• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Ransomware RansomLord Anti-Ransomware exploit tool

F B I

King Root
Shadow
User
Joined
Oct 7, 2016
Messages
1,122
Reputation
0
Reaction score
3,518
Points
263
Credits
5,353
‎8 Years of Service‎
23%
01.png

Code:
RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that generates PE files, used to exploit vulnerable ransomware pre-encryption.

Lang: C
SHA256 : 647494bda466e645768d6f7d1cd051097aee319f88018d1a80547d8d538c98db

This version now intercepts and terminates malware tested from 49 different threat groups.
Adding: StopCrypt, RisePro, RuRansom, MoneyMessage, CryptoFortress and Onyx

Feature update:
Windows event IOC log now includes the SHA256 hash plus full path of the intercepted malware
Added -r flag to output a Sigma rule for detecting RansomLord activity using Windows event log.

*** DOWNLOAD "RansomLord_v3.1.exe" EXE file and NOT the "Source code(zip)" .ZIP archive as that contains older versions

Lamer Security engines may incorrectly flag RansomLord DLLs as malicious.
They are NOT! they export Win32 API function stubs, provide functionality
to generate Windows IOC event logs and eventually call exit()

[+] Generated exploit DLL MD5 file hashes:
[+] x32: 37b9ebad522e0744aa8daa0bf5b2a58b
[+] x64: 7807454015bb44161ccf593e2fe5334b


To see this hidden content, you must react with one of the following reactions : Like Like, Love Love
 
Back
Top