after deploying Nemo
First interaction with the RedTeam server to download the needed malware.
Beaconing to pwnboard.
Hidden processes.