<tutorialjinni.com/>

PLAY Ransomware

Posted Under: Windows on Sep 6, 2022
PLAY Ransomware
Play Ransomware is active for a while, but it come under lime light when it attack the Argentina's Judiciary of Córdoba, forcing the judicial system to come to at rest. Unlike most ransomware operations that leave lengthy ransom notes Play ransom notes simple, just the name and a email address.

PowerShell Get Hash Of All Files In Directory

Posted Under: Windows on Sep 4, 2022
PowerShell Get Hash Of All Files In Directory
Code Snippet to traverse a folder and calculate hash of each file. Seven type of hashing algorithm are available including MD5 and SHA. It can also traverse recursively with Recurse switch.

BlueSky Ransomware

Posted Under: Windows on Aug 11, 2022
BlueSky Ransomware
BlueSky ransomware is an emerging malware it encrypts user data using use ChaCha20 algorithm for file encryption, along with Curve25519 for key generation.

Lilith Ransomware

Posted Under: Windows on Jul 15, 2022
Lilith Ransomware
Lilith Ransomware is yet another ransomware that does double-extortion attacks, which is when the threat actors steal data before encrypting devices

AstraLocker 2.0 Ransomware

Posted Under: Windows on Jun 29, 2022
AstraLocker 2.0 Ransomware
AstraLocker 2.0 is closely related to Babuk Ransomware. It encrypts user data and ask $50 USD in XMR (monero) coin. It is distributes via phishing campaigns as Microsoft Office Word documents attachments.