{
	"id": "652fc64b-87cd-4fc4-8004-93e7445c1427",
	"created_at": "2026-04-06T00:10:15.139822Z",
	"updated_at": "2026-04-10T13:11:38.137819Z",
	"deleted_at": null,
	"sha1_hash": "f1f2ddce39791f193a65342bb91cb2034276746c",
	"title": "GitHub - arsium/HorusEyesRat_Public: Remote Acess Tool Written in VB.NET",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 36387,
	"plain_text": "GitHub - arsium/HorusEyesRat_Public: Remote Acess Tool\r\nWritten in VB.NET\r\nBy arsium\r\nArchived: 2026-04-05 17:38:02 UTC\r\nRemote Access Tool Written in VB.NET\r\nIn the current circumstances , I authorize you to hack your government against the measurements they took for the\r\n\"covid-19\". The deprivation of the liberty has to be punished.\r\nServer : .NET 4.8\r\nClient : .NET 4.5\r\nBOOL APIENTRY DllMain( HMODULE hModule,\r\n DWORD ul_reason_for_call,\r\n LPVOID lpReserved\r\n )\r\n{\r\n switch (ul_reason_for_call)\r\n {\r\n case DLL_PROCESS_ATTACH:\r\n MessageBoxA(NULL, \"Hello World!\", \"Dll says:\", MB_OK);\r\n case DLL_THREAD_ATTACH:\r\n case DLL_THREAD_DETACH:\r\n case DLL_PROCESS_DETACH:\r\n break;\r\n }\r\n return TRUE;\r\n}\r\nSource: https://github.com/arsium/HorusEyesRat_Public\r\nhttps://github.com/arsium/HorusEyesRat_Public\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://github.com/arsium/HorusEyesRat_Public"
	],
	"report_names": [
		"HorusEyesRat_Public"
	],
	"threat_actors": [],
	"ts_created_at": 1775434215,
	"ts_updated_at": 1775826698,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/f1f2ddce39791f193a65342bb91cb2034276746c.pdf",
		"text": "https://archive.orkl.eu/f1f2ddce39791f193a65342bb91cb2034276746c.txt",
		"img": "https://archive.orkl.eu/f1f2ddce39791f193a65342bb91cb2034276746c.jpg"
	}
}