[active development] custom wiper / ransomware
by - Thursday, January 1, 1970 at 12:00 AM
Hello. I am looking to expand my service to the community and provide an effective method of generating money, as well as a learning experience for many.
I am looking to start active development (on the side of my pre-existing project) on an open-source and fully customisable ransomware / wiper malware.
If you have any wants and needs or suggestions for this please comment below and the thread will be updated with TODO.
It will be developed in C++ and have documentation steps.
Wiper is coded in C# for performance testing
KEY:
  • Done
  • Not done

TO-DO
  • implement MBR hijacking (customise destruction of MBR sector or n/a)
  • setup check to see what sort of OS is being run
  • implement web-interface for easy access and tracking of victims.
  • implement customisable C&C server connections (retrieval of data for extortion)
  • code initial wiper for standard wiping (currently it is separate program but in future i will make dropper for it)
  • setup optional wiper dropper to prevent windows from restarting in safe-mode (add warning to readme.txt on victim device)
  • implement AD AS network spreader (not important right now but will setup at later date)
  • implement different architectures - x32 x64 x86_x64 (main distros - Linux, Windows XP - 11/10, mac (later))
  • keep file size small
  • easy file binding
  • use AES-256 encryption over RSA 2048 encryption. (RSA 2048 has smaller bit security than AES-256)
  • use invoke obfuscation by default
  • forge software signature
  • implement sandbox aware option (if in sandbox - run intended file-bound function e.g - pdf file etc)
  • add whitelist and blacklist of "bad" and "good" programs to keep running (e.g - processhackers, wireshark, av software)
  • setup optional feature "sleeper_agent" - waits set amount of time before activation - good for waiting for spread
  • setup means of transportation of files / folders / data (TLS most likely because tor is slow)
  • implemented worm feature (network spreader in progress but automatic mail spreader has been set up)
  • disable internet when executed
  • force UAC on execution
  • create temp ransom note
  • create GitHub page


CURRENT STAGE - BETA
Endurance Wiper Beta
For testing I recommend you use a VM. Sandbox aware has not been setup yet so test it out while you can!
This will destroy your computer so be careful.
I have added a worm feature to the development stage to aide in spreading. It is limited to mail connections so far and will be expanded.
Reply
mbr hijacking for sure
Reply
+support would be really great, drop the repo then, i will follow it for sure!
Also i agree with @Kamios mbr ransomware are not that common, would be nice to develop smth like that
Reply
(November 8, 2022, 01:36 AM)SafeSig Wrote: +support would be really great, drop the repo then, i will follow it for sure!
Also i agree with @Kamios mbr ransomware are not that common, would be nice to develop smth like that

added on to-do
Reply
Can you add a web interface for that ransomware so that we can know the information about the Boxes been hacked and import files with the web interface will be awesome!
Reply
...sounds really nice ^^ good luck with that, I ll come back if I have a new request
Reply
Thanks dude
Reply
oo a dev thread, I haven't seen one on breached yet.

Sounds good :pomhappy: 
you should keep us updated and post snippets or git or something so we can follow your progress
gl on the development
Reply
(November 8, 2022, 09:34 PM)griimnak Wrote: oo a dev thread, I haven't seen one on breached yet.

Sounds good :pomhappy: 
you should keep us updated and post snippets or git or something so we can follow your progress
gl on the development

thanks sir! i added more on the to-do based on community suggestions and from my own thoughts
Reply
Pretty nice and development is going fast! How the retrieval of files would work? Through tor? TLS? would be also nice to automatically retrieve specific extension files to save space.
Reply


 Users viewing this thread: [active development] custom wiper / ransomware: No users currently viewing.