Cryptonite: Ransomware for Windows

Viruses & Malware
User avatar
master of hell
Posts: 385
Joined: Wed Dec 18, 2019 4:50 am

Cryptonite: Ransomware for Windows

Postby master of hell » Fri Oct 22, 2021 7:32 pm

Cryptonite has been designed to maximize performance with minimal effort. Anyone can learn to use Cryptonite. Two versions of Cryptonite are included. One stores data using Sqlite3 and the other uses Mongo DB Atlas to transfer
results in the cloud. The default method is to use Sqlite3, but if you are interested in using the Mongo DB version of Cryptonite, switch to the mongo branch of that repository.

Installation

1️⃣ Create an Ngrok account if you don't have one.
2️⃣ Register an account. If you have the money, buy the premium version. If not, the free version will suffice.
3️⃣ Download the appropriate NGROK version for your operating system.
4️⃣ Unzip and install NGROK.
└For Linux / MAC users, unzip the folder via terminal: unzip /path/to/ngrok.zip.
└For Windows users, just unzip the folder
└ Make sure to add ngrok to PATCH
5️⃣ Authenticate your ngrok:
└Copy your AUTH TOKEN from NGROK config page.
└For Windows users: open cmd and type (replace YOUR_AUTH_TOKEN_HERE with your authorization token):

ngrok authtoken YOUR_AUTH_TOKEN_HERE

For Linux / MAC users: open a terminal and enter (replace YOUR_AUTH_TOKEN_HERE with your authorization token):

./ngrok authtoken YOUR_AUTH_TOKEN_HERE
pip install -r "requirements.txt"

Run the Server.py file before delivering the ransomware to victims. Server.py starts the server to receive the victim data sent by Cryptonite and creates an NGROK tunnel that performs port forwarding so that anyone from all over the world can access our server. Running Server.py also creates a database file to store information about the victim.

More details: https://github.com/CYBERDEVILZ/Cryptonite

User avatar
Novice
Posts: 4
Joined: Thu Jul 14, 2022 1:07 pm

Re: Cryptonite: Ransomware for Windows

Postby Novice » Sat Jul 16, 2022 10:58 am

master of hell wrote:Cryptonite has been designed to maximize performance with minimal effort. Anyone can learn to use Cryptonite. Two versions of Cryptonite are included. One stores data using Sqlite3 and the other uses Mongo DB Atlas to transfer
results in the cloud. The default method is to use Sqlite3, but if you are interested in using the Mongo DB version of Cryptonite, switch to the mongo branch of that repository.

Installation

1️⃣ Create an Ngrok account if you don't have one.
2️⃣ Register an account. If you have the money, buy the premium version. If not, the free version will suffice.
3️⃣ Download the appropriate NGROK version for your operating system.
4️⃣ Unzip and install NGROK.
└For Linux / MAC users, unzip the folder via terminal: unzip /path/to/ngrok.zip.
└For Windows users, just unzip the folder
└ Make sure to add ngrok to PATCH
5️⃣ Authenticate your ngrok:
└Copy your AUTH TOKEN from NGROK config page.
└For Windows users: open cmd and type (replace YOUR_AUTH_TOKEN_HERE with your authorization token):

ngrok authtoken YOUR_AUTH_TOKEN_HERE

For Linux / MAC users: open a terminal and enter (replace YOUR_AUTH_TOKEN_HERE with your authorization token):

./ngrok authtoken YOUR_AUTH_TOKEN_HERE
pip install -r "requirements.txt"

Run the Server.py file before delivering the ransomware to victims. Server.py starts the server to receive the victim data sent by Cryptonite and creates an NGROK tunnel that performs port forwarding so that anyone from all over the world can access our server. Running Server.py also creates a database file to store information about the victim.

More details: https://github.com/CYBERDEVILZ/Cryptonite



Can still deploy this ransomware?


Return to “Malware”