0xploit.com

WorldWind Stealer Pro: A Malware Send Data On Telegram Bot

Joined
Apr 20, 2022
Messages
35
Location
regix
Hellcoins
♆762
World wind pro is a telegram-based stealer that first appeared in the cyber threat landscape in April 2020. This is image of the latest version
68747470733a2f2f692e696d6775722e636f6d2f68456e6c594d385f642e776562703f6d617877696474683d373630266669.webp

The WorldWind Stealer enables direct sending of logs to your Telegram ID through a bot that you create with Telegram. You can avoid the hassle of dealing with unstable panels found in other major stealers that gather less data than WorldWind.

To use this tool, follow these steps:

  1. Open it and build your botnet virus. You'll need two things to proceed:
  • BOT API TOKEN: Go to @Botfather, create a Telegram bot, and copy the API token to the first box.
  • CHAT ID: Get your chat ID from @get_id_bot and paste it in the second box.
  1. Start the bot you just created, build your virus, spread it, and wait for the results to appear in your bot.

Features:-

AntiAnalysis is a feature in malware that attempts to evade detection by antivirus software or other security measures. This can include checking if the malware is running in a virtual machine like VirtualBox or an emulator, if a debugger is attached, or if it is being analyzed by services like VirusTotal or Any.Run.

Stealing system information is a common tactic used by malware to gain access to sensitive data about the victim's device. This can include information like the device's version, CPU and GPU specs, amount of RAM, IP addresses, BSSID (the unique identifier for a wireless access point), location, and screen metrics.

Chromium based browsers are a popular target for malware due to their widespread use. Malware can target the browser to steal sensitive information like passwords, credit card details, cookies, browsing history, autofill data, and bookmarks.

Firefox based browsers are another popular target for malware, with attackers seeking to access data stored in the browser's database files, cookies, history, and bookmarks.

Internet Explorer and Edge are also targets for malware seeking to steal stored passwords.

Malware can also target saved WiFi networks to obtain information like the SSID (the name of the network) and BSSID.

File grabbers are features in malware that allow it to steal files from the victim's device, including documents, images, source code, databases, and USB devices.

Detecting banking and cryptocurrency services in browsers allows malware to specifically target sensitive financial information and transactions.

Keyloggers and clippers are types of malware that can record keystrokes or clipboard contents, respectively, potentially giving attackers access to sensitive data like passwords or credit card numbers.

Session stealing for services like Steam, Uplay, and Minecraft can allow attackers to gain access to the victim's gaming accounts.

Desktop and webcam screenshots allow attackers to view the victim's screen and camera, potentially capturing sensitive information or compromising the victim's privacy.

VPNs like ProtonVPN, OpenVPN, and NordVPN can be targeted by malware to gain access to the victim's network traffic and potentially steal sensitive information.

Cryptocurrency wallets can also be targeted by malware in an attempt to steal the victim's digital assets.

Messaging apps like Telegram and Pidgin can also be targeted by malware seeking to steal login information or access to the victim's messages.

Filezilla hosts can be targeted to gain access to sensitive data stored on remote servers.

The process list and directory structure of a victim's device can be targeted by malware to gain information about running processes and file locations.

Product keys can be targeted by malware seeking to steal software licenses or gain access to proprietary software.

Autorun modules can be targeted by malware to ensure that it is always running on the victim's device, even after a reboot or shutdown.



Download:-
You must reply before you can see the hidden data contained here.
 
Joined
May 5, 2023
Messages
32
Hellcoins
♆112
World wind pro is a telegram-based stealer that first appeared in the cyber threat landscape in April 2020. This is image of the latest version
68747470733a2f2f692e696d6775722e636f6d2f68456e6c594d385f642e776562703f6d617877696474683d373630266669.webp

The WorldWind Stealer enables direct sending of logs to your Telegram ID through a bot that you create with Telegram. You can avoid the hassle of dealing with unstable panels found in other major stealers that gather less data than WorldWind.

