ALERT!
Click here to register with a few steps and explore all our cool stuff we have to offer!

Jump to content



Photo

Targeted Private Ransomware Builder


  • Please log in to reply
Targeted Private Ransomware Builder

#21

Aesculapius
Aesculapius
    Offline
    16
    Rep
    31
    Likes

    Junkie

Posts: 397
Threads: 17
Joined: Aug 28, 2016
Credits: 0

Seven years registered
#21

Added:

 

Multi-Threading encryption.

Recycle Bin erasing before encryption is started.


Edited by Aesculapius, 31 January 2021 - 05:24 PM.

  • 0

#22

Aesculapius
Aesculapius
    Offline
    16
    Rep
    31
    Likes

    Junkie

Posts: 397
Threads: 17
Joined: Aug 28, 2016
Credits: 0

Seven years registered
#22

Updates:

 

--Added ARP listing (LAN IP addresses that are alive will be mounted as network drives and encrypted if possible).

--Wake-on-Lan. It will wake-up terminals in the network recently gone to sleep or turned-off (if bios is set accordingly) so they can be encrypted.


Edited by Aesculapius, 31 January 2021 - 05:24 PM.

  • 0

#23

dadd011
dadd011
    Offline
    0
    Rep
    0
    Likes

    New Member

Posts: 15
Threads: 0
Joined: Dec 05, 2019
Credits: 0
Four years registered
#23

 

Characteristics:

 

--Small file size client.

--Builder can steal icons from another executable or load any png or ico file.

--Low antivirus detection without encryption.

--Self delete client after encryption is done.

--Encryption key is erased after encryption which makes very hard to recover the key.

--Strong encryption algorithm.

--File extensions to be encrypted can be configured.

--Decryptor is provided (requires encryption key used at the moment of building).

--Totally configurable: client name, ransom message, ransom filename, encrypted extension, directories to be attacked, BTC address, special directories to be attacked.

--Automatic internet updates.

--Fully Tested in Windows 10.

 

Some technical facts:

 

Functional wise all occurs automatically behind cameras, when the builder is first opened a random key is generated automatically there's a button to change it though if you need to create several ransom files a log file is created containing all created ransom executables info and also each individual decryption key. It is also possible to customize the directories to attack or let the malware encrypt all.
In targeted attacks you could happen to know which directory or directories are better to encrypt and in such case is better to set only those directories because encryption will be faster and the user will have less time to react.
The builder let you also configure the encryption extension so you can add a personal touch to the process like .die or .death or whatever encryption extension you wish to set.
it is also possible to change the ransom note filename and its content however default values are good enough. This builder creates targeted malware clients. Targeted attacks are the new technique in attacks where you don't let your malware to spread randomly instead you strike few valuable computers. This is why the malware once encryption is done will delete itself making forensics harder and key recovery almost impossible.

 

 

2019-10-20-15-56-31-Window.png

 

LAN SPREADING READY:

 

malware-worms-blog-banner-730x300.png

 

Without encryption:

 

XUaFNvfdRX04.png

 

2019-10-12-22-31-14-Window.png

 

2019-10-12-22-31-31-Window.png

 

 

LIVE NONE FUD SAMPLE TO BE TESTED IN VIRTUAL MACHINE ONLY:

 

https://www.upload.e...er_Fix.rar.html

 

Automatic updates video tutorial:

 

https://vimeo.com/365999651

 

How to use:

 

https://vimeo.com/366370243

 

Unique Dynamic Key per User System:

 

https://vimeo.com/367345566

 

https://shoppy.gg/product/5PnGjxh

 

Contact:

 

Discord Server: https://discord.gg/NfWd3kK

xmpp: aesculapius@xmpp.jp

 

 

thanks as lot hsave to tryout


  • 0

#24

Aesculapius
Aesculapius
    Offline
    16
    Rep
    31
    Likes

    Junkie

Posts: 397
Threads: 17
Joined: Aug 28, 2016
Credits: 0

Seven years registered
#24

Change Log:

 

--RootKit 32&64bit

 

--Client expiration option.

 

--LogOn encryption notification.


Edited by Aesculapius, 31 January 2021 - 05:24 PM.

  • 0

#25

Creativemind
Creativemind
    Offline
    0
    Rep
    1
    Likes

    Advanced Member

  • PipPipPipPip
Posts: 97
Threads: 4
Joined: May 21, 2019
Credits: 0

Four years registered
#25

bfguykg


  • 0

#26

nocay
nocay
    Offline
    0
    Rep
    0
    Likes

    Lurker

  • Pip
Posts: 3
Threads: 0
Joined: May 19, 2020
Credits: 0
Three years registered
#26

 

Characteristics:

 

--Small file size client.

--Builder can steal icons from another executable or load any png or ico file.

