This post is by a banned member (kaile223) - Unhide
09 August, 2023 - 04:55 PM
Reply
This post is by a banned member (Maxiplayed) - Unhide
14 August, 2023 - 01:45 AM
Reply
This post is by a banned member (tommylee8901) - Unhide
04 September, 2023 - 03:01 PM
Reply
This post is by a banned member (zakaria2131) - Unhide
05 September, 2023 - 01:22 AM
Reply
This post is by a banned member (rxrenansqs) - Unhide
05 September, 2023 - 01:49 AM
Reply
(05 June, 2021 - 10:37 AM)Redm00n Wrote: Show Moree welcomeThis is a proof of concept of how a ransomware works, and some techniques that we usually use to hijack our files. This project is written in C# using the net-core application framework 3.1.The main idea of the code is to make it as readable as possible so that people have an idea of how this type of malware acts and works.
Baphomet features
AES algorithm for file encryption.
RSA encryption to encrypt key.
Automatic propagation via USB.
Hybrid encryption technique.
Enumeration of processes to kill those selected.
Internet connection test.
victim information submissions (Public IP, Domainname, Country, OS.version, City, Machine name, etc).
Program to decrypt the encryption key.
Program to decrypt encrypted data.
Hostname list to send the victim's data (redundancy).
Doesn't detected to antivirus programs (Date: 11/30/2020 12:25pm).
Hardcode image in base64 to change wallpaper (Baphomet image).
GIVE LIKES DON'T LEECH
tks mate you're welcome
This post is by a banned member (Jhonny02) - Unhide
05 September, 2023 - 10:59 AM
Reply
(05 June, 2021 - 10:37 AM)Redm00n Wrote: Show MoreThis is a proof of concept of how a ransomware works, and some techniques that we usually use to hijack our files. This project is written in C# using the net-core application framework 3.1.The main idea of the code is to make it as readable as possible so that people have an idea of how this type of malware acts and works.
Baphomet features
AES algorithm for file encryption.
RSA encryption to encrypt key.
Automatic propagation via USB.
Hybrid encryption technique.
Enumeration of processes to kill those selected.
Internet connection test.
victim information submissions (Public IP, Domainname, Country, OS.version, City, Machine name, etc).
Program to decrypt the encryption key.
Program to decrypt encrypted data.
Hostname list to send the victim's data (redundancy).
Doesn't detected to antivirus programs (Date: 11/30/2020 12:25pm).
Hardcode image in base64 to change wallpaper (Baphomet image).
GIVE LIKES DON'T LEECH Nice.......
This post is by a banned member (ag062062zero) - Unhide
15 September, 2023 - 02:16 PM
Reply
(05 June, 2021 - 10:37 AM)Redm00n Wrote: Show MoreThis is a proof of concept of how a ransomware works, and some techniques that we usually use to hijack our files. This project is written in C# using the net-core application framework 3.1.The main idea of the code is to make it as readable as possible so that people have an idea of how this type of malware acts and works.
Baphomet features
AES algorithm for file encryption.
RSA encryption to encrypt key.
Automatic propagation via USB.
Hybrid encryption technique.
Enumeration of processes to kill those selected.
Internet connection test.
victim information submissions (Public IP, Domainname, Country, OS.version, City, Machine name, etc).
Program to decrypt the encryption key.
Program to decrypt encrypted data.
Hostname list to send the victim's data (redundancy).
Doesn't detected to antivirus programs (Date: 11/30/2020 12:25pm).
Hardcode image in base64 to change wallpaper (Baphomet image).
GIVE LIKES DON'T LEECH asdasdasd
This post is by a banned member (R0s3_xD) - Unhide
21 May, 2024 - 11:07 AM
Reply
(05 June, 2021 - 10:37 AM)Redm00n Wrote: Show MoreThis is a proof of concept of how a ransomware works, and some techniques that we usually use to hijack our files. This project is written in C# using the net-core application framework 3.1.The main idea of the code is to make it as readable as possible so that people have an idea of how this type of malware acts and works.
Baphomet features
AES algorithm for file encryption.
RSA encryption to encrypt key.
Automatic propagation via USB.
Hybrid encryption technique.
Enumeration of processes to kill those selected.
Internet connection test.
victim information submissions (Public IP, Domainname, Country, OS.version, City, Machine name, etc).
Program to decrypt the encryption key.
Program to decrypt encrypted data.
Hostname list to send the victim's data (redundancy).
Doesn't detected to antivirus programs (Date: 11/30/2020 12:25pm).
Hardcode image in base64 to change wallpaper (Baphomet image).
GIVE LIKES DON'T LEECH
ok bro thanjs
|