Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked RansomTuga - An advanced Ransomware written in C++ and fully customizable


itsMe

Recommended Posts

This is the hidden content, please

The project called RansomTuga is an advanced ransomware and semi-stealer that offers numerous customizable options. Its main objective is to provide a self-contained solution, utilizing a single .exe file for encryption and another separate .exe file for decryption. These files do not require any external dependencies. The program employs anti-dumping functions to avoid detection by certain anti-virus software.

For encryption, RansomTuga utilizes AES CBC encryption, employing a randomly generated 256-bit key and a 128-bit IV. The program includes a whitelist and blacklist feature for file extensions that will be subjected to encryption.

Moreover, RansomTuga captures photos from all connected webcams, sending the encryption key, along with some PC information, to the attacker via email or Telegram. It also retrieves various information from the victim's PC, drops a readme.txt file and a decryptor, alters the victim's computer wallpaper, and can modify the file extension and apply a custom icon to the encrypted files. Additionally, it possesses the capability to upload files to AnonFiles prior to encryption and can delete the executable from which it was initially launched.

Features

    File encryption is performed using the robust AES CBC 256 algorithm, employing a randomly generated key and a 128-bit IV.
    Anti-dumping functions are implemented to elude detection by certain anti-virus software.
    The program incorporates a whitelist and blacklist feature, allowing for targeted or excluded file extensions during the encryption process.
    RansomTuga has the capability to capture photos from all connected webcams.
    It also steals various system information, including hardware ID (HWID), IP address, CPU and RAM specifications, GPU brand, screen resolution, screenshots, clipboard contents, GPS location and Wi-Fi passwords.
    The malware can delete restore points on the system.
    Encrypted files can be assigned a custom file icon.
    The victim's wallpaper can be altered by the malware.
    Before encryption, files can be uploaded to a remote server.
    The encryption key, along with stolen information, can be sent to the attacker through email or a Telegram bot.
    The malware has a self-deletion feature, removing its executable after execution.
    With over 70 different options, RansomTuga is highly customizable. And many more features are available!

Legal Disclaimer

Spoiler

Please read this disclaimer carefully before using RansomTuga.

The information provided by RansomTuga is for general educational purposes only. It is not intended to promote or encourage any illegal or malicious activities. The use of ransomware or any similar software for unauthorized access, data theft, or any other illegal purposes is strictly prohibited.

The creators and contributors of RansomTuga do not assume any responsibility for any consequences that may arise from the use or misuse of this software. Users are solely responsible for their actions and should exercise caution and comply with all applicable laws and regulations in their respective jurisdictions.

The functionality and features provided by RansomTuga are intended for educational and research purposes, allowing users to understand the potential risks associated with ransomware and to develop effective countermeasures against such threats. It is important to ensure that you have the legal right and authorization before using RansomTuga on any system or network.

By using RansomTuga, you agree that the creators and contributors shall not be held liable for any damages, losses, or legal repercussions resulting from the use or misuse of this software. The creators and contributors disclaim all warranties, express or implied, regarding the use, performance, or suitability of RansomTuga for any particular purpose.

It is strongly advised to use RansomTuga only in controlled environments and with the explicit permission of the system owner or administrator. Unauthorized use of this software is strictly prohibited and may violate local, national, or international laws.

If you are uncertain about the legal implications of using RansomTuga or have any questions regarding its usage, it is recommended to seek legal counsel from professionals specializing in cybersecurity and technology laws.

Remember, always prioritize legal and ethical behavior when using any software or engaging in any online activities. Stay informed, stay responsible, and respect the rights and privacy of others.

Please note that the addition of this statement is solely for legal purposes.

This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.