Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



 17669

Baphomet Ransomware (Author Not responsible for illegal use)

by Redm00n - 05 June, 2021 - 10:37 AM
This post is by a banned member (naynasm313) - Unhide
17
Posts
0
Threads
1 Year of service
lets see
This post is by a banned member (PayloadDev) - Unhide
34
Posts
0
Threads
(05 June, 2021 - 10:37 AM)Redm00n Wrote: Show More
This is a proof of concept of how a ransomware works, and some techniques that we usually use to hijack our files. This project is written in C# using the net-core application framework 3.1.The main idea of the code is to make it as readable as possible so that people have an idea of how this type of malware acts and works.

Baphomet features

AES algorithm for file encryption.
RSA encryption to encrypt key.
Automatic propagation via USB.
Hybrid encryption technique.
Enumeration of processes to kill those selected.
Internet connection test.
victim information submissions (Public IP, Domainname, Country, OS.version, City, Machine name, etc).
Program to decrypt the encryption key.
Program to decrypt encrypted data.
Hostname list to send the victim's data (redundancy).
Doesn't detected to antivirus programs (Date: 11/30/2020 12:25pm).
Hardcode image in base64 to change wallpaper (Baphomet image).


GIVE LIKES DON'T LEECH

ok bro thanks
This post is by a banned member (Maschi80) - Unhide
Maschi80  
Registered
2
Posts
0
Threads
Excited to see it!  reviewing
This post is by a banned member (asdqwdqwd1) - Unhide
7
Posts
0
Threads
(05 June, 2021 - 10:37 AM)Redm00n Wrote: Show More
This is a proof of concept of how a ransomware works, and some techniques that we usually use to hijack our files. This project is written in C# using the net-core application framework 3.1.The main idea of the code is to make it as readable as possible so that people have an idea of how this type of malware acts and works.

Baphomet features

AES algorithm for file encryption.
RSA encryption to encrypt key.
Automatic propagation via USB.
Hybrid encryption technique.
Enumeration of processes to kill those selected.
Internet connection test.
victim information submissions (Public IP, Domainname, Country, OS.version, City, Machine name, etc).
Program to decrypt the encryption key.
Program to decrypt encrypted data.
Hostname list to send the victim's data (redundancy).
Doesn't detected to antivirus programs (Date: 11/30/2020 12:25pm).
Hardcode image in base64 to change wallpaper (Baphomet image).


GIVE LIKES DON'T LEECH
Facts brrbr
This post is by a banned member (f5badboy) - Unhide
f5badboy  
Registered
135
Posts
0
Threads
(05 June, 2021 - 10:37 AM)Redm00n Wrote: Show More
This is a proof of concept of how a ransomware works, and some techniques that we usually use to hijack our files. This project is written in C# using the net-core application framework 3.1.The main idea of the code is to make it as readable as possible so that people have an idea of how this type of malware acts and works.

Baphomet features

AES algorithm for file encryption.
RSA encryption to encrypt key.
Automatic propagation via USB.
Hybrid encryption technique.
Enumeration of processes to kill those selected.
Internet connection test.
victim information submissions (Public IP, Domainname, Country, OS.version, City, Machine name, etc).
Program to decrypt the encryption key.
Program to decrypt encrypted data.
Hostname list to send the victim's data (redundancy).
Doesn't detected to antivirus programs (Date: 11/30/2020 12:25pm).
Hardcode image in base64 to change wallpaper (Baphomet image).


GIVE LIKES DON'T LEECH

Fhgrf

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 25 Guest(s)