" Ransomwares " for the Blackhat -By:MOhamed Ahmed

Dec 1, 2018 05:44 PM
636792487473690758.jpg

this is my second post in the " starting a blackhat business " series for absloute beginners The methods used in this post are exclusively for educational purposes

Imagine a merger of a spreading computer worm and a Trojan

the same paper can be fulfilled in a single "Computer Virus" since it does not

is a simple virus could be given another name but many call it

"Ransomware". this malicious file that can be passed off as a

document for a while i detail "Brontok" which is a worm

computer that was created for cyberwar purposes in case of ransomware

can block the computer perform a double encryption on the

documents, audios and texts of the victim computer below

real images of a company which was blocked by this malware and has

requested the services of my Team to repair the damage

caused.

the company was stolen the data a ransomware created by pirates

computer scientists ask for rescue on the computer the company called

mb * asks for urgent technical support to repair the damages on its

computer based on a windows operating system.

636792487473690758.jpg

-Payload in process Trojan Working

How brontok works the ransomware has worked for the moment

establishes an encryption in the files and changes the format of the documents

your actions will be null when trying to modify something but your only solution will be

contact an anti-malware "mitigator" of the problem present this mitigator

will aim to eliminate the locations where the

files that allow to establish a connection of the "Operator" of the

ransomware.

636792489050096776.jpg
  • When accessing any file, the message will be as follows

Technical support has clarified that it could be an infection that

even has kidnapped his "RED" do not have access to the "RED" many

they want to clarify that with a firewall they could have avoided an attack of this

type but many times the infections are presented when by a bad

action the victim enters the mail and note something strange and is that a

message with files similar to those of your company below a

Graphic example:

636792491444785068.jpg
  • Infection Process

First of all we know that any malware can be "Conceived or

Hidden "in a special format like what is the .pdf as the victim

has already given for execution the document in this case a simulated PDF is

can say that this malware has already been executed which starts a

"Count" which is that the infected user must pay or so

otherwise many of your files will be deleted.

Ransomware protocol:

1) apply doxing: We will apply doxing to our victims but we must

To know what victim would be in my case would choose business victims

among them the CEOs of companies and this malware spread not only to

CEO if not to his clients

636792493858065823.jpg
  • Locating My victim
636792509743378828.jpg

Searching Relationships Of Their Social Profiles.

There is no doubt that here at this stage there is falsification of accounts and that

we could pose as this CEO to take a relationship in common

to prepare an attack through social engineering.

636792510841347282.jpg
  • Request for Friendship and Identity Confirmation Message
636792512066190766.jpg

For more information gathering we look for employees and

important positions of the company

There are different methods of deception

1) falsifying the identity

2) 2) creating

false domains that are compared with the real

636792513801815411.jpg

Usually in the blackhat business to spread malware by email to a

company is requested domains similar to those of other social networks and

enables the STMP to manage new email addresses with the name

of employees of the company in this case the victim company was called.

***rt.com and the computer pirate manages "***rt.com" to deceive

to user

636792514767645718.jpg

Generate a forged email address to the domain that has as

modified name to that of the company but with the user name of

an employee.

636792516643847080.jpg
  • We pass for "CEO" add the recipients that are the

emails from company workers add the message to your liking

that's where the malicious file will go by attaching to a document

through his vision he could infect computers.

636792517476346951.jpg
  • Creating Ransomware With Functions And Amount Through Your Client. ( i will speak about creating ransomwares (or in another language "" coding "" )

u can see my post about Creating a Ransomware for Android from 0!

null-byte.wonderhowto.com/forum/creating-ransomware-for-android-from-0-by-mohamed-ahmed-0180151/

There are all kinds of ransomware many are customized we can

through client execution as we usually work with rats and fill in specific data you just have to enter or enable functions of blocking and culminating the process of creation would disguise the file.

636792520489316155.jpg
636792521659159596.jpg
636792520489316155.jpg
636792521659159596.jpg

screen of my beautiful labtop :)

636792522268738922.jpg
  • Finally, it is downloaded and executed heeeee7

This is what the attack protocol of a ransomware built and then

propagated the company looks to pay even we have not seen how to design this

ransomware but then more about it.

Encryption process:

636792524496394990.jpg
  • file encryption

CryptoLocker then generates the AES private key algorithm to encrypt

files in the destination Computer, addressing specific extensions,

Common (for example, .exe, .doc, .jpg, .pdf, etc.), and Generating a key

256-bit private for each group of files by extension of

archive. After each group of files is encrypted, CryptoLocker uses the

RSA public key that he received from

The C2 server to encrypt the AES private key that was used to encrypt the

records.

1) The files to be encrypted are identified by extension.

2) Each file is encrypted using the private key algorithm and the key

Private for the specified extension.

3) After all the files are encrypted, the private key

of each extension is encrypted using the public key algorithm

And the public key CryptoLocker C & C.

4) The encrypted keys are stored in the local key store.

Image source: Ted Fischer, Internet Security Center

636792526604364234.jpg
  • DarkNet Selling Malwares

Darkion onion sites are available selling malware ones that

others are ready to use them 100% compiled are cheap and will depend on

you spread them others usually find in GITHUB repositories to give them

a little more about how ransomware is financed and how it is given

meet in the black market.

Modern business model:

• It's free, the site takes a 20% cut

• Based on TOR and Bitcoin

• The service will track infections and collect the ransom

• Simple process:

  1. Register an account
  2. Enter the amount of the ransom
  3. Download the malware
  4. Distribute malware and infect systems
  5. Provide a Bitcoin receiving address to receive the benefit

(80%)

And ready. haha

lets get into darknet :)

636792530494315782.jpg
  • Ransomware and malware manager from onion site

There is no doubt that police officers such as the FBI have tracked these

sites that generate malware by simply adding information like the one

we just said earlier.

636792531458895020.jpg

The site named ** is an onion site that has been little used but has

got good benefits cyber criminals.

fbi has closed it already but there is another hidden one hahaha :)

Hidden Tear is a ransomware that is free in the repository of

github which can be compiler to put it to use to your liking although

as we said earlier a ransomware can not be simpler if

all you want is to compile it using our protocol that we have

seen earlier in this post you can guide a pirate to compile it and

apply actions

636792533793065771.jpg

The destination file extensions can be modified. List

Default:

we have the code for compilation and a decrypt the decrypt function

is to mitigate the encryption process of each of the files named in

the image above.

636792534584677023.jpg

this above image is a - Decrypter example

Ransomware Compilation:

636792536060301740.jpg
  • Hidden Tear Ransomware Open Source

This tool has the need to be compiled for the execution of

client where you can add those necessary options that meets the

ransomware said ransomware pronounced to be used so

educational can be used in an evil way

636792537509628005.jpg

You need to have a web server that supports scripting languages

like php, python etc. Change this line with your URL. (It is better to use the

Https connection to avoid eavesdropping)

636792538334784582.jpg

The script must write the GET parameter in a text file. The

Send process is executed in SendPassword () function.

636792538892128367.jpg

Modify and name the name of the file that we want to be the

decoy which will be executed as we have explained in the protocol

636792538951290627.jpg
  • Personalization of a unique password
636792540493065517.jpg
  • Message to Victims "Add Address to receive BTC".

Once Modified we must compile it in Visual Studio then we

will manage the PDF Fake with the ransomware.

now it is ready to be used

that's enough for today because i am 3el2

we will complete it in the next post

thanks for reading :)

Comments

No Comments Exist

Be the first, drop a comment!