<tutorialjinni.com/>

Pysa Ransomware Sample Download

Posted Under: Windows on Dec 8, 2020
Pysa Ransomware Sample Download
Pysa Ransomware, also know by its former name Mespinoza Ransomware is typically distributed via malspam, malvertising campaign, exploit kits, drive-by downloads, and brute-forcing accounts on servers that have RDP exposed to the Internet. Pysa encrypts data using AES-256 the keys for which are then encrypted with RSA.

PowerPepper Malware Sample Download

Posted Under: Windows on Dec 8, 2020
PowerPepper Malware Sample Download
PowerPepper is a Windows in-memory PowerShell backdoor that can execute remotely sent shell commands. It is associated with DeathStalker (formerly called Deceptikons), a threat actor know to be active since 2012. The threat actor consistently used what is called "dead-drop resolvers" (DDRs), which is an obfuscated content hosted on major public web services like YouTube, Twitter or Reddit, once decoded by malware this content reveals a command-and-control (C2) server address.

Buer Malware Sample Download

Posted Under: Windows on Dec 2, 2020
Buer Malware Sample Download
Buer is malware-as-a-service product that provide initial foothold in the victim's machine and deliver whatever payload it's owner what to deliver. It can be a RAT or Stealer. Recently it is know to be delivering ransomware like Ryuk.

CursedGrabber Malware Sample Download

Posted Under: Windows on Nov 25, 2020
CursedGrabber Malware Sample Download
A new malware campaign using npm registry as a mode of spreading. This Malware is debut as CursedGrabber. Its designed to steal Discord App Tokens, personal information such payment information and web browser files of the users.

MountLocker Ransomware Sample Download

Posted Under: Windows on Nov 21, 2020
MountLocker Ransomware Sample Download
MountLocker ransomware encrypts company and business user data with ChaCha20 + RSA-2048. It then demands a $ 2 million ransom in BTC to get the files back.It gives the hacked company 3 days and threatens to publish the stolen data "all over the Internet" in order to increase pressure on the victim.