Introduction

Ebolas Stealer is a new hybrid malware combining infostealer, RAT, and ransomware capabilities into a single package sold for just $15/week.

The author claims it's fully undetectable (0/73 on VirusTotal), though such claims should be treated with caution. What makes Ebolas concerning is its low barrier to entry and comprehensive feature set.

Warning: This article is for educational purposes only. Always conduct security research in isolated environments.

Ebolas infections have already been observed in the wild. Reddit users have reported encrypted files and ransom notes:

Reddit post showing Ebolas infection
Reddit user seeking help after Ebolas infection
Ebolas ransomware note
Ransom note displayed by Ebolas

Discovery

I first encountered Ebolas on GitHub, where threat actors were distributing it as a fake Roblox cheat impersonating Exunys, a legitimate cheat developer. The malicious executable has since been taken down.

Fake Exunys Roblox cheat
Ebolas distributed as fake Exunys cheat

Note: A detailed malware analysis is in progress. This article will be updated with IOCs and technical findings.

Tactics, Techniques, and Procedures

Tactic ID Technique
Initial Access T1566 Phishing (Discord DM Spreading)
Persistence T1547 Boot/Logon Autostart Execution
Defense Evasion T1497 Virtualization/Sandbox Evasion
Defense Evasion T1027 Obfuscated Files
Credential Access T1555 Credentials from Password Stores
Collection T1005 Data from Local System
Exfiltration T1567 Exfiltration Over Web Service
Impact T1486 Data Encrypted for Impact

Features & Capabilities

Ebolas Stealer Features

Infostealer

Remote Access (RAT)

Ransomware

Notable Commands

Control Panel

The web-based dashboard displays infected systems with online status, allowing operators to establish remote connections with a single click.

Ebolas RAT Dashboard
RAT Dashboard showing infected victims
Discord targeting settings Roblox targeting settings
Discord and Roblox targeting dashboards
Stolen data logs
Logs interface showing stolen data
RAT capabilities on infected system
Infected system showing webcam, file browser, and remote control

Ransomware

When activated, victims see a branded lock screen with encryption notification and contact instructions. The malware also modifies the boot process to display a DOS-style ransom note on startup.

Ebolas lock screen
Ransomware lock screen
Boot screen ransom note
DOS-style boot screen ransom note

Builder & Configuration

The builder allows operators to customize payloads with combined STEALER + RAT functionality, custom icons, version info, and Python payload injection.

Malware builder interface
Builder interface with payload customization
Discord and file filter settings
Discord spreading and file filter configuration
Persistence settings
UAC bypass and persistence levels (Low, High, Ultra)

The author claims anti-analysis measures including honeypots, fake injection points, and deliberately leaked builds to waste researchers' time.

Anti-analysis features
Advertised anti-analysis capabilities

Important: These anti-analysis claims are unverified. Threat actors often exaggerate capabilities to deter analysis.

Recommendations

Tip: Proactive defense significantly reduces risk from hybrid threats like Ebolas.

Conclusion

Ebolas Stealer represents the concerning trend of hybrid malware combining infostealer, RAT, and ransomware capabilities at an accessible $15/week price point. Its comprehensive feature set lowers the barrier to entry for threat actors.

While some advertised features remain unverified, the threat highlights the ongoing need for robust security measures and continuous monitoring of emerging malware trends.