To use this tool, follow these steps:

  1. Open it and build your botnet virus. You'll need two things to proceed:
  • BOT API TOKEN: Go to @Botfather, create a Telegram bot, and copy the API token to the first box.
  • CHAT ID: Get your chat ID from @get_id_bot and paste it in the second box.
  1. Start the bot you just created, build your virus, spread it, and wait for the results to appear in your bot.

Features:-

AntiAnalysis is a feature in malware that attempts to evade detection by antivirus software or other security measures. This can include checking if the malware is running in a virtual machine like VirtualBox or an emulator, if a debugger is attached, or if it is being analyzed by services like VirusTotal or Any.Run.

窃取系统信息是恶意软件用来访问有关受害者设备的敏感数据的常用策略。这可能包括设备版本、CPU 和 GPU 规格、RAM 容量、IP 地址、BSSID(无线接入点的唯一标识符)、位置和屏幕指标等信息。

基于 Chromium 的浏览器因其广泛使用而成为恶意软件的热门目标。恶意软件可以将浏览器作为目标来窃取敏感信息,例如密码、信用卡详细信息、cookie、浏览历史记录、自动填充数据和书签。

基于 Firefox 的浏览器是恶意软件的另一个流行目标,攻击者试图访问存储在浏览器数据库文件、cookie、历史记录和书签中的数据。

Internet Explorer 和 Edge 也是试图窃取存储密码的恶意软件的目标。

恶意软件还可以针对已保存的 WiFi 网络获取 SSID(网络名称)和 BSSID 等信息。

文件抓取器是恶意软件中的一种功能,可以从受害者的设备中窃取文件,包括文档、图像、源代码、数据库和 USB 设备。

在浏览器中检测银行和加密货币服务允许恶意软件专门针对敏感的财务信息和交易。

键盘记录器和剪辑器是可以分别记录击键或剪贴板内容的恶意软件类型,可能使攻击者能够访问密码或信用卡号等敏感数据。

Steam、Uplay 和 Minecraft 等服务的会话窃取可以让攻击者获得对受害者游戏帐户的访问权限。

桌面和网络摄像头屏幕截图允许攻击者查看受害者的屏幕和摄像头,可能会捕获敏感信息或损害受害者的隐私。

ProtonVPN、OpenVPN 和 NordVPN 等 VPN 可能成为恶意软件的目标,以访问受害者的网络流量并可能窃取敏感信息。

加密货币钱包也可能成为恶意软件的目标,试图窃取受害者的数字资产。

Telegram 和 Pidgin 等消息应用程序也可能成为试图窃取登录信息或访问受害者消息的恶意软件的目标。

可以将 Filezilla 主机作为目标,以访问存储在远程服务器上的敏感数据。

受害者设备的进程列表和目录结构可能成为恶意软件的目标,以获取有关正在运行的进程和文件位置的信息。

产品密钥可能成为试图窃取软件许可证或获取专有软件访问权限的恶意软件的目标。

自动运行模块可以成为恶意软件的目标,以确保它始终在受害者的设备上运行,即使在重启或关机后也是如此。



下载:-
[隐藏内容]
6个666
 
Joined
Jul 25, 2023
Messages
45
Hellcoins
♆84
World wind pro is a telegram-based stealer that first appeared in the cyber threat landscape in April 2020. This is image of the latest version
68747470733a2f2f692e696d6775722e636f6d2f68456e6c594d385f642e776562703f6d617877696474683d373630266669.webp

The WorldWind Stealer enables direct sending of logs to your Telegram ID through a bot that you create with Telegram. You can avoid the hassle of dealing with unstable panels found in other major stealers that gather less data than WorldWind.

To use this tool, follow these steps:

  1. Open it and build your botnet virus. You'll need two things to proceed:
  • BOT API TOKEN: Go to @Botfather, create a Telegram bot, and copy the API token to the first box.
  • CHAT ID: Get your chat ID from @get_id_bot and paste it in the second box.
  1. Start the bot you just created, build your virus, spread it, and wait for the results to appear in your bot.

Features:-

AntiAnalysis is a feature in malware that attempts to evade detection by antivirus software or other security measures. This can include checking if the malware is running in a virtual machine like VirtualBox or an emulator, if a debugger is attached, or if it is being analyzed by services like VirusTotal or Any.Run.

