Ransomwares
Ransomware represents a malicious software category that encrypts files or entire systems, rendering them inaccessible to users. Perpetrators demand ransom payments, often in cryptocurrency, in exchange for decryption keys or device unlock codes.
These attacks can have devastating consequences for individuals and businesses, causing financial losses, operational disruptions, and reputation damage.
Samples
Cerber
A notorious ransomware known for encrypting files on infected computers and demanding payment in cryptocurrency for decryption.
Cryptowall
A pervasive ransomware strain that encrypts files on infected machines and demands payment in cryptocurrency for decryption, causing significant data loss and financial damage.
Djvu
A prolific ransomware strain that encrypts files on compromised computers and demands payment in cryptocurrency for decryption, often distributed through malicious email attachments and fake software downloads.
Jigsaw
A ransomware strain named after the antagonist in the movie "Saw," known for deleting files incrementally until a ransom is paid, aiming to pressure victims into payment.
LockBit
A ransomware-as-a-service (RaaS) platform used by cybercriminals to encrypt files on infected systems and demand ransom payments for decryption keys.
Locky
A notorious ransomware strain that gained notoriety for its large-scale distribution through spam emails containing malicious attachments, encrypting files on infected systems.
Mamba
A ransomware variant known for its unique encryption technique, encrypting entire hard drives instead of individual files, making it more destructive and difficult to recover from.
Petrwrap
A variant of the Petya ransomware, known for its destructive capabilities, encrypting entire hard drives and rendering infected systems inaccessible until a ransom is paid.
Petya
A ransomware strain that gained notoriety for its ability to encrypt entire hard drives, causing widespread damage and disruption to infected systems, often propagated through phishing emails and exploit kits.
NotPetya
NotPetya is a destructive malware strain that caused widespread havoc and financial losses to organizations worldwide.
Radamant
A ransomware variant known for its encryption capabilities and targeted attacks against businesses and organizations, often demanding large ransom payments for decryption keys.
Satana
A ransomware variant known for its destructive capabilities, encrypting files on infected systems and modifying the master boot record (MBR) to render the system unbootable until a ransom is paid.
Sodinokibi
A ransomware-as-a-service (RaaS) platform used by cybercriminals to encrypt files on infected systems and demand ransom payments for decryption keys.
TearDrop
A malware variant known for its stealthy behavior and advanced evasion techniques, often used for data theft and espionage purposes.
TeslaCrypt
A ransomware variant known for encrypting files on infected systems and demanding payment for decryption, often distributed through malicious email attachments and exploit kits.
Thanos
A ransomware variant known for its advanced encryption techniques and capability to encrypt files on both Windows and Linux systems, causing widespread damage and disruption.
WannaCry
A ransomware worm that spread globally in 2017, encrypting files on infected systems and demanding ransom payments for decryption, exploiting a vulnerability in Windows systems.
WannaCryPlus
A variant or evolution of the original WannaCry ransomware, possibly featuring additional functionalities or modifications to its encryption techniques.
GoldenEye
GoldenEye is a sophisticated ransomware strain that poses a significant threat to computer systems and networks worldwide.
Monster V1
MonsterV1 is a potent malware strain that poses a significant threat to the cybersecurity landscape, capable of causing extensive damage to computer systems and networks.
Monster V2
MonsterV2 is a highly advanced malware variant that represents a significant threat to the cybersecurity landscape, leveraging sophisticated techniques to infiltrate and compromise computer systems.
Pikachu
Pikachu is a notorious malware strain known for its disruptive activities and widespread infections across computer systems.
Warning
The information provided on this website is intended for educational purposes only. It should not be used to create, distribute, or execute any malicious software. We strongly condemn the use of malware for illegal or unethical activities.
Malware samples can cause harm to your computer system and compromise your security. Handle these samples with extreme care and only in isolated environments. Do not execute these samples on any system connected to the internet or any network containing sensitive information.
The maintainer and contributors of this repository, both past, present, and future, are not responsible for any loss of data, system damage, or other consequences resulting from the mishandling of the samples provided herein. Caution is advised when testing any file present in this repository.