ALERT!
Click here to register with a few steps and explore all our cool stuff we have to offer!

Jump to content



Photo

Targeted Private Ransomware Builder Compiled or Source Code


  • This topic is locked This topic is locked
Targeted Private Ransomware Builder Compiled or Source Code

#1
Vouches 0

Aesculapius
Aesculapius
    Offline
    16
    Rep
    31
    Likes

    Junkie

Posts: 397
Threads: 17
Joined: Aug 28, 2016
Credits: 0

Seven years registered
#1
Vouches 0

Characteristics:

 

--Small file size client.

--Builder can steal icons from another executable or load any png or ico file.

--Low antivirus detection without encryption.

--Self delete client after encryption is done.

--Encryption key is erased after encryption which makes very hard to recover the key.

--Strong encryption algorithm Rijndael large key American Government Standard.

--File extensions to be encrypted can be configured.

--Decryptor is provided (requires encryption key used at the moment of building).

--Totally configurable: client name, ransom message, ransom filename, encrypted extension, directories to be attacked, BTC address, special directories to be attacked.

--Unique Dynamic key per client.

--Persistence, melting, auto obfuscation, send deceiving message while encrypting.

--Low detection profile (bypasses defender - see video).

--Automatic internet updates.

--Runs from Win7 and up.


Edited by Aesculapius, 31 January 2021 - 05:27 PM.

  • 0

#2

Digsby
Digsby
    Offline
    -2
    Rep
    11
    Likes

    Old declined Gold

Posts: 137
Threads: 35
Joined: May 05, 2019
Credits: 0

Four years registered
#2

any vouched copy :D


  • 0

#3

Aesculapius
Aesculapius
    Offline
    16
    Rep
    31
    Likes

    Junkie

Posts: 397
Threads: 17
Joined: Aug 28, 2016
Credits: 0

Seven years registered
#3

Free test live none FUD sample of the ransomware only to be tested ONLY in VIRTUAL MACHINE.


Edited by Aesculapius, 31 January 2021 - 05:27 PM.

  • 0

#4

Aesculapius
Aesculapius
    Offline
    16
    Rep
    31
    Likes

    Junkie

Posts: 397
Threads: 17
Joined: Aug 28, 2016
Credits: 0

Seven years registered
#4

Added:

 

--Release locked files by other apps son more files can be encrypted.

 

--Melted copy now will have different names similar to regular legit apps.

 

--Decryptor now has auto mode full decryption of all drives at once.


Edited by Aesculapius, 31 January 2021 - 05:27 PM.

  • 0

#5

Aesculapius
Aesculapius
    Offline
    16
    Rep
    31
    Likes

    Junkie

Posts: 397
Threads: 17
Joined: Aug 28, 2016
Credits: 0

Seven years registered
#5

Builder updated.
Added anti virtual machines, sandbox and anti debuggers


Edited by Aesculapius, 31 January 2021 - 05:27 PM.

  • 0

#6

Aesculapius
Aesculapius
    Offline
    16
    Rep
    31
    Likes

    Junkie

Posts: 397
Threads: 17
Joined: Aug 28, 2016
Credits: 0

Seven years registered
#6

Added: 

 

LAN Spreading.


Edited by Aesculapius, 31 January 2021 - 05:28 PM.

  • 0

#7

Influxes
Influxes
    Offline
    24
    Rep
    132
    Likes

    Developer

Posts: 732
Threads: 69
Joined: Sep 24, 2018
Credits: 0

Five years registered
#7

damn, $350


  • 0

5+ years of development experience 

 

 

 

My one and only Discord is Influxes#0603

Discord ID: 539581928387510273


#8

Aesculapius
Aesculapius
    Offline
    16
    Rep
    31
    Likes

    Junkie

Posts: 397
Threads: 17
Joined: Aug 28, 2016
Credits: 0

Seven years registered
#8

damn, $350

its low detection, lifetime use, free updates and network spreading is not available in any other builder in the net that I know of. Please visit our discord server for free tools too.


Edited by Aesculapius, 25 October 2019 - 05:42 PM.

  • 0

#9

Aesculapius
Aesculapius
    Offline
    16
    Rep
    31
    Likes

    Junkie

Posts: 397
Threads: 17
Joined: Aug 28, 2016
Credits: 0

Seven years registered
#9

Added:

 

On LAN spreading every computer gets a different encryption password.


  • 0

#10

Aesculapius
Aesculapius
    Offline
    16
    Rep
    31
    Likes

    Junkie

Posts: 397
Threads: 17
Joined: Aug 28, 2016
Credits: 0

Seven years registered
#10

Added:

 

--Ftp log reports. Includes date of infection, User name, Machine name, hardware Id, Unique Key Identifier per user (used as firs key need for decryption process) and Number of files successfully encrypted.


Edited by Aesculapius, 31 January 2021 - 05:28 PM.

  • 0


 Users browsing this thread: