Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   4268

#1 - SILENT MINER MALWARE ⭐ PRIVATE ⭐ UNDETECTABLE (FUD) ⭐ FREE CRYPT ⭐ GET RICH

by Interstellar - 13 December, 2024 - 03:00 AM
This post is by a banned member (Interstellar) - Unhide
3.229
Posts
1.178
Threads
#17
(29 December, 2024 - 11:14 AM)minepoof Wrote: Show More
How many loads would it take to get to 3MH/s and make ~$84 / day as you claim? 1k? 2k?

Depends on many factors.

This is not a easy math, reach me out on Telegram so we can discuss more in details
This post is by a banned member (Interstellar) - Unhide
3.229
Posts
1.178
Threads
Bumped #18
This is a bump
This post is by a banned member (k00ki) - Unhide
k00ki  
Registered
72
Posts
0
Threads
#19
wwwww
This post is by a banned member (Interstellar) - Unhide
3.229
Posts
1.178
Threads
Bumped #20
This is a bump
This post is by a banned member (MrSh4dow) - Unhide
MrSh4dow  
Infinity
402
Posts
62
Threads
#21
Hey man I told you I'll be contacting you and here I'm. I got you back with couple of questions waiting an answer from you.

Does the miner get detected? The malware / miner is detected by antivirus / microsoft defender mainly? Does it have a info logger? Does it require admin perms when executed for the first time? Does it slow down the computers?
[Image: xylo-ad.gif]
[Image: cooldog.gif] ^ Best Free Community ^  [Image: cooldog.gif]
This post is by a banned member (Interstellar) - Unhide
3.229
Posts
1.178
Threads
Bumped #22
(This post was last modified: 01 January, 2025 - 10:14 PM by Interstellar.)
Does the miner get detected?
- Regarding detections, the file comes already crypted and today 01/01/2025 the file natively (without crypt) is FUD and the crypting is also FUD, making a perfect combo to spread. Some chinese or random antiviruses may (and the may here is precise, because it's completely random) trigger some alert, but 100% ml detections (Machine Learning), as in, false positives, that happen even in real legit files, no one can really provide something that stops dumb antiviruses.

Detections can raise with time for your specific build after spreading a lot, because many antiviruses will already receive your file sample and with time learn how to detect it, no one can provide a malware that this doesn't happen. It should work well in any case, to reach a point where it gets detected can take more than a year, all depends how many people analyzing your file with their AVs

The malware / miner is detected by antivirus / microsoft defender mainly?
- No, our main focus was to always bypass the most common antivirus, Windows Defender. Just like stated above, with time Windows Defender may start learning how to analyze your build, but in this case a simple rebuild will fix your issue, and to reach this point can take more than a year. Already infected machines won't get removed because of these future detection, we do a good persistence that makes the antivirus impossible to find it.

Does it have a info logger?
- No info logger, it's a miner. All miner data you can see via pool.

Does it require admin perms when executed for the first time?
- Tricky question, it doesn't require the victim to run the file as admin, but will force the victim to accept our elevation request. In summary, if the victim opens with regular permissions, it will force the victim to open as Admin by reprompting UAC.


Does it slow down the computers?
- It will use computer processing, but we've ensured to make a smart system to use just a bit of CPU while the user is active, and only jump to 100% when the user is AFK for 1 minute. Ensuring they won't notice it.

@MrSh4dow let me know if there's anything more you would like to know. Reach me out via telegram for a quicker and more descriptive response.

This is a bump
This post is by a banned member (MrSh4dow) - Unhide
MrSh4dow  
Infinity
402
Posts
62
Threads
#23
(01 January, 2025 - 09:59 PM)Interstellar Wrote: Show More
Does the miner get detected?
- Regarding detections, the file comes already crypted and today 01/01/2025 the file natively (without crypt) is FUD and the crypting is also FUD, making a perfect combo to spread. Some chinese or random antiviruses may (and the may here is precise, because it's completely random) trigger some alert, but 100% ml detections (Machine Learning), as in, false positives, that happen even in real legit files, no one can really provide something that stops dumb antiviruses.

Detections can raise with time for your specific build after spreading a lot, because many antiviruses will already receive your file sample and with time learn how to detect it, no one can provide a malware that this doesn't happen. It should work well in any case, to reach a point where it gets detected can take more than a year, all depends how many people analyzing your file with their AVs

The malware / miner is detected by antivirus / microsoft defender mainly?
- No, our main focus was to always bypass the most common antivirus, Windows Defender. Just like stated above, with time Windows Defender may start learning how to analyze your build, but in this case a simple rebuild will fix your issue, and to reach this point can take more than a year. Already infected machines won't get removed because of these future detection, we do a good persistence that makes the antivirus impossible to find it.

Does it have a info logger?
- No info logger, it's a miner. All miner data you can see via pool.

