C:\Users\AJH\Downloads\Ben\x64\Release\MSFRottenPotato.pdb
Overview
overview
8Static
static
7Erebus-mas...03.exe
windows7-x64
5Erebus-mas...03.exe
windows10-2004-x64
5Erebus-mas...64.dll
windows7-x64
1Erebus-mas...64.dll
windows10-2004-x64
1Erebus-mas...86.dll
windows7-x64
3Erebus-mas...86.dll
windows10-2004-x64
3Erebus-mas...64.exe
windows7-x64
1Erebus-mas...64.exe
windows10-2004-x64
1Erebus-mas...86.exe
windows7-x64
1Erebus-mas...86.exe
windows10-2004-x64
3Erebus-mas...64.exe
windows7-x64
8Erebus-mas...64.exe
windows10-2004-x64
8Erebus-mas...jp.exe
windows7-x64
1Erebus-mas...jp.exe
windows10-2004-x64
1Erebus-mas...sp.exe
windows7-x64
1Erebus-mas...sp.exe
windows10-2004-x64
1Erebus-mas...80.exe
windows7-x64
7Erebus-mas...80.exe
windows10-2004-x64
7Erebus-mas...es.exe
windows7-x64
7Erebus-mas...es.exe
windows10-2004-x64
7Erebus-mas...b.xlsx
windows7-x64
3Erebus-mas...b.xlsx
windows10-2004-x64
1Erebus-mas...ter.py
ubuntu-18.04-amd64
3Erebus-mas...ter.py
debian-9-armhf
3Erebus-mas...ter.py
debian-9-mips
3Erebus-mas...ter.py
debian-9-mipsel
3Erebus-mas...er.ps1
windows7-x64
3Erebus-mas...er.ps1
windows10-2004-x64
3Erebus-mas...to.exe
windows7-x64
1Erebus-mas...to.exe
windows10-2004-x64
1Erebus-mas...le.exe
windows7-x64
1Erebus-mas...le.exe
windows10-2004-x64
1Behavioral task
behavioral1
Sample
Erebus-master/exp/0803.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Erebus-master/exp/0803.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Erebus-master/exp/16075/x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Erebus-master/exp/16075/x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Erebus-master/exp/16075/x86.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Erebus-master/exp/16075/x86.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Erebus-master/exp/8120/x64.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Erebus-master/exp/8120/x64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Erebus-master/exp/8120/x86.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Erebus-master/exp/8120/x86.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Erebus-master/exp/com/1405_1322_x64.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
Erebus-master/exp/com/1405_1322_x64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Erebus-master/exp/jp/jp.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Erebus-master/exp/jp/jp.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Erebus-master/exp/sp/sp.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Erebus-master/exp/sp/sp.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Erebus-master/gather/chrome80.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Erebus-master/gather/chrome80.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Erebus-master/gather/cookies.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Erebus-master/gather/cookies.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Erebus-master/local/2020-04-10-mssb.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Erebus-master/local/2020-04-10-mssb.xlsx
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Erebus-master/local/windows-exploit-suggester.py
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral24
Sample
Erebus-master/local/windows-exploit-suggester.py
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral25
Sample
Erebus-master/local/windows-exploit-suggester.py
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral26
Sample
Erebus-master/local/windows-exploit-suggester.py
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral27
Sample
Erebus-master/modules/gather.ps1
Resource
win7-20241023-en
Behavioral task
behavioral28
Sample
Erebus-master/modules/gather.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Erebus-master/post/BadPotato.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Erebus-master/post/BadPotato.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Erebus-master/post/HiveJack-Console.exe
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
Erebus-master/post/HiveJack-Console.exe
Resource
win10v2004-20241007-en
General
-
Target
bc340b314fa52eb060af22289f7ecb85_JaffaCakes118
-
Size
26.3MB
-
MD5
bc340b314fa52eb060af22289f7ecb85
-
SHA1
44b51fb28b8a77eb522d771b0816bfbd95a8c37e
-
SHA256
c977ae66e324525a57dd0982d670fce03626aa70b4c57e7aff2ba8eab97e4e75
-
SHA512
ccf31fbf1c5729bbff0947500eb190510b821822b51c9d21030c48978c7046ed00a683aedccd9706d18f9188065f36f69f1a593a3488c69a47f7a1f5fe92ea41
-
SSDEEP
786432:YRx4ptP/Ib59RRfWEdEP9NxPm4bKPZ41RAhlZj:YiVIbHWG8PE0hAhHj
Malware Config
Signatures
-
resource yara_rule static1/unpack001/Erebus-master/post/SoftMgr.exe vmprotect -
resource yara_rule static1/unpack001/Erebus-master/exp/0803.exe upx -
Detects Pyinstaller 2 IoCs
resource yara_rule static1/unpack001/Erebus-master/gather/chrome80.exe pyinstaller static1/unpack001/Erebus-master/gather/cookies.exe pyinstaller -
Unsigned PE 21 IoCs
Checks for missing Authenticode signature.
resource unpack001/Erebus-master/exp/0803.exe unpack002/out.upx unpack001/Erebus-master/exp/16075/x64.dll unpack001/Erebus-master/exp/16075/x86.dll unpack001/Erebus-master/exp/8120/x64.exe unpack001/Erebus-master/exp/8120/x86.exe unpack001/Erebus-master/exp/com/1405_1322_x64.exe unpack001/Erebus-master/exp/jp/jp.exe unpack001/Erebus-master/exp/sp/sp.exe unpack001/Erebus-master/gather/chrome80.exe unpack001/Erebus-master/gather/cookies.exe unpack001/Erebus-master/post/BadPotato.exe unpack001/Erebus-master/post/HiveJack-Console.exe unpack001/Erebus-master/post/LogonScreen.exe unpack001/Erebus-master/post/SafetyKatz.exe unpack001/Erebus-master/post/Seatbelt.exe unpack001/Erebus-master/post/SharpShell.exe unpack001/Erebus-master/post/SpaceRunner/System.Management.Automation.dll unpack001/Erebus-master/post/SpaceRunner/spacerunner.exe unpack001/Erebus-master/post/ew/x32.exe unpack001/Erebus-master/post/ew/x64.exe
Files
-
bc340b314fa52eb060af22289f7ecb85_JaffaCakes118.zip
-
Erebus-master/.gitignore
-
Erebus-master/Common.sl
-
Erebus-master/LICENSE
-
Erebus-master/Main.cna
-
Erebus-master/README.md
-
Erebus-master/README_md_files/20200409220109.png.png
-
Erebus-master/README_md_files/20200731151716.png.png
-
Erebus-master/README_md_files/20201019154454.png.png
-
Erebus-master/README_md_files/image.png.png
-
Erebus-master/exp/0803.exe.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
UPX0 Size: - Virtual size: 2.0MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 358KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.textbss Size: - Virtual size: 629KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 320KB - Virtual size: 320KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1024B - Virtual size: 777B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 283B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Erebus-master/exp/16075/x64.dll.dll windows:6 windows x64 arch:x64
ac0f2663589d2c08fbac02640deba715
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
secur32
AcquireCredentialsHandleW
AcceptSecurityContext
QuerySecurityContextToken
kernel32
WaitForSingleObject
ResumeThread
GetCurrentProcess
CreateThread
CreateFileW
WriteConsoleW
DecodePointer
Sleep
GetLogicalProcessorInformation
SetFilePointerEx
HeapReAlloc
HeapSize
GetStringTypeW
SetStdHandle
GetConsoleMode
GetConsoleCP
WriteFile
FlushFileBuffers
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
QueryPerformanceCounter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
GetProcAddress
GetLastError
WideCharToMultiByte
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetCurrentProcessId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
CreateTimerQueue
CloseHandle
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
SetThreadPriority
GetThreadPriority
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
EncodePointer
GetCurrentThread
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleFileNameW
GetModuleHandleA
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualProtect
VirtualFree
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LoadLibraryW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
ExitProcess
GetModuleHandleExW
HeapAlloc
HeapFree
LCMapStringW
GetStdHandle
GetFileType
FindClose
advapi32
AdjustTokenPrivileges
OpenProcessToken
SetThreadToken
LookupPrivilegeValueW
ole32
CoTaskMemAlloc
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoGetInstanceFromIStorage
CLSIDFromString
CoInitialize
ws2_32
select
shutdown
listen
getaddrinfo
WSAStartup
bind
socket
connect
recv
freeaddrinfo
WSAGetLastError
accept
WSACleanup
closesocket
send
Exports
Exports
??0CMSFRottenPotato@@QEAA@XZ
??4CMSFRottenPotato@@QEAAAEAV0@$$QEAV0@@Z