--Low antivirus detection without encryption.

--Self delete client after encryption is done.

--Encryption key is erased after encryption which makes very hard to recover the key.

--Strong encryption algorithm.

--File extensions to be encrypted can be configured.

--Decryptor is provided (requires encryption key used at the moment of building).

--Totally configurable: client name, ransom message, ransom filename, encrypted extension, directories to be attacked, BTC address, special directories to be attacked.

--Automatic internet updates.

--Fully Tested in Windows 10.

 

Some technical facts:

 

Functional wise all occurs automatically behind cameras, when the builder is first opened a random key is generated automatically there's a button to change it though if you need to create several ransom files a log file is created containing all created ransom executables info and also each individual decryption key. It is also possible to customize the directories to attack or let the malware encrypt all.
In targeted attacks you could happen to know which directory or directories are better to encrypt and in such case is better to set only those directories because encryption will be faster and the user will have less time to react.
The builder let you also configure the encryption extension so you can add a personal touch to the process like .die or .death or whatever encryption extension you wish to set.
it is also possible to change the ransom note filename and its content however default values are good enough. This builder creates targeted malware clients. Targeted attacks are the new technique in attacks where you don't let your malware to spread randomly instead you strike few valuable computers. This is why the malware once encryption is done will delete itself making forensics harder and key recovery almost impossible.

 

 

2019-10-20-15-56-31-Window.png

 

LAN SPREADING READY:

 

malware-worms-blog-banner-730x300.png

 

Without encryption:

 

XUaFNvfdRX04.png

 

2019-10-12-22-31-14-Window.png

 

2019-10-12-22-31-31-Window.png

 

 

LIVE NONE FUD SAMPLE TO BE TESTED IN VIRTUAL MACHINE ONLY:

 

https://www.upload.e...er_Fix.rar.html

 

Automatic updates video tutorial:

 

https://vimeo.com/365999651

 

How to use:

 

https://vimeo.com/366370243

 

Unique Dynamic Key per User System:

 

https://vimeo.com/367345566

 

https://shoppy.gg/product/5PnGjxh

 

Contact:

 

Discord Server: https://discord.gg/NfWd3kK

xmpp: aesculapius@xmpp.jp

 

gimme it


  • 0

#27

Aesculapius
Aesculapius
    Offline
    16
    Rep
    31
    Likes

    Junkie

Posts: 397
Threads: 17
Joined: Aug 28, 2016
Credits: 0

Seven years registered
#27

Change Log>

 

--New third party backup solutions have been added to the list that will be disabled along with some antivirus services.
--Client now will not only self delete at end of encryption but also physically erase its own sectors in the hard drive to make forensics more difficult.
--A fast files permission changing feature procedure will help capture more files.
--Ransom note will now be copied earlier before the very start of encryption both in windows logon screen as well as in a hidden location where it will be shown in every windows restart. These two measures will help to profit from partially encrypted targets (in case you haven't use persistence option to asure restarting after windows restart or computer turned off).
--New feature will allow to lock user access from his windows account.
--Bootlocker that will show the ransom note at boot level (not available in UEFI Secure Boot protected OS).


Edited by Aesculapius, 31 January 2021 - 05:25 PM.

  • 0

#28

Aesculapius
Aesculapius
    Offline
    16
    Rep
    31
    Likes

    Junkie

Posts: 397
Threads: 17
Joined: Aug 28, 2016
Credits: 0

Seven years registered
#28

Change Log:

 

--Startup note improved.

--uppercase exe and dll extensions excluded from scanning in "all files encryption mode".

--Boot Locker option code improved.

--Windows defender signatures removed.

--Added Safe Mode Encryption (for OS that supports it). Its a good method to avoid antivirus interference provided OS can be rebooted into safe mode without user interaction. Encryption is faster in this mode.

After encryption is done, next reboot will be set to normal mode again. LAN shares will also be encrypted in this mode.


Edited by Aesculapius, 31 January 2021 - 05:25 PM.

  • 0

#29

Aesculapius
Aesculapius
    Offline
    16
    Rep
    31
    Likes

    Junkie

Posts: 397
Threads: 17
Joined: Aug 28, 2016
Credits: 0

Seven years registered
#29

Change Log:

 

--Added log registry to save the windows LogOn password in case changing it is selected as an option.

--Improved decryptor directories traversing speed.

--Added ability to encrypt impersonating a system process.


Edited by Aesculapius, 31 January 2021 - 05:25 PM.

  • 0

#30

sidou06
sidou06
    Offline
    0
    Rep
    0
    Likes

    Member

Posts: 37
Threads: 0
Joined: Jul 29, 2019
Credits: 0
Four years registered
#30

best article i read today nice work !!


  • 0


 Users browsing this thread: