Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



 12401

DeathRansom - A ransomware developed in python, with bypass technics

by MiNdFuCkErY_1337skid - 06 May, 2020 - 06:11 PM
This post is by a banned member (Trapkinggg) - Unhide
15
Posts
0
Threads
3 Years of service
#49
thanks for the post, very interested in trying this out
This post is by a banned member (xF0r368) - Unhide
xF0r368  
Registered
13
Posts
0
Threads
3 Years of service
#50
thx for use
 
(06 May, 2020 - 06:11 PM)MiNdFuCkErY_1337skid Wrote: Show More
First, the script checks if it's in a sandbox, debugger, vm, etc, and try bypass it.
It then encrypts all files starting with the defined directory on the line 60 in deathransom.py.
Then, downloads the ransom request script, disable cmd, taskmanager and the registry tools. And starts the counter to delete the files.

[Image: 68747470733a2f2f696d672e796f75747562652e...742e6a7067]
This post is by a banned member (SiaSmith98) - Unhide
This post is by a banned member (djakeo) - Unhide
djakeo  
Registered
4
Posts
0
Threads
3 Years of service
#52
(06 May, 2020 - 06:11 PM)MiNdFuCkErY_1337skid Wrote: Show More
tFirst, the script checks if it's in a sandbox, debugger, vm, etc, and try bypass it.
It then encrypts all files starting with the defined directory on the line 60 in deathransom.py.
Then, downloads the ransom request script, disable cmd, taskmanager and the registry tools. And starts the counter to delete the files.

[Image: 68747470733a2f2f696d672e796f75747562652e...742e6a7067]



nive tu
This post is by a banned member (Endarion) - Unhide
Endarion  
Registered
31
Posts
0
Threads
3 Years of service
#53
Thankss
This post is by a banned member (ntcaglpe156) - Unhide
23
Posts
0
Threads
3 Years of service
#54
(06 May, 2020 - 06:11 PM)MiNdFuCkErY_1337skid Wrote: Show More
First, the script checks if it's in a sandbox, debugger, vm, etc, and try bypass it.
It then encrypts all files starting with the defined directory on the line 60 in deathransom.py.
Then, downloads the ransom request script, disable cmd, taskmanager and the registry tools. And starts the counter to delete the files.

[Image: 68747470733a2f2f696d672e796f75747562652e...742e6a7067]
thanks
This post is by a banned member (succman669999) - Unhide
115
Posts
35
Threads
3 Years of service
#55
(06 May, 2020 - 06:11 PM)MiNdFuCkErY_1337skid Wrote: Show More
First, the script checks if it's in a sandbox, debugger, vm, etc, and try bypass it.
It then encrypts all files starting with the defined directory on the line 60 in deathransom.py.
Then, downloads the ransom request script, disable cmd, taskmanager and the registry tools. And starts the counter to delete the files.

[Image: 68747470733a2f2f696d672e796f75747562652e...742e6a7067]

thx m8.
yuh
This post is by a banned member (bleach45) - Unhide

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)