Stealing system information is a common tactic used by malware to gain access to sensitive data about the victim's device. This can include information like the device's version, CPU and GPU specs, amount of RAM, IP addresses, BSSID (the unique identifier for a wireless access point), location, and screen metrics.

Chromium based browsers are a popular target for malware due to their widespread use. Malware can target the browser to steal sensitive information like passwords, credit card details, cookies, browsing history, autofill data, and bookmarks.

Firefox based browsers are another popular target for malware, with attackers seeking to access data stored in the browser's database files, cookies, history, and bookmarks.

Internet Explorer and Edge are also targets for malware seeking to steal stored passwords.

Malware can also target saved WiFi networks to obtain information like the SSID (the name of the network) and BSSID.

File grabbers are features in malware that allow it to steal files from the victim's device, including documents, images, source code, databases, and USB devices.

Detecting banking and cryptocurrency services in browsers allows malware to specifically target sensitive financial information and transactions.

Keyloggers and clippers are types of malware that can record keystrokes or clipboard contents, respectively, potentially giving attackers access to sensitive data like passwords or credit card numbers.

Session stealing for services like Steam, Uplay, and Minecraft can allow attackers to gain access to the victim's gaming accounts.

Desktop and webcam screenshots allow attackers to view the victim's screen and camera, potentially capturing sensitive information or compromising the victim's privacy.

VPNs like ProtonVPN, OpenVPN, and NordVPN can be targeted by malware to gain access to the victim's network traffic and potentially steal sensitive information.

Cryptocurrency wallets can also be targeted by malware in an attempt to steal the victim's digital assets.

Messaging apps like Telegram and Pidgin can also be targeted by malware seeking to steal login information or access to the victim's messages.

Filezilla hosts can be targeted to gain access to sensitive data stored on remote servers.

The process list and directory structure of a victim's device can be targeted by malware to gain information about running processes and file locations.

Product keys can be targeted by malware seeking to steal software licenses or gain access to proprietary software.

Autorun modules can be targeted by malware to ensure that it is always running on the victim's device, even after a reboot or shutdown.



Download:-
[Hidden content]
lets see
 

Chelx

New member
Joined
Oct 3, 2023
Messages
3
Hellcoins
♆6
World wind pro is a telegram-based stealer that first appeared in the cyber threat landscape in April 2020. This is image of the latest version
68747470733a2f2f692e696d6775722e636f6d2f68456e6c594d385f642e776562703f6d617877696474683d373630266669.webp

The WorldWind Stealer enables direct sending of logs to your Telegram ID through a bot that you create with Telegram. You can avoid the hassle of dealing with unstable panels found in other major stealers that gather less data than WorldWind.

To use this tool, follow these steps:

  1. Open it and build your botnet virus. You'll need two things to proceed:
  • BOT API TOKEN: Go to @Botfather, create a Telegram bot, and copy the API token to the first box.
  • CHAT ID: Get your chat ID from @get_id_bot and paste it in the second box.
  1. Start the bot you just created, build your virus, spread it, and wait for the results to appear in your bot.

Features:-

AntiAnalysis is a feature in malware that attempts to evade detection by antivirus software or other security measures. This can include checking if the malware is running in a virtual machine like VirtualBox or an emulator, if a debugger is attached, or if it is being analyzed by services like VirusTotal or Any.Run.

Stealing system information is a common tactic used by malware to gain access to sensitive data about the victim's device. This can include information like the device's version, CPU and GPU specs, amount of RAM, IP addresses, BSSID (the unique identifier for a wireless access point), location, and screen metrics.

Chromium based browsers are a popular target for malware due to their widespread use. Malware can target the browser to steal sensitive information like passwords, credit card details, cookies, browsing history, autofill data, and bookmarks.

Firefox based browsers are another popular target for malware, with attackers seeking to access data stored in the browser's database files, cookies, history, and bookmarks.

Internet Explorer and Edge are also targets for malware seeking to steal stored passwords.

