Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



 12691

DeathRansom - A ransomware developed in python, with bypass technics

by MiNdFuCkErY_1337skid - 06 May, 2020 - 06:11 PM
This post is by a banned member (paaaaaaaaaaa3) - Unhide
45
Posts
5
Threads
4 Years of service
#57
mkay leme see
This post is by a banned member (MrRedScorpio) - Unhide
31
Posts
0
Threads
3 Years of service
#58
thankssss bro
This post is by a banned member (mrjacke) - Unhide
This post is by a banned member (delonghi777) - Unhide
This post is by a banned member (N0nef0rce) - Unhide
N0nef0rce  
Registered
26
Posts
0
Threads
3 Years of service
#61
thanks for the share
This post is by a banned member (Vampire2465) - Unhide
65
Posts
0
Threads
5 Years of service
#62
(06 May, 2020 - 06:11 PM)MiNdFuCkErY_1337skid Wrote: Show More
First, the script checks if it's in a sandbox, debugger, vm, etc, and try bypass it.
It then encrypts all files starting with the defined directory on the line 60 in deathransom.py.
Then, downloads the ransom request script, disable cmd, taskmanager and the registry tools. And starts the counter to delete the files.

[Image: 68747470733a2f2f696d672e796f75747562652e...742e6a7067]

workingg thanks!
This post is by a banned member (canabice90) - Unhide
70
Posts
0
Threads
5 Years of service
#63
HMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
This post is by a banned member (stevegabrielgio) - Unhide
7
Posts
0
Threads
3 Years of service
#64
nice work

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)