Does it require admin perms when executed for the first time?
- Tricky question, it doesn't require the victim to run the file as admin, but will force the victim to accept our elevation request. In summary, if the victim opens with regular permissions, it will force the victim to open as Admin by reprompting UAC.


Does it slow down the computers?
- It will use computer processing, but we've ensured to make a smart system to use just a bit of CPU while the user is active, and only jump to 100% when the user is AFK for 1 minute. Ensuring they won't notice it.

@MrSh4dow let me know if there's anything more you would like to know. Reach me out via telegram for a quicker and more descriptive response.

This is a bump
Thank you for taking the time for writing the answer it makes a difference between others.

Okay so regarding the UAC elevation stuff can't it be disabled? Or it's a must cuz I can infect approximately 100 computers of my school but without admin so if it prompts admin then I sucked. Also regarding the miner the data, yes I wanted to know that if it gathers nothing that was my point so +1 as well.

Another thing is about the mining info like I see how much I can earn x day is that possible? From your website or idk some endpoint to gathe4 that information.

Also if it's possible so use another pool (public) and not the one you prodiving beforehand.

And that's it only that if the miner can be running on background withoout needing privilege perms it will be great and if I can see somehow how many devices etc are mining
[Image: xylo-ad.gif]
[Image: cooldog.gif] ^ Best Free Community ^  [Image: cooldog.gif]
This post is by a banned member (Interstellar) - Unhide
3.229
Posts
1.178
Threads
#24
(01 January, 2025 - 11:44 PM)MrSh4dow Wrote: Show More
(01 January, 2025 - 09:59 PM)Interstellar Wrote: Show More
Does the miner get detected?
- Regarding detections, the file comes already crypted and today 01/01/2025 the file natively (without crypt) is FUD and the crypting is also FUD, making a perfect combo to spread. Some chinese or random antiviruses may (and the may here is precise, because it's completely random) trigger some alert, but 100% ml detections (Machine Learning), as in, false positives, that happen even in real legit files, no one can really provide something that stops dumb antiviruses.

Detections can raise with time for your specific build after spreading a lot, because many antiviruses will already receive your file sample and with time learn how to detect it, no one can provide a malware that this doesn't happen. It should work well in any case, to reach a point where it gets detected can take more than a year, all depends how many people analyzing your file with their AVs

The malware / miner is detected by antivirus / microsoft defender mainly?
- No, our main focus was to always bypass the most common antivirus, Windows Defender. Just like stated above, with time Windows Defender may start learning how to analyze your build, but in this case a simple rebuild will fix your issue, and to reach this point can take more than a year. Already infected machines won't get removed because of these future detection, we do a good persistence that makes the antivirus impossible to find it.

Does it have a info logger?
- No info logger, it's a miner. All miner data you can see via pool.

Does it require admin perms when executed for the first time?
- Tricky question, it doesn't require the victim to run the file as admin, but will force the victim to accept our elevation request. In summary, if the victim opens with regular permissions, it will force the victim to open as Admin by reprompting UAC.


Does it slow down the computers?
- It will use computer processing, but we've ensured to make a smart system to use just a bit of CPU while the user is active, and only jump to 100% when the user is AFK for 1 minute. Ensuring they won't notice it.

@MrSh4dow let me know if there's anything more you would like to know. Reach me out via telegram for a quicker and more descriptive response.

This is a bump
Thank you for taking the time for writing the answer it makes a difference between others.

Okay so regarding the UAC elevation stuff can't it be disabled? Or it's a must cuz I can infect approximately 100 computers of my school but without admin so if it prompts admin then I sucked. Also regarding the miner the data, yes I wanted to know that if it gathers nothing that was my point so +1 as well.

Another thing is about the mining info like I see how much I can earn x day is that possible? From your website or idk some endpoint to gathe4 that information.

Also if it's possible so use another pool (public) and not the one you prodiving beforehand.

And that's it only that if the miner can be running on background withoout needing privilege perms it will be great and if I can see somehow how many devices etc are mining


We could possibly make a custom miner without the UAC, but this would cause many important feature to be completely gone. 100 computers is a pretty nice spreading, but you could also gather this with online spreading with ease.

Yes you can pick the pool, we don't have our own pool, neither a website, it's fully yours not being connected at all with us. You pick the pool you want to mine, we recommend Nanopool but any works as long as you set the right port, etc.

The mining informations you gather is from the pool website, they will provide your hashrate, average mining, estimative or earnings, and obviously your balance. The withdraws are automatic and also under control of the pool you pick, again, we don't have any control over that.

Once again, to see how many devices are mining, also in the pool website.

An example of pool is Nanopool: xmr.nanopool.org
There you can find another wallets mining currently and see how it would look like.

@MrSh4dow

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: clipsta, 4 Guest(s)