??4CMSFRottenPotato@@QEAAAEAV0@AEBV0@@Z
?__autoclassinit2@CMSFRottenPotato@@QEAAX_K@Z
?findNTLMBytes@CMSFRottenPotato@@AEAAHPEADH@Z
?newConnection@CMSFRottenPotato@@0HA
?processNtlmBytes@CMSFRottenPotato@@AEAAHPEADH@Z
?startCOMListener@CMSFRottenPotato@@QEAAHXZ
?startCOMListenerThread@CMSFRottenPotato@@QEAAKXZ
?startRPCConnection@CMSFRottenPotato@@QEAAHXZ
?startRPCConnectionThread@CMSFRottenPotato@@QEAAKXZ
?staticStartCOMListener@CMSFRottenPotato@@CAKPEAX@Z
?staticStartRPCConnection@CMSFRottenPotato@@CAKPEAX@Z
?triggerDCOM@CMSFRottenPotato@@QEAAHXZ
ReflectiveLoader
Sections
.text Size: 211KB - Virtual size: 211KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Erebus-master/exp/16075/x86.dll.dll windows:6 windows x86 arch:x86
63c60c258241c12d893dca0a5dce1d8e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
C:\Users\AJH\Downloads\Ben\Release\MSFRottenPotato.pdb
Imports
secur32
AcquireCredentialsHandleW
AcceptSecurityContext
QuerySecurityContextToken
kernel32
WaitForSingleObject
ResumeThread
GetCurrentProcess
CreateThread
SetFilePointerEx
DecodePointer
CreateFileW
WriteConsoleW
Sleep
GetLogicalProcessorInformation
HeapReAlloc
HeapSize
GetStringTypeW
SetStdHandle
GetConsoleMode
GetConsoleCP
WriteFile
FlushFileBuffers
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
QueryPerformanceCounter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
GetProcAddress
GetLastError
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetCurrentProcessId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
CreateTimerQueue
CloseHandle
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
SetThreadPriority
GetThreadPriority
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
EncodePointer
GetCurrentThread
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleFileNameW
GetModuleHandleA
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualProtect
VirtualFree
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LoadLibraryW
RtlUnwind
RaiseException
ExitProcess
GetModuleHandleExW
HeapAlloc
HeapFree
LCMapStringW
GetStdHandle
GetFileType
advapi32
AdjustTokenPrivileges
OpenProcessToken
SetThreadToken
LookupPrivilegeValueW
ole32
CoTaskMemAlloc
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoGetInstanceFromIStorage
CLSIDFromString
CoInitialize
ws2_32
select
shutdown
listen
getaddrinfo
WSAStartup
bind
socket
connect
recv
freeaddrinfo
WSAGetLastError
accept
WSACleanup
closesocket
send
Exports
Exports
??0CMSFRottenPotato@@QAE@XZ
??4CMSFRottenPotato@@QAEAAV0@$$QAV0@@Z
??4CMSFRottenPotato@@QAEAAV0@ABV0@@Z
?__autoclassinit2@CMSFRottenPotato@@QAEXI@Z
?findNTLMBytes@CMSFRottenPotato@@AAEHPADH@Z
?newConnection@CMSFRottenPotato@@0HA
?processNtlmBytes@CMSFRottenPotato@@AAEHPADH@Z
?startCOMListener@CMSFRottenPotato@@QAEHXZ
?startCOMListenerThread@CMSFRottenPotato@@QAEKXZ
?startRPCConnection@CMSFRottenPotato@@QAEHXZ
?startRPCConnectionThread@CMSFRottenPotato@@QAEKXZ
?staticStartCOMListener@CMSFRottenPotato@@CGKPAX@Z
?staticStartRPCConnection@CMSFRottenPotato@@CGKPAX@Z
?triggerDCOM@CMSFRottenPotato@@QAEHXZ
_ReflectiveLoader@4
Sections
.text Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Erebus-master/exp/8120/x64.exe.exe windows:6 windows x64 arch:x64
c5b8c0d6e1d8d9f2abdd96ba1b80d2b1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetModuleHandleW
ReadFile
GetStartupInfoW
GetLastError
GetProcAddress
CreatePipe
GetCurrentProcess
CloseHandle
lstrcpyW
GetStringTypeW
CreateProcessW
GetCommandLineW
LoadLibraryExA
ExitProcess
LCMapStringW
HeapFree
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
GetProcessHeap
EncodePointer
DecodePointer
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
WriteFile
GetModuleFileNameW