Malware can also target saved WiFi networks to obtain information like the SSID (the name of the network) and BSSID.

File grabbers are features in malware that allow it to steal files from the victim's device, including documents, images, source code, databases, and USB devices.

Detecting banking and cryptocurrency services in browsers allows malware to specifically target sensitive financial information and transactions.

Keyloggers and clippers are types of malware that can record keystrokes or clipboard contents, respectively, potentially giving attackers access to sensitive data like passwords or credit card numbers.

Session stealing for services like Steam, Uplay, and Minecraft can allow attackers to gain access to the victim's gaming accounts.

Desktop and webcam screenshots allow attackers to view the victim's screen and camera, potentially capturing sensitive information or compromising the victim's privacy.

VPNs like ProtonVPN, OpenVPN, and NordVPN can be targeted by malware to gain access to the victim's network traffic and potentially steal sensitive information.

Cryptocurrency wallets can also be targeted by malware in an attempt to steal the victim's digital assets.

Messaging apps like Telegram and Pidgin can also be targeted by malware seeking to steal login information or access to the victim's messages.

Filezilla hosts can be targeted to gain access to sensitive data stored on remote servers.

The process list and directory structure of a victim's device can be targeted by malware to gain information about running processes and file locations.

Product keys can be targeted by malware seeking to steal software licenses or gain access to proprietary software.

Autorun modules can be targeted by malware to ensure that it is always running on the victim's device, even after a reboot or shutdown.



Download:-
[Hidden content]
nice
 

bighitran

New member
Joined
Oct 13, 2023
Messages
20
Hellcoins
♆32
World wind pro is a telegram-based stealer that first appeared in the cyber threat landscape in April 2020. This is image of the latest version
68747470733a2f2f692e696d6775722e636f6d2f68456e6c594d385f642e776562703f6d617877696474683d373630266669.webp

The WorldWind Stealer enables direct sending of logs to your Telegram ID through a bot that you create with Telegram. You can avoid the hassle of dealing with unstable panels found in other major stealers that gather less data than WorldWind.

To use this tool, follow these steps:

  1. Open it and build your botnet virus. You'll need two things to proceed:
  • BOT API TOKEN: Go to @Botfather, create a Telegram bot, and copy the API token to the first box.
  • CHAT ID: Get your chat ID from @get_id_bot and paste it in the second box.
  1. Start the bot you just created, build your virus, spread it, and wait for the results to appear in your bot.

Features:-

AntiAnalysis is a feature in malware that attempts to evade detection by antivirus software or other security measures. This can include checking if the malware is running in a virtual machine like VirtualBox or an emulator, if a debugger is attached, or if it is being analyzed by services like VirusTotal or Any.Run.

Stealing system information is a common tactic used by malware to gain access to sensitive data about the victim's device. This can include information like the device's version, CPU and GPU specs, amount of RAM, IP addresses, BSSID (the unique identifier for a wireless access point), location, and screen metrics.

Chromium based browsers are a popular target for malware due to their widespread use. Malware can target the browser to steal sensitive information like passwords, credit card details, cookies, browsing history, autofill data, and bookmarks.

Firefox based browsers are another popular target for malware, with attackers seeking to access data stored in the browser's database files, cookies, history, and bookmarks.

Internet Explorer and Edge are also targets for malware seeking to steal stored passwords.

Malware can also target saved WiFi networks to obtain information like the SSID (the name of the network) and BSSID.

File grabbers are features in malware that allow it to steal files from the victim's device, including documents, images, source code, databases, and USB devices.

Detecting banking and cryptocurrency services in browsers allows malware to specifically target sensitive financial information and transactions.

Keyloggers and clippers are types of malware that can record keystrokes or clipboard contents, respectively, potentially giving attackers access to sensitive data like passwords or credit card numbers.

Session stealing for services like Steam, Uplay, and Minecraft can allow attackers to gain access to the victim's gaming accounts.

Desktop and webcam screenshots allow attackers to view the victim's screen and camera, potentially capturing sensitive information or compromising the victim's privacy.

