DISCLAIMERS
The information contained in this repo is for educational purposes ONLY! I DO NOT hold any responsibility for any misuse or damage of the information provided in my blog posts, discussions, activities, repositories, or exercises.
Nemo
What does it do:
- Manipulates local and domain policies
- Disables Windows Firewall.
- Disables Windows task manager.
- Disables selected binaries.
- Deletes Windows Defender AV signature database.
- Deletes Windows Defender.
- Creates a Powershell profile.
- Drops firewall rules
- Starts WinRM & RDP.
- Creates users.
- Remaps powershell aliases
- Hides processes, files, and directories that start with $vmware-{whatever}
- Runs multiple processes to do different tasks mentioned below.
- Removes everything from event manager (The initial deployment)
List of processes:
Example:
What is it
- Real binary name: KeyChain.exe
- Real binary path: {path}
- Hidden binary name: $vmware-005.exe
- Hidden binary path: {path}
- Description:
- It does something.
Keylogger
- Real binary name: KeyChain.exe
- Real binary path: {path}
- Hidden binary name: $vmware-005.exe
- Hidden binary path: {path}
- Description:
- It sends everything back to :80/bose.php.
Callbacks
- Real binary name: PFRE.exe
- Real binary path: C:\Windows\
- Hidden binary name: $vmware-001.exe
- Hidden binary path: C:\ProgramData\Microsoft\Windows\Caches\
- Description:
- This binary sends back a shell to S-Nemo.py
Malware
- Real binary name: WinHypro.exe
- Real binary path: C:\Windows\
- Hidden binary name: $vmware-002.exe
- Hidden binary path: C:\ProgramData\Microsoft\Windows\Caches\
- Description:
- Infects every new file in the system according to your needs.
- Removes for all Sysinternals binaries.
Nemo.exe
- Real binary name: Wherever you want
- Real binary path: Wherever you want
- Hidden binary name: Has no hidden process
- Hidden binary path: Has no hidden process
- Description:
- This is the implant that downloads, configures, and installs all the needed files.
- It needs to run once. It's the process that starts everything.
Installing Rootkit
- Real binary name: NT.exe
- Real binary path: C:\Program Files\Windows NT\
- Hidden binary name: Has no hidden process since it runs once
- Hidden binary path: Has no hidden process since it runs once
- Description:
- NT.exe is what loads .dll into
Checker
- Real binary name: WMSys.exe
- Real binary path: C:\Windows\
- Hidden binary name:$vmware-000.exe
- Hidden binary path: C:\ProgramData\Microsoft\Windows\Caches\
- Description:
- This binary makes sure that Nemo implant is running aka makes sure that Red-Team has a shell by checking that $vmware-001.exe and $vmware-002.exe are running.
- Resets and appends firewall rules
Clean.exe
- Real binary name: Wherever you want
- Real binary path: Wherever you want
- Hidden binary name: Has no hidden process
- Hidden binary path: Has no hidden process
- Description:
- This binary cleans almost every evidence after deploying Nemo
Execution flow
Diagram Symbols:
Flow:
In action:
First interaction with the RedTeam server to download the needed malware.
Beaconing to pwnboard.
Hidden processes.

Formed in 2009, the Archive Team (not to be confused with the archive.org Archive-It Team) is a rogue archivist collective dedicated to saving copies of rapidly dying or deleted websites for the sake of history and digital heritage. The group is 100% composed of volunteers and interested parties, and has expanded into a large amount of related projects for saving online and digital history.