DeleteCriticalSection
FlushFileBuffers
GetConsoleCP
GetConsoleMode
RtlUnwindEx
GetFileType
SetLastError
GetCurrentThreadId
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
OutputDebugStringW
HeapReAlloc
SetStdHandle
SetFilePointerEx
WriteConsoleW
HeapSize
CreateFileW
user32
CreateWindowStationW
SetProcessWindowStation
gdi32
SetBitmapBits
CreateBitmap
GetBitmapBits
shell32
CommandLineToArgvW
psapi
EnumDeviceDrivers
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Erebus-master/exp/8120/x86.exe.exe windows:6 windows x86 arch:x86
7f11c7de3f90c26a3918006ee15da6ae
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
ReadFile
GetStartupInfoW
GetLastError
GetProcAddress
CreatePipe
GetCurrentProcess
CloseHandle
lstrcpyW
GetStringTypeW
CreateProcessW
GetCommandLineW
LoadLibraryExA
ExitProcess
LCMapStringW
HeapFree
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
GetProcessHeap
EncodePointer
DecodePointer
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
WriteFile
GetModuleFileNameW
DeleteCriticalSection
FlushFileBuffers
GetConsoleCP
GetConsoleMode
GetFileType
SetLastError
GetCurrentThreadId
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
OutputDebugStringW
HeapReAlloc
SetStdHandle
SetFilePointerEx
WriteConsoleW
RtlUnwind
HeapSize
CreateFileW
user32
CreateWindowStationW
SetProcessWindowStation
gdi32
SetBitmapBits
CreateBitmap
GetBitmapBits
shell32
CommandLineToArgvW
psapi
EnumDeviceDrivers
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Erebus-master/exp/com/1405_1322_x64.exe.exe windows:6 windows x64 arch:x64
88835cb5cc06cef91abeec7377ba9884
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
C:\Users\Node\source\repos\COMahawk\x64\Release\COMahawk.pdb
Imports
kernel32
InitializeCriticalSectionEx
Sleep
GetLastError
RaiseException
DeleteCriticalSection
WriteConsoleW
CreateFileW
CloseHandle
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
SetLastError
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
CompareStringW
LCMapStringW
GetFileType
HeapSize
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
SetStdHandle
GetStringTypeW
ole32
CoInitialize
CLSIDFromProgID
CoUninitialize
CoCreateInstance
oleaut32
SysAllocString
Sections
.text Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Erebus-master/exp/jp/jp.exe.exe windows:6 windows x64 arch:x64
23867a89c2b8fc733be6cf5ef902f2d1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
R:\JuicyPotato\Release\x64\JuicyPotato.pdb
Imports
secur32
AcquireCredentialsHandleW
QuerySecurityContextToken
AcceptSecurityContext
kernel32
Sleep
WTSGetActiveConsoleSessionId
GetLastError
GetCurrentProcess
CreateThread
LoadLibraryW
LoadLibraryExW
UnregisterWaitEx
QueryDepthSList
InterlockedPopEntrySList
ReleaseSemaphore
DuplicateHandle
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
WideCharToMultiByte
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetProcAddress
RtlPcToFileHeader
EncodePointer
RaiseException
RtlUnwindEx
InterlockedPushEntrySList
InterlockedFlushSList
FreeLibrary
DecodePointer
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetModuleFileNameW
MultiByteToWideChar
GetCommandLineA
GetCommandLineW
GetACP
HeapAlloc
HeapFree
CompareStringW
LCMapStringW
GetFileType
GetCurrentThread
FlushFileBuffers
GetConsoleCP
GetConsoleMode
CloseHandle
WaitForSingleObjectEx
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetStringTypeW
GetProcessHeap
SetFilePointerEx
WriteConsoleW
HeapSize
HeapReAlloc
CreateFileW
CreateTimerQueue
SetEvent
SignalObjectAndWait
SwitchToThread
advapi32
GetTokenInformation
CreateProcessAsUserW
CreateProcessWithTokenW
DuplicateTokenEx
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
LookupAccountSidW
