This post is by a banned member (Interstellar) - Unhide
3.229
Posts
1.178
Threads
OP 29 December, 2024 - 01:22 PM
Reply
(29 December, 2024 - 11:14 AM)minepoof Wrote: Show MoreHow many loads would it take to get to 3MH/s and make ~$84 / day as you claim? 1k? 2k?
Depends on many factors.
This is not a easy math, reach me out on Telegram so we can discuss more in details
This post is by a banned member (Interstellar) - Unhide
3.229
Posts
1.178
Threads
OP 30 December, 2024 - 05:08 AM
Reply
This post is by a banned member (k00ki) - Unhide
30 December, 2024 - 06:08 PM
Reply
This post is by a banned member (Interstellar) - Unhide
3.229
Posts
1.178
Threads
OP 31 December, 2024 - 04:20 PM
Reply
This post is by a banned member (MrSh4dow) - Unhide
01 January, 2025 - 06:06 PM
Reply
Hey man I told you I'll be contacting you and here I'm. I got you back with couple of questions waiting an answer from you.
Does the miner get detected? The malware / miner is detected by antivirus / microsoft defender mainly? Does it have a info logger? Does it require admin perms when executed for the first time? Does it slow down the computers?
This post is by a banned member (Interstellar) - Unhide
3.229
Posts
1.178
Threads
OP 01 January, 2025 - 09:59 PM
(This post was last modified: 01 January, 2025 - 10:14 PM by Interstellar.)
Reply
Does the miner get detected?
- Regarding detections, the file comes already crypted and today 01/01/2025 the file natively (without crypt) is FUD and the crypting is also FUD, making a perfect combo to spread. Some chinese or random antiviruses may (and the may here is precise, because it's completely random) trigger some alert, but 100% ml detections (Machine Learning), as in, false positives, that happen even in real legit files, no one can really provide something that stops dumb antiviruses.
Detections can raise with time for your specific build after spreading a lot, because many antiviruses will already receive your file sample and with time learn how to detect it, no one can provide a malware that this doesn't happen. It should work well in any case, to reach a point where it gets detected can take more than a year, all depends how many people analyzing your file with their AVs
The malware / miner is detected by antivirus / microsoft defender mainly?
- No, our main focus was to always bypass the most common antivirus, Windows Defender. Just like stated above, with time Windows Defender may start learning how to analyze your build, but in this case a simple rebuild will fix your issue, and to reach this point can take more than a year. Already infected machines won't get removed because of these future detection, we do a good persistence that makes the antivirus impossible to find it.
Does it have a info logger?
- No info logger, it's a miner. All miner data you can see via pool.
Does it require admin perms when executed for the first time?
- Tricky question, it doesn't require the victim to run the file as admin, but will force the victim to accept our elevation request. In summary, if the victim opens with regular permissions, it will force the victim to open as Admin by reprompting UAC.
Does it slow down the computers?
- It will use computer processing, but we've ensured to make a smart system to use just a bit of CPU while the user is active, and only jump to 100% when the user is AFK for 1 minute. Ensuring they won't notice it.
@ MrSh4dow let me know if there's anything more you would like to know. Reach me out via telegram for a quicker and more descriptive response.
This is a bump
This post is by a banned member (MrSh4dow) - Unhide
01 January, 2025 - 11:44 PM
Reply
(01 January, 2025 - 09:59 PM)Interstellar Wrote: Show MoreDoes the miner get detected?
- Regarding detections, the file comes already crypted and today 01/01/2025 the file natively (without crypt) is FUD and the crypting is also FUD, making a perfect combo to spread. Some chinese or random antiviruses may (and the may here is precise, because it's completely random) trigger some alert, but 100% ml detections (Machine Learning), as in, false positives, that happen even in real legit files, no one can really provide something that stops dumb antiviruses.
Detections can raise with time for your specific build after spreading a lot, because many antiviruses will already receive your file sample and with time learn how to detect it, no one can provide a malware that this doesn't happen. It should work well in any case, to reach a point where it gets detected can take more than a year, all depends how many people analyzing your file with their AVs
The malware / miner is detected by antivirus / microsoft defender mainly?
- No, our main focus was to always bypass the most common antivirus, Windows Defender. Just like stated above, with time Windows Defender may start learning how to analyze your build, but in this case a simple rebuild will fix your issue, and to reach this point can take more than a year. Already infected machines won't get removed because of these future detection, we do a good persistence that makes the antivirus impossible to find it.
Does it have a info logger?
- No info logger, it's a miner. All miner data you can see via pool.
Does it require admin perms when executed for the first time?
- Tricky question, it doesn't require the victim to run the file as admin, but will force the victim to accept our elevation request. In summary, if the victim opens with regular permissions, it will force the victim to open as Admin by reprompting UAC.
Does it slow down the computers?
- It will use computer processing, but we've ensured to make a smart system to use just a bit of CPU while the user is active, and only jump to 100% when the user is AFK for 1 minute. Ensuring they won't notice it.
@ MrSh4dow let me know if there's anything more you would like to know. Reach me out via telegram for a quicker and more descriptive response.
This is a bump Thank you for taking the time for writing the answer it makes a difference between others.
Okay so regarding the UAC elevation stuff can't it be disabled? Or it's a must cuz I can infect approximately 100 computers of my school but without admin so if it prompts admin then I sucked. Also regarding the miner the data, yes I wanted to know that if it gathers nothing that was my point so +1 as well.
Another thing is about the mining info like I see how much I can earn x day is that possible? From your website or idk some endpoint to gathe4 that information.
Also if it's possible so use another pool (public) and not the one you prodiving beforehand.
And that's it only that if the miner can be running on background withoout needing privilege perms it will be great and if I can see somehow how many devices etc are mining
This post is by a banned member (Interstellar) - Unhide
3.229
Posts
1.178
Threads
OP 02 January, 2025 - 12:32 AM
Reply
(01 January, 2025 - 11:44 PM)MrSh4dow Wrote: Show More (01 January, 2025 - 09:59 PM)Interstellar Wrote: Show MoreDoes the miner get detected?
- Regarding detections, the file comes already crypted and today 01/01/2025 the file natively (without crypt) is FUD and the crypting is also FUD, making a perfect combo to spread. Some chinese or random antiviruses may (and the may here is precise, because it's completely random) trigger some alert, but 100% ml detections (Machine Learning), as in, false positives, that happen even in real legit files, no one can really provide something that stops dumb antiviruses.
Detections can raise with time for your specific build after spreading a lot, because many antiviruses will already receive your file sample and with time learn how to detect it, no one can provide a malware that this doesn't happen. It should work well in any case, to reach a point where it gets detected can take more than a year, all depends how many people analyzing your file with their AVs
The malware / miner is detected by antivirus / microsoft defender mainly?
- No, our main focus was to always bypass the most common antivirus, Windows Defender. Just like stated above, with time Windows Defender may start learning how to analyze your build, but in this case a simple rebuild will fix your issue, and to reach this point can take more than a year. Already infected machines won't get removed because of these future detection, we do a good persistence that makes the antivirus impossible to find it.
Does it have a info logger?
- No info logger, it's a miner. All miner data you can see via pool.
Does it require admin perms when executed for the first time?
- Tricky question, it doesn't require the victim to run the file as admin, but will force the victim to accept our elevation request. In summary, if the victim opens with regular permissions, it will force the victim to open as Admin by reprompting UAC.
Does it slow down the computers?
- It will use computer processing, but we've ensured to make a smart system to use just a bit of CPU while the user is active, and only jump to 100% when the user is AFK for 1 minute. Ensuring they won't notice it.
@ MrSh4dow let me know if there's anything more you would like to know. Reach me out via telegram for a quicker and more descriptive response.
This is a bump Thank you for taking the time for writing the answer it makes a difference between others.
Okay so regarding the UAC elevation stuff can't it be disabled? Or it's a must cuz I can infect approximately 100 computers of my school but without admin so if it prompts admin then I sucked. Also regarding the miner the data, yes I wanted to know that if it gathers nothing that was my point so +1 as well.
Another thing is about the mining info like I see how much I can earn x day is that possible? From your website or idk some endpoint to gathe4 that information.
Also if it's possible so use another pool (public) and not the one you prodiving beforehand.
And that's it only that if the miner can be running on background withoout needing privilege perms it will be great and if I can see somehow how many devices etc are mining
We could possibly make a custom miner without the UAC, but this would cause many important feature to be completely gone. 100 computers is a pretty nice spreading, but you could also gather this with online spreading with ease.
Yes you can pick the pool, we don't have our own pool, neither a website, it's fully yours not being connected at all with us. You pick the pool you want to mine, we recommend Nanopool but any works as long as you set the right port, etc.
The mining informations you gather is from the pool website, they will provide your hashrate, average mining, estimative or earnings, and obviously your balance. The withdraws are automatic and also under control of the pool you pick, again, we don't have any control over that.
Once again, to see how many devices are mining, also in the pool website.
An example of pool is Nanopool: xmr.nanopool.org
There you can find another wallets mining currently and see how it would look like.
@ MrSh4dow
|