VPNs like ProtonVPN, OpenVPN, and NordVPN can be targeted by malware to gain access to the victim's network traffic and potentially steal sensitive information.

Cryptocurrency wallets can also be targeted by malware in an attempt to steal the victim's digital assets.

Messaging apps like Telegram and Pidgin can also be targeted by malware seeking to steal login information or access to the victim's messages.

Filezilla hosts can be targeted to gain access to sensitive data stored on remote servers.

The process list and directory structure of a victim's device can be targeted by malware to gain information about running processes and file locations.

Product keys can be targeted by malware seeking to steal software licenses or gain access to proprietary software.

Autorun modules can be targeted by malware to ensure that it is always running on the victim's device, even after a reboot or shutdown.



Download:-
[Hidden content]
Thật
 
Joined
Sep 26, 2023
Messages
105
Hellcoins
♆176
World wind pro is a telegram-based stealer that first appeared in the cyber threat landscape in April 2020. This is image of the latest version
68747470733a2f2f692e696d6775722e636f6d2f68456e6c594d385f642e776562703f6d617877696474683d373630266669.webp

The WorldWind Stealer enables direct sending of logs to your Telegram ID through a bot that you create with Telegram. You can avoid the hassle of dealing with unstable panels found in other major stealers that gather less data than WorldWind.

To use this tool, follow these steps:

  1. Open it and build your botnet virus. You'll need two things to proceed:
  • BOT API TOKEN: Go to @Botfather, create a Telegram bot, and copy the API token to the first box.
  • CHAT ID: Get your chat ID from @get_id_bot and paste it in the second box.
  1. Start the bot you just created, build your virus, spread it, and wait for the results to appear in your bot.

Features:-

AntiAnalysis is a feature in malware that attempts to evade detection by antivirus software or other security measures. This can include checking if the malware is running in a virtual machine like VirtualBox or an emulator, if a debugger is attached, or if it is being analyzed by services like VirusTotal or Any.Run.

Stealing system information is a common tactic used by malware to gain access to sensitive data about the victim's device. This can include information like the device's version, CPU and GPU specs, amount of RAM, IP addresses, BSSID (the unique identifier for a wireless access point), location, and screen metrics.

Chromium based browsers are a popular target for malware due to their widespread use. Malware can target the browser to steal sensitive information like passwords, credit card details, cookies, browsing history, autofill data, and bookmarks.

Firefox based browsers are another popular target for malware, with attackers seeking to access data stored in the browser's database files, cookies, history, and bookmarks.

Internet Explorer and Edge are also targets for malware seeking to steal stored passwords.

Malware can also target saved WiFi networks to obtain information like the SSID (the name of the network) and BSSID.

File grabbers are features in malware that allow it to steal files from the victim's device, including documents, images, source code, databases, and USB devices.

Detecting banking and cryptocurrency services in browsers allows malware to specifically target sensitive financial information and transactions.

Keyloggers and clippers are types of malware that can record keystrokes or clipboard contents, respectively, potentially giving attackers access to sensitive data like passwords or credit card numbers.

Session stealing for services like Steam, Uplay, and Minecraft can allow attackers to gain access to the victim's gaming accounts.

Desktop and webcam screenshots allow attackers to view the victim's screen and camera, potentially capturing sensitive information or compromising the victim's privacy.

VPNs like ProtonVPN, OpenVPN, and NordVPN can be targeted by malware to gain access to the victim's network traffic and potentially steal sensitive information.

Cryptocurrency wallets can also be targeted by malware in an attempt to steal the victim's digital assets.

Messaging apps like Telegram and Pidgin can also be targeted by malware seeking to steal login information or access to the victim's messages.

Filezilla hosts can be targeted to gain access to sensitive data stored on remote servers.

The process list and directory structure of a victim's device can be targeted by malware to gain information about running processes and file locations.

Product keys can be targeted by malware seeking to steal software licenses or gain access to proprietary software.

Autorun modules can be targeted by malware to ensure that it is always running on the victim's device, even after a reboot or shutdown.



Download:-
[Hidden content]
dfsfawww
 
Top