CopySid
GetLengthSid
ole32
CoTaskMemAlloc
CLSIDFromString
StgCreateDocfileOnILockBytes
CoGetInstanceFromIStorage
CoInitialize
CreateILockBytesOnHGlobal
ws2_32
freeaddrinfo
setsockopt
shutdown
recv
send
closesocket
bind
WSAGetLastError
socket
WSACleanup
getaddrinfo
WSAStartup
accept
select
listen
__WSAFDIsSet
connect
Sections
.text Size: 219KB - Virtual size: 218KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Erebus-master/exp/sp/sp.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
D:\Projects\C#\SweetPotato_CS\obj\Release\SweetPotato.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Erebus-master/gather/chrome80.exe.exe windows:5 windows x64 arch:x64
7aa1951517b3b8d38b12f874b66196c9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetModuleFileNameW
GetProcAddress
GetCommandLineW
GetEnvironmentVariableW
SetEnvironmentVariableW
ExpandEnvironmentStringsW
GetTempPathW
WaitForSingleObject
Sleep
SetDllDirectoryW
CreateProcessW
GetStartupInfoW
LoadLibraryExW
CreateDirectoryW
GetShortPathNameW
FormatMessageW
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
GetExitCodeProcess
GetLastError
SetEndOfFile
HeapReAlloc
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetModuleHandleW
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetCommandLineA
ReadFile
CreateFileW
GetDriveTypeW
GetFileType
CloseHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetFullPathNameW
GetFullPathNameA
RemoveDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
SetStdHandle
SetConsoleCtrlHandler
DeleteFileW
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
HeapAlloc
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetConsoleCP
CompareStringW
LCMapStringW
GetCurrentDirectoryW
FlushFileBuffers
SetEnvironmentVariableA
GetFileAttributesExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
GetProcessHeap
WriteConsoleW
GetTimeZoneInformation
HeapSize
RaiseException
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorW
ws2_32
ntohl
Sections
.text Size: 133KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
demo.pyc
-
Erebus-master/gather/cookies.exe.exe windows:5 windows x64 arch:x64
7aa1951517b3b8d38b12f874b66196c9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetModuleFileNameW
GetProcAddress
GetCommandLineW
GetEnvironmentVariableW
SetEnvironmentVariableW
ExpandEnvironmentStringsW
GetTempPathW
WaitForSingleObject
Sleep
SetDllDirectoryW
CreateProcessW
GetStartupInfoW
LoadLibraryExW
CreateDirectoryW
GetShortPathNameW
FormatMessageW
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
GetExitCodeProcess
GetLastError
SetEndOfFile
HeapReAlloc
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetModuleHandleW
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetCommandLineA
ReadFile
CreateFileW
GetDriveTypeW
GetFileType
CloseHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetFullPathNameW
GetFullPathNameA
RemoveDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
SetStdHandle
SetConsoleCtrlHandler
DeleteFileW
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
HeapAlloc
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetConsoleCP
CompareStringW
LCMapStringW
GetCurrentDirectoryW
FlushFileBuffers
SetEnvironmentVariableA
GetFileAttributesExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
GetProcessHeap
WriteConsoleW
GetTimeZoneInformation
HeapSize
RaiseException
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorW
ws2_32
ntohl
Sections
.text Size: 133KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
cookies.pyc
-
Erebus-master/local/2020-04-10-mssb.xls.xlsx .xls office2007
-
Erebus-master/local/windows-exploit-suggester.py.py .sh linux
-
Erebus-master/modules/auxiliary.cna
-
