[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    Re: [FD] RansomLord v3 / Anti-Ransomware Exploit Tool Released
From:       malvuln <malvuln13 () gmail ! com>
Date:       2024-05-07 12:28:36
Message-ID: CAAHK0WSuVCV1vkZ3y1VZwSzeUZaRWeFwj8bGopreC9qwxp9p-Q () mail ! gmail ! com
[Download RAW message or body]

Updated, fixed typo
SHA256 : 810229C7E62D5EDDD3DA9FFA19D04A31D71F9C36D05B6A614FEF496E88656FF5

On Mon, May 6, 2024 at 10:01 PM malvuln <malvuln13@gmail.com> wrote:

> Proof-of-concept tool that automates the creation of PE files, used to
> exploit Ransomware pre-encryption. Updated v3:
> https://github.com/malvuln/RansomLord/releases/tag/v3
> Lang: C SHA256:
> 83f56d14671b912a9a68da2cd37607cac3e5b31560a6e30380e3c6bd093560f5
>
> Video PoC (old v2):
> https://www.youtube.com/watch?v=_Ho0bpeJWqI
>
> RansomLord generated PE files are saved to disk in the x32 or x64
> directories where the program is run from. Goal is to exploit
> vulnerabilities inherent in certain strains of Ransomware by deploying
> exploits that defend the network! The DLLs may also provide additional
> coverage against generic and info stealer malwares.
>
> RansomLord v3 release notes:
> Adding six more Ransomware to the victim list for a grand total of 49
> StopCrypt, RisePro, RuRansom, MoneyMessage, CryptoFortress and Onyx.
> Windows event log now includes SHA256 hash of the intercepted malware.
>
> https://github.com/malvuln/RansomLord
>
> MALVULN
>
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic