Advertisement






RansomLord v2 - Anti-Ransomware Exploitation Tool / New Release

CVE Category Price Severity
CWE-XX Unknown Unknown
Author Risk Exploitation Type Date
Unknown Unknown Unknown 2024-01-02
CVSS
CVSS:Not Available
Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2024010009

Below is a copy:

RansomLord v2 - Anti-Ransomware Exploitation Tool / New Release
[Description]
RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that generates PE files, used to exploit vulnerable Ransomware pre-encryption.

Lang: C

SHA256 : 8EA83752C4096C778709C14B60B9735CC68A5971DCDB0028A0BB167550554769

This version now intercepts and terminates malware tested from 43 different threat groups.
Adding Wagner, Hakbit, Paradise, Jaff, DoubleZero, Blacksnake, Darkbit, Vohuk, Medusa and Phobus. Two are wipers Wagner and DoubleZero supposedly used against entities in the Ukraine conflict.

Updated the x32/x64 DLLs to exploit ten more vulnerable ransomware
Added -s Security information flag section

Lamer Security engines may incorrectly flag RansomLord DLLs as malicious!
They are NOT! Win32 API export functions are stubs that simply call exit(1)

Generated exploit DLL MD5 file hashes:
x32: DFFBE7F79077E89197334764FE6882F4
x64: 5B54E12B8B944FDF64C091B0E6588E48

[Download]
https://github.com/malvuln/RansomLord/releases/tag/v2

Malvuln

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.