Erebus-master/modules/bypass.cna
-
Erebus-master/modules/commands.cna
-
Erebus-master/modules/funs.cna
-
Erebus-master/modules/gather.cna.ps1
-
Erebus-master/modules/helper.cna
-
Erebus-master/modules/lpe.cna
-
Erebus-master/modules/persistence.cna
-
Erebus-master/modules/post.cna
-
Erebus-master/modules/pwn.cna
-
Erebus-master/modules/third.cna
-
Erebus-master/post/BadPotato.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Erebus-master/post/HiveJack-Console.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
D:\Projects\C#\HiveJack-Console\obj\Release\HiveJack-Console.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Erebus-master/post/LogonScreen.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
D:\Projects\C#\fakelogonscreen\Source\obj\Release\FakeLogonScreen.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Erebus-master/post/SafetyKatz.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 711KB - Virtual size: 711KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Erebus-master/post/Seatbelt.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 154KB - Virtual size: 153KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Erebus-master/post/SharpShell.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 656B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Erebus-master/post/SoftMgr.exe.exe windows:5 windows x64 arch:x64
a80fb377651fe78de3794a6281b12287
Code Sign
04:00:00:00:00:01:2f:4e:e1:52:d7Certificate
IssuerCN=GlobalSign Root CA,OU=Root CA,O=GlobalSign nv-sa,C=BENot Before13/04/2011, 10:00Not After28/01/2028, 12:00SubjectCN=GlobalSign Timestamping CA - G2,O=GlobalSign nv-sa,C=BEKey Usages
KeyUsageCertSign
KeyUsageCRLSign
11:21:d6:99:a7:64:97:3e:f1:f8:42:7e:e9:19:cc:53:41:14Certificate
IssuerCN=GlobalSign Timestamping CA - G2,O=GlobalSign nv-sa,C=BENot Before24/05/2016, 00:00Not After24/06/2027, 00:00SubjectCN=GlobalSign TSA for MS Authenticode - G2,O=GMO GlobalSign Pte Ltd,C=SGExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
26:27:9f:0f:2f:11:97:0d:cc:f6:3e:ba:88:f2:d4:c4Certificate
IssuerCN=VeriSign Class 3 Code Signing 2010 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)10,O=VeriSign\, Inc.,C=USNot Before06/01/2016, 00:00Not After28/03/2019, 23:59SubjectCN=Qihoo 360 Software (Beijing) Company Limited,OU=Tech. Dev. Dept.,O=Qihoo 360 Software (Beijing) Company Limited,L=Beijing,ST=Beijing,C=CNExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
52:00:e5:aa:25:56:fc:1a:86:ed:96:c9:d4:4b:33:c7Certificate
IssuerCN=VeriSign Class 3 Public Primary Certification Authority - G5,OU=VeriSign Trust Network+OU=(c) 2006 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USNot Before08/02/2010, 00:00Not After07/02/2020, 23:59SubjectCN=VeriSign Class 3 Code Signing 2010 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)10,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
23:38:91:61:e4:5a:21:8b:d2:4e:6e:85:9a:e1:11:53Certificate
IssuerCN=Symantec Class 3 SHA256 Code Signing CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USNot Before28/12/2015, 00:00Not After28/03/2019, 23:59SubjectCN=Qihoo 360 Software (Beijing) Company Limited,OU=Tech. Dev. Dept.,O=Qihoo 360 Software (Beijing) Company Limited,L=Beijing,ST=Beijing,C=CNExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
3d:78:d7:f9:76:49:60:b2:61:7d:f4:f0:1e:ca:86:2aCertificate
IssuerCN=VeriSign Class 3 Public Primary Certification Authority - G5,OU=VeriSign Trust Network+OU=(c) 2006 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USNot Before10/12/2013, 00:00Not After09/12/2023, 23:59SubjectCN=Symantec Class 3 SHA256 Code Signing CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
7b:05:b1:d4:49:68:51:44:f7:c9:89:d2:9c:19:9d:12Certificate
IssuerCN=VeriSign Universal Root Certification Authority,OU=VeriSign Trust Network+OU=(c) 2008 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USNot Before12/01/2016, 00:00Not After11/01/2031, 23:59SubjectCN=Symantec SHA256 TimeStamping CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
54:58:f2:aa:d7:41:d6:44:bc:84:a9:7b:a0:96:52:e6Certificate
IssuerCN=Symantec SHA256 TimeStamping CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USNot Before02/01/2017, 00:00Not After01/04/2028, 23:59SubjectCN=Symantec SHA256 TimeStamping Signer - G2,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
78:ed:99:15:fb:fd:b6:05:27:52:c8:d7:3b:4d:d2:f5:ca:be:80:0d:f2:31:08:82:67:23:53:c5:e5:7b:2b:d0Signer
Actual PE Digest78:ed:99:15:fb:fd:b6:05:27:52:c8:d7:3b:4d:d2:f5:ca:be:80:0d:f2:31:08:82:67:23:53:c5:e5:7b:2b:d0Digest Algorithmsha256PE Digest Matchesfalseae:78:4a:c5:7f:d5:b2:fa:d0:56:a0:11:b8:ab:9c:4f:a4:4c:06:58Signer
Actual PE Digestae:78:4a:c5:7f:d5:b2:fa:d0:56:a0:11:b8:ab:9c:4f:a4:4c:06:58Digest Algorithmsha1PE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
CryptSetHashParam
A_SHAFinal
cabinet
ord11
crypt32
CryptEncodeObject
cryptdll
MD5Update
dnsapi
DnsFree
fltlib
FilterFindFirst
netapi32
NetServerGetInfo
I_NetServerAuthenticate2
ole32
CoInitializeEx
oleaut32
VariantInit
rpcrt4
RpcMgmtEpEltInqNextW
shlwapi
PathIsDirectoryW
samlib
SamiChangePasswordUser
secur32
QueryContextAttributesW
shell32
CommandLineToArgvW
user32
IsCharAlphaNumericW
GetUserObjectInformationW
GetProcessWindowStation
GetUserObjectInformationW
userenv
CreateEnvironmentBlock
version
GetFileVersionInfoSizeW
hid
HidD_GetAttributes
setupapi
SetupDiGetDeviceInterfaceDetailW
winscard
SCardControl
winsta
WinStationCloseServer
wldap32
ord140
msasn1
ASN1_CreateModule
ntdll
RtlFreeAnsiString
kernel32
GetVersionExW
GetVersionExA
GetSystemTimeAsFileTime
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
msvcrt
isspace
wtsapi32
WTSSendMessageW
Exports
Exports
�(����T୷�*K���������k�%�s��I�C b*j ��PT����'�Ƙ�G#%5����q��S����\��&�Uԡd��0�+邺��s��!�B�AN3�%DӼԊY���-��b{��(Z�����" F`b7���H�T�[���p�Gۻ/��,O����� �0'0�`�q�r�$㡩h�~�-Sf+t��<w����y��l�Q�yiZ�kcfc��I�vkܫ�EI=~����ũ���q�3;t*��^>]����Ӟ��'R>z9����h��j.�:;9����B����#"q3?f!uV�t���<B��3�=z�e��0V��6h:�p��J��v�YO��;׆���[��WoY�s΄K����q..�t��O�O�H�������۪R.E���)��msd:�A�u�xn7��Ǐʽ6k� �J�,���?qC|�|��U�����i|�0�Kr]h�E5ţ�{>^�x�Xx��و���5�Q��j�2��7wN�D|Ϟ�H����0���F��v��N} Y��悷�i�����SE|�y�Z?�r�^��P@���h�G�MY�U��x���#Q¹h����M8���V�7�+Q��0��%���*��y�}T؍s��[���`>u�}~�L��_8�'K��b���������0�@��_e�fIj8^�W�$��l|%���h�����}!ge?4�9���`��X�c�x0��U(�r��"%���.$��/�Q�������]ϡ�mb�0-���HP@8�lq�Q��24{2I�<��hj��2��*�1e�v��y�)B�e���e�'zʢ�n�-<��cs����̺c���*���_#��2���� ����A���y�R��Zx{��h��w�U�AϪч(�h 1��~Ε��.8�����4��@���6h�U4����i��g����,7\�M�|�=?���z ��%��8 �뒴ſ���4��ft�������m�h�8�Z���ጮ��J�-�����e;��K��vP���9�{�9.���x8��Ws+ʉ�%t�O�q�gT�ye���3 D�a���pM�bEG[��o>b9;��d��ߙl�!��c�J.�h���M�l� ��w�G��l6EHN�l��JQq�M��/=Ef,k��5r� ���έ���.E���|�ۨ�W��f�D*�b[`�:���@@KӒ܀�l�:(�/�Y�o����4}�{�?֝W���Щ�d�2�-|��W���T�wv@&�I7���Q��M����H��C��a&�u�����9�C�>v$^�$���s�u���y��@�㙲y�rќF��U�F�Xa�N�1K>�HxY4� ;=(��x��`J��>���'�8bO���:z�6��Z�@�"�����QK��,���b���4]�`���T����"%8L�o��x�6�g�����nM_��>DT��Q}���e�-Ս� ځ�x�ox�3}UIbW�u�/0�V<�C��Q/y��,P���̠�r/�y�l����;,�g��K�߲�'�uX�aW��3=P��mHi-�/\H�^r���]��Y$})6���D{*�����l��s)�a�}r��E>�m.���C�&4UȂ�K�����"��dГ�}78{<��{�4 ���e��Ɠ��xvRc"aWԓ�(����|��>�S(�ibvX������IAb���8��m6��>Ȋ�-Җ{����e��o�wq�*���}��|��3��Gr��p�ýu�$."e��D��3V���k�zʠ|㲇��ᴤ�����mX�Y��?V��G"Y��� �O�X�Y�r�4f2�D�^��!_�d؎2i5�~8���<���\�]O�)�!��2yP奲| �+�#����t�7��9ê�^��4�3����� ���̙�~gܸC W�G=;���9�o�������*�:�+)�]/c��6���ڂnFiUGiX�9�Uħ%K������e���/��j�@�g����:�\=��m,fs�}��Y��D@�\5�%�G7��F;�ݭ�W�*B�Yݚ�L1�eӫ�.��.j#S ���L�N�B�Q��|�\cJ�`�?_�X���������3`��R*'����i<��CjV⻟%D�GL��Xn<c���#7�pt�L^pI�UЙF`�[0�� I�<G��w%-��,S�_�{yD���Zg�9���K�m� ��--g�T}i�4=��W5�4O���H��͘Ƃ� 8%����zY���$�� �\��W��dM�K�m����y߬�x����k��NŊ����v-�M��1�8���f!L���믤����{y����)�{!�0��u\^O��g�W�OS8��ӥ�U�x����V�a&S�R`���8f@���cҶ�+���M���T$���&ɴ �BF�_;���D{B����[� З�*V���Ǥ��"B8Aa$'����ɷ1����Q�[K�����#\;��U�k�:S�`�E��C��7��㏜%���A���F4�')�~��a�g��"�)�#�VyR�/�<���aח6)�8�5�V�.@˸�p�۾7����<[�ZY��Y$i�����u3In �9�l�Z���ӥ��x�� ����DAr�qM�M�� ���9ˎ&� �6lh2����R;�r,��>��_,�2mo/��y-���LlZ�C�Vr���c\�^���43�4Ʊ� �>� �����q#Y���R�zC<����)��N {�:�����z��go�̋θ{���?*����Ȅ9���*��~��r�S�A_��6���IO7��u�*׀�ʲvؓ=oM��I�e|���ֺ�&s2I���d[�=ۥL)�����gv ��O�@��!�@dT|���<Z� ��&F��J���lC��G@��~�A�b�:�Lqht��w��Z*d���VG1Be�������>�c�����H������jF-��dx�X�h Fa�G�hK��:�X�A{�� ��� q�b��ӲJp�gt�Y�%��`^�a���/<~|n�3Y��+�+`U]^�}��NZ�=�t�&8A'f��0�F���
Sections
.text Size: - Virtual size: 784KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 359KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 3.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 156B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 279KB - Virtual size: 278KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Erebus-master/post/SpaceRunner/System.Management.Automation.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
System.Management.Automation.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 6.1MB - Virtual size: 6.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Erebus-master/post/SpaceRunner/spacerunner.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Erebus-master/post/SpaceRunner/template.cs.js
-
Erebus-master/post/ew/x32.exe.exe windows:4 windows x86 arch:x86
14bf2a0b2c46c28de7035254c941b6ea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CreateThread
DeleteCriticalSection
EnterCriticalSection
ExitProcess
GetLastError
GetModuleHandleA
GetProcAddress
InitializeCriticalSection
LeaveCriticalSection
SetUnhandledExceptionFilter
Sleep
TlsGetValue
VirtualProtect
VirtualQuery
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
atoi
calloc
fprintf
free
fwrite
getenv
malloc
memcpy
memset
perror
printf
putchar
puts
signal
strcmp
strcpy
strncpy
vfprintf
wsock32
WSAStartup
__WSAFDIsSet
accept
bind
closesocket
connect
gethostbyname
htons
inet_ntoa
listen
recv
select
send
socket
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
Erebus-master/post/ew/x64.exe.exe windows:4 windows x86 arch:x86
14bf2a0b2c46c28de7035254c941b6ea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CreateThread
DeleteCriticalSection
EnterCriticalSection
ExitProcess
GetLastError
GetModuleHandleA
GetProcAddress
InitializeCriticalSection
LeaveCriticalSection
SetUnhandledExceptionFilter
Sleep
TlsGetValue
VirtualProtect
VirtualQuery
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
atoi
calloc
fprintf
free
fwrite
getenv
malloc
memcpy
memset
perror
printf
putchar
puts
signal
strcmp
strcpy
strncpy
vfprintf
wsock32
WSAStartup
__WSAFDIsSet
accept
bind
closesocket
connect
gethostbyname
htons
inet_ntoa
listen
recv
select
send
socket
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
Erebus-master/script/Invoke-EternalBlue.ps1.ps1
-
Erebus-master/script/MS16-032.ps1.ps1
-
Erebus-master/script/wmic_info.bat
-
Erebus-master/script/xen-mimi.ps1.ps1
-
Erebus-master/script/xencrypt.ps1.ps1
-
Erebus-master/server/Erebus-email.cna
-
Erebus-master/setting.txt
-
Erebus-master/third/EventLogMaster/Func.ps1.ps1
-
Erebus-master/third/EventLogMaster/eventlog.cna
-
Erebus-master/third/rdpthief/RdpThief.cna
-
Erebus-master/third/rdpthief/RdpThief_x64.tmp