Malware bazaar
Member
World wind pro is a telegram-based stealer that first appeared in the cyber threat landscape in April 2020. This is image of the latest version
The WorldWind Stealer enables direct sending of logs to your Telegram ID through a bot that you create with Telegram. You can avoid the hassle of dealing with unstable panels found in other major stealers that gather less data than WorldWind.
To use this tool, follow these steps:
Features:-
AntiAnalysis is a feature in malware that attempts to evade detection by antivirus software or other security measures. This can include checking if the malware is running in a virtual machine like VirtualBox or an emulator, if a debugger is attached, or if it is being analyzed by services like VirusTotal or Any.Run.
Stealing system information is a common tactic used by malware to gain access to sensitive data about the victim's device. This can include information like the device's version, CPU and GPU specs, amount of RAM, IP addresses, BSSID (the unique identifier for a wireless access point), location, and screen metrics.
Chromium based browsers are a popular target for malware due to their widespread use. Malware can target the browser to steal sensitive information like passwords, credit card details, cookies, browsing history, autofill data, and bookmarks.
Firefox based browsers are another popular target for malware, with attackers seeking to access data stored in the browser's database files, cookies, history, and bookmarks.
Internet Explorer and Edge are also targets for malware seeking to steal stored passwords.
Malware can also target saved WiFi networks to obtain information like the SSID (the name of the network) and BSSID.
File grabbers are features in malware that allow it to steal files from the victim's device, including documents, images, source code, databases, and USB devices.
Detecting banking and cryptocurrency services in browsers allows malware to specifically target sensitive financial information and transactions.
Keyloggers and clippers are types of malware that can record keystrokes or clipboard contents, respectively, potentially giving attackers access to sensitive data like passwords or credit card numbers.
Session stealing for services like Steam, Uplay, and Minecraft can allow attackers to gain access to the victim's gaming accounts.
Desktop and webcam screenshots allow attackers to view the victim's screen and camera, potentially capturing sensitive information or compromising the victim's privacy.
VPNs like ProtonVPN, OpenVPN, and NordVPN can be targeted by malware to gain access to the victim's network traffic and potentially steal sensitive information.
Cryptocurrency wallets can also be targeted by malware in an attempt to steal the victim's digital assets.
Messaging apps like Telegram and Pidgin can also be targeted by malware seeking to steal login information or access to the victim's messages.
Filezilla hosts can be targeted to gain access to sensitive data stored on remote servers.
The process list and directory structure of a victim's device can be targeted by malware to gain information about running processes and file locations.
Product keys can be targeted by malware seeking to steal software licenses or gain access to proprietary software.
Autorun modules can be targeted by malware to ensure that it is always running on the victim's device, even after a reboot or shutdown.
Download:-
The WorldWind Stealer enables direct sending of logs to your Telegram ID through a bot that you create with Telegram. You can avoid the hassle of dealing with unstable panels found in other major stealers that gather less data than WorldWind.
To use this tool, follow these steps:
- Open it and build your botnet virus. You'll need two things to proceed:
- BOT API TOKEN: Go to @Botfather, create a Telegram bot, and copy the API token to the first box.
- CHAT ID: Get your chat ID from @get_id_bot and paste it in the second box.
- Start the bot you just created, build your virus, spread it, and wait for the results to appear in your bot.
Features:-
AntiAnalysis is a feature in malware that attempts to evade detection by antivirus software or other security measures. This can include checking if the malware is running in a virtual machine like VirtualBox or an emulator, if a debugger is attached, or if it is being analyzed by services like VirusTotal or Any.Run.
Stealing system information is a common tactic used by malware to gain access to sensitive data about the victim's device. This can include information like the device's version, CPU and GPU specs, amount of RAM, IP addresses, BSSID (the unique identifier for a wireless access point), location, and screen metrics.
Chromium based browsers are a popular target for malware due to their widespread use. Malware can target the browser to steal sensitive information like passwords, credit card details, cookies, browsing history, autofill data, and bookmarks.
Firefox based browsers are another popular target for malware, with attackers seeking to access data stored in the browser's database files, cookies, history, and bookmarks.
Internet Explorer and Edge are also targets for malware seeking to steal stored passwords.
Malware can also target saved WiFi networks to obtain information like the SSID (the name of the network) and BSSID.
File grabbers are features in malware that allow it to steal files from the victim's device, including documents, images, source code, databases, and USB devices.
Detecting banking and cryptocurrency services in browsers allows malware to specifically target sensitive financial information and transactions.
Keyloggers and clippers are types of malware that can record keystrokes or clipboard contents, respectively, potentially giving attackers access to sensitive data like passwords or credit card numbers.
Session stealing for services like Steam, Uplay, and Minecraft can allow attackers to gain access to the victim's gaming accounts.
Desktop and webcam screenshots allow attackers to view the victim's screen and camera, potentially capturing sensitive information or compromising the victim's privacy.
VPNs like ProtonVPN, OpenVPN, and NordVPN can be targeted by malware to gain access to the victim's network traffic and potentially steal sensitive information.
Cryptocurrency wallets can also be targeted by malware in an attempt to steal the victim's digital assets.
Messaging apps like Telegram and Pidgin can also be targeted by malware seeking to steal login information or access to the victim's messages.
Filezilla hosts can be targeted to gain access to sensitive data stored on remote servers.
The process list and directory structure of a victim's device can be targeted by malware to gain information about running processes and file locations.
Product keys can be targeted by malware seeking to steal software licenses or gain access to proprietary software.
Autorun modules can be targeted by malware to ensure that it is always running on the victim's device, even after a reboot or shutdown.
Download:-
You must reply before you can see the hidden data contained here.