Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Search the Community

Showing results for tags 'rarog'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 1 result

  1. Go Rarog is a Trojan with a built-in miner module and botnet elements. Rarog is written in C / C ++, builds without dependencies on VC ++ (Multi-threaded runtime (/ MT) library). Build weight: 410kb (v3.0). Rarog can hide the miner's process from the following task managers: Windows Task Manager, Process Killer, KillProcess, System Explorer, Process Explorer, AnVir, Process Hacker. Trojan disguised as a Realtek driver, copying the headers of the original utilities. If you are not familiar with hidden mining, then read this article - [Hidden Content] . Infection process: When you first start, Rarog determines whether the system is infected. If the system is not infected, it creates a hidden folder in the system directory, is copied into it and starts with a special flag, destroying the original file. Then it is fixed in the system - it adds entries to the registry, creates shortcuts and tasks in the system. It then accesses the Rest API, transmits data about the victim's machine, and obtains the machine uID. Then it receives the miner's configuration (CPU / GPU), unloads the corresponding miner version from the server and launches it in hidden mode. Features: Low build weight (410kb). Fixing the system. No dependencies on VC ++, correct work even on a clean OS. Masking for drivers. Hiding the miner's process from all popular task managers (see the list above). User-mode Trojan (work without administrator rights; support for working with a guest account). The ability to update the Trojan on infected machines using the admin panel. The ability to update the miner's builds through the admin panel. Tasks (opening a site in a browser, DDoS, downloading and launching any files) All important data transmitted between the bot and the server is encrypted. The trojan is tied to the customer's server, it is impossible to untie it and use it for its own purposes (all configs are packed). The admin panel is installed on the server of the buyer. Recovery in the system after the complete removal of the Trojan. Automatic infection of USB devices. Search and remove third-party miners on the PC. Helpers are special processes that protect the main process of the Trojan. Increasing the privilege process to the system (relevant only for Windows 7). Mining profiles: The unique feature of this Trojan is mining profiles. According to the standard after the purchase you get 10 builds of the Trojan, tied to 10 profiles in the admin panel. For each profile, you can specify your own miner configuration. This functionality can be useful for those who want to build a team of people who will distribute the builds and get a certain percentage of mining. In the admin panel displays useful information: the number of installations of each profile, and the list of bots displays the name of each profile (you can specify any). What is included: Admin panel. 10 builds trojan under profiles. Manual installation and configuration. Recommendations for use. Help in setting up. Support for all issues. Protector to protect builds from VirusTotal. Download: [HIDE][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.