Sale!

Ransomware Builder Download [Setup]

$500.00 $300.00  /  0.03144 Ƀ

With this ransomware builder you can create your own ransomware to encrypt files by bitcoin.

Description

With this ransomware builder you can create your own ransomware to encrypt files by bitcoin.

General characteristics:

  1. –Almost 10 thousand lines of code.
  2. –Coded in C# .NET framework 3.5.
  3. –Many classes build from the ground up.
  4. –Extensive and fully explained configuration file.
  5. –Size around 5 Mb.
  6. –Over 100 skins provided.
  7. –Advanced spreading features
  8. –Rootkit to hide executable included and automatic.
  9. –Debug testing safe sample mode.
  10. –Extensively tested.
  11. –Runs from Win7 and up.
  12. –Low CPU usage. All functions use multi threading.
  13. –Simulates system process.
  14. –Melting and relocation.
  15. –Extensive punishment if ransom not paid – goes up to all hard drives deletion and killing boot.
  16. –Attacker regularly informed of ransomware actions.

Interface:

  1. –Windows frame and icon in windows taskbar are invisible, however you can still drag around the ransomware main window with the mouse to clear the browser visibility to make the payment.
  2. –Instructions have background transparency.
  3. –Copy to clipboard Bitcoin Address button.
  4. –Links to both Bitcoin technology explanation and payment website address.
  5. –Cool Wallpaper changer (loads wallpaper file from a selected URL.
  6. –Market BTC value is shown in real time in main interface.
  7. –A Skinned system is used to easily change the malware main interface look and feel.

Payment system:

  1. –Totally automated using Coinpayments, Block.Io accounts.
  2. –You don’t need to risk by giving any email address.
  3. –No attacker intervention.
  4. –Each victim gets an individual unique BTC address.

Security features:

  1. –The ransomware disables the task manager (it is restored after payment) to prevent being killed from memory.
  2. –The ransomware also sets itself as an un-killable process. In case the user manages to kill it, the whole windows will crash with a BSOD.
  3. –All needed dll files are deployed by the malware itself. No need for external files.
  4. –USB Stick, network drives, network cards Spreading.
  5. –Intranet spreading by lateral movement and WMI exploits.
  6. –Spreading through HTML email attachment and FUD word macro.
  7. –Autorun enabler for removable devices.
  8. –EternalBlue Exploit scanner and spreading. DoublePulsar report and spreading.
  9. –Windows defender is disabled. Can’t be turned back on easily and it will stay off after restart. Also AVG and MalwareBytes.
  10. –Bot Killer.
  11. –Windows explorer options modified so hidden files can not be seen (might not always work depending on OS version or may require restart).
  12. –Anti sniffers code.
  13. –Windows Update Disabler.
  14. –System Restore Killer.
  15. –Disable UAC (no admin for victim).
  16. –Disable Regedit.
  17. –Disable CMD.
  18. –Windows Serial Number retrieval. Send back to attacker by email.
  19. –Use the app as ransomware or as worm. Option to not encrypt any file and not request any ransom, only spread through different mechanisms and install rat or any other file of choice.
  20. –Change permissions of all files belonging to all the users in a intranet so they can be all encrypted.
  21. –Businesses and Enterprises databases encryption.
  22. –Anti virustotal and virusscan.
  23. –Admin configurable user account is created in victim’s computer, thereby if attacker has access to that network then he can login as Admin (logged victim has to be admin in the first place).
  24. –Clean-Up after ransom is paid.
  25. –BlueKeep vulnerability scanner. Results are sent back to attacker by email.
  26. –Custom smtp server can be easily set.
  27. –You can add wallets of other coins different than btc.
  28. –Wallets are handled intelligently. Once one wallet runs out of new addresses, the next one is used.
  29. –Mass mailer. It works with a list of free smtp servers and a list of email addresses combined used to send an infected email copy of itself.
  30. –Random Domain Generation. RDG is a great technique to avoid your malware communication channel being taken down. It will generate hundreds of domains a day with which it will simulate to contact. Immerse in this big lot of communications traffic your real channel of communication will be disguised. Only one or two of these random domains is really registered and used by the malware, the rest are decoys. Can be turned on or off and you can select how many visits/day to random domains it will perform.
  31. –Encryption of files up to 1000 MB in size.
  32. –Encryption password option to make it static or dynamic. In dynamic mode, the custom decryptor (provided) is no longer effective and each new computer will have a different encryption password.
  33. –Dynamic ransom amount. If set to yes, the ransom will increase progressively each certain pre-configured number of hours and in certain pre-configured percentage. There is also a variable to set the maximum posible increase to prevent for excessively high ransom amounts.
  34. –Variable purge time interval cycle. This variable allows you to set a variable time cycle after which files are erased.
  35. –Possibility to configure in config,cs if a large number of files is erased or not if malware is restarted as punishment and how many files will be erased. Erasing will only occur after malware has melted and is relocated to its final hidden directory.
  36. –Impossibility to erase malware directory or associated files. For this to work the malware has to be run elevated (so run elevated variable in config.cs has to be set to true), if not, it will ask for elevation; to prevent for such a situation, it will only try to protect the directories if it is running elevated in the first place.
  37. –Forensics Evidence Cleaner. Something I always want to add but too much coding. Finally its done. This feature can be configured and customized in config,cs. In case the victim is not willing to pay it will look up for all hard drives erasing any trace of its presence, killing every hard drive and finally removing itself.
  38. –Dynamic control email accounts. In case account is banned malware can chose from several others.

Control Panel:

Custom Decryptor (executable and source code Provided):

Added:

  1. –All malware communications are now redirected through Tor Encrypted Network and not only cPanel commands.

To Add:

  1. -Ability to change Tor encryption password on the fly from cPanel.

Reviews

There are no reviews yet.

Be the first to review “Ransomware Builder Download [Setup]”

Your email address will not be published. Required fields are marked *

Translate »