ebowla-2 icon indicating copy to clipboard operation
ebowla-2 copied to clipboard

reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support

Ebowla-2

reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support

Building / Running

the following is an example of compiling a hello world golang exe, packaging it into an encrypted package, and finally, building the implant with the package embedded within.

cd example
go build
mv example.exe ..\package\example.exe
cd ..\package\
go run .\main.go -s 'C:\Windows\System32\AboveLockAppHost.dll' -p .\example.exe
mv .\package ..\implant\
cd ..\implant\
go build -ldflags "-X main.seedPath=C:\Windows\System32"
.\implant.exe

Concept Presentation Resources

Slides:

  • Infiltrate 2016: https://github.com/Genetic-Malware/Ebowla/raw/master/Infiltrate_2016_Morrow_Pitts_Genetic_Malware.pdf
  • Ekoparty 2016: https://github.com/Genetic-Malware/Ebowla/blob/master/Eko_2016_Morrow_Pitts_Master.pdf

Demos:

  • https://www.youtube.com/watch?v=rRm3O7w5GHg
  • https://youtu.be/Bu_qDrbX9Zo
  • https://youtu.be/mlh70LtwmDo
  • https://youtu.be/lyedtAtATGc (PowerShell)

Payload Support

Shared Object
exe

Contributors

Original Project:

  • https://github.com/wired33 (wrote most of the golang payload code)
  • https://github.com/secretsquirrel (wrote the python payload code and most of the encryption code)

This Project:

  • https://github.com/secretsquirrel