• Home
  • About Us
  • General
  • Wireless
  • Web
  • Scanning
  • Metasploit
  • Hacking Courses
    • OSCP
    • The Virtual Hacking Labs
    • Certified Ethical Hacker (CEH)
    • Hacking Books
  • More
    • Exploit tutorials
    • Pentesting Exchange
    • Networking
    • Malware Analysis
    • Hacking Metasploitable 2/3
    • Digital Forensics
  • Contact
Facebook Twitter Instagram
Trending
  • CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability
  • Installing Rogue-jndi on Kali Linux
  • Log4Shell VMware vCenter Server (CVE-2021-44228)
  • The Great Leak: Microsoft Exchange AutoDiscover Design Flaw
  • CVE-2019-19781: Citrix ADC RCE vulnerability
  • Vulnerability Scanning with OpenVAS 9 part 4: Custom scan configurations
  • Vulnerability Scanning with OpenVAS 9 part 3: Scanning the Network
  • Vulnerability Scanning with OpenVAS 9 part 2: Vulnerability Scanning
Facebook Twitter YouTube Tumblr Instagram Pinterest
Hacking Tutorials
  • Home
  • About Us
  • General
  • Wireless
  • Web
  • Scanning
  • Metasploit
  • Hacking Courses
    • OSCP
    • The Virtual Hacking Labs
    • Certified Ethical Hacker (CEH)
    • Hacking Books
  • More
    • Exploit tutorials
    • Pentesting Exchange
    • Networking
    • Malware Analysis
    • Hacking Metasploitable 2/3
    • Digital Forensics
  • Contact
Hacking Tutorials
You are at:Home » General Tutorials » Tox Ransomware infection and removal instructions
TOX Ransomware infection and removal scr

Tox Ransomware infection and removal instructions

5
By Hacking Tutorials on June 1, 2015 General Tutorials

Tox Ransomware is malware which encrypts your hard drive and demands money in exchange for decryption. After CTB-Locker, Teslacrypt, CryptoWall, Cryptolocker and TorrentLocker, Tox is the new ransomware on the block. Tox is set up as a Ransomware-as-a-service where Tox developers take 20% of the paid ransoms. Tox (or toxicola ransomware) is only accessible over the TOR network and bitcoin is used for pay-outs which keeps users kind of ‘anonymous’. Since it does not require any technical knowledge to set up this ransomware it is expected to be exploited by many users.

Tox Ransomeware is a free ransomware-as-a-service kit, easy to set-up because no technical knowledge is required. Access and virus creation through TOR network, no contact details for registration, pay-outs using bitcoin and Tox takes a 20% cut of the ransom. This is a great formula that will lead us to one thing: Trouble!

Tox Ransomeware creation

Tox ransomware can be easily created on a TOR union website by signing up with just a name and password.

Tox Ransomware 1

Than completing a form which contains a message, ransom fee and a note.

Tox Ransomware 2

And the final step is to download the Tox Ransomeware virus and it is ready to spread. The output file looks like a regular Microsoft Office Word document and has a .src extension. When the document is opened by the victim the virus will encrypt your hard drive, download and install Curl and TOR. All downloaded files will be stored in the following path: C:\Users\AppData\Roaming\

After execution, Tox Ransomware will start TOR in SOCKS5 proxy mode.

Tox Ransomware 3

How to protect yourself

  • Make regular back-ups of your data.
  • Do not open attachments or files from an unknown source.
  • Keep your antivirus up-to-date.
  • Scan for Malware on a regular basis.
  • Browse internet safely.

Tox Ransomware removal

In this tutorial we will be infecting ourselves with Tox ransomware and remove it afterwards using AntiMalwareBytes. Please note that decrypting your files will be very hard and is not covered in this tutorial, just removal of the malware and persistence methods to prevent further damage to your system. Watch below video for a step-by-step tutorial on how to remove Tox Ransomware using MalwareBytes.

Thanks for watching and please subscribe to my YouTube channel for more hacking tutorials :)

Share on:

  • Email
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleScanning Webservers with Nikto for vulnerabilities
Next Article How to hack a WordPress website with WPScan

Related Posts

CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability

Installing Rogue-jndi on Kali Linux

The Great Leak: Microsoft Exchange AutoDiscover Design Flaw

5 Comments

  1. dk on July 6, 2015 1:23 pm

    why this site is not open in tor ?

    Reply
    • Hacking Tutorials on July 6, 2015 7:32 pm

      The owner was selling the platform. It has probably been taken offline or sold.

      Reply
  2. King on October 4, 2015 9:26 pm

    Does this work on any OS or just Windows?

    Reply
    • Hacking Tutorials on October 5, 2015 6:53 pm

      This is Windows only.

      Reply
  3. noah on September 13, 2017 12:28 am

    If this were bundled in a password protected rar, would it still be detected by malware bytes?

    Reply

Leave A Reply Cancel Reply

Top Tutorials
By Hacking TutorialsOctober 29, 20220

CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability

By Hacking TutorialsJanuary 10, 20220

Installing Rogue-jndi on Kali Linux

By Hacking TutorialsDecember 17, 20210

Log4Shell VMware vCenter Server (CVE-2021-44228)

By Hacking TutorialsSeptember 27, 20210

The Great Leak: Microsoft Exchange AutoDiscover Design Flaw

By Hacking TutorialsFebruary 4, 20200

CVE-2019-19781: Citrix ADC RCE vulnerability

By Hacking TutorialsNovember 1, 20188

Vulnerability Scanning with OpenVAS 9 part 4: Custom scan configurations

Subscribe

Enter your email address to subscribe to Hacking Tutorials and receive notifications of new tutorials by email.

Join 828 other subscribers
Recent Tutorials
  • CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability
  • Installing Rogue-jndi on Kali Linux
  • Log4Shell VMware vCenter Server (CVE-2021-44228)
  • The Great Leak: Microsoft Exchange AutoDiscover Design Flaw
  • CVE-2019-19781: Citrix ADC RCE vulnerability
Virtual Hacking Labs
Penetration Testin Course and Hacking Labs
Categories
  • Digital Forensics
  • Exploit tutorials
  • General Tutorials
  • Hacking Books
  • Hacking Courses
  • Malware Analysis Tutorials
  • Metasploit Tutorials
  • Networking
  • Pentesting Exchange
  • Scanning Tutorials
  • Web Applications
  • Wifi Hacking Tutorials
Downloads
  • directory_scanner.py (120572 downloads)
  • PEiD-0.95-20081103.zip (111425 downloads)
  • wifi_jammer.py (138169 downloads)
Recent Tutorials
  • CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability
  • Installing Rogue-jndi on Kali Linux
  • Log4Shell VMware vCenter Server (CVE-2021-44228)
  • The Great Leak: Microsoft Exchange AutoDiscover Design Flaw
  • CVE-2019-19781: Citrix ADC RCE vulnerability
  • Vulnerability Scanning with OpenVAS 9 part 4: Custom scan configurations
Popular Tutorials
By Hacking TutorialsSeptember 1, 2016115

Review: Offensive Security Certified Professional (OSCP)

By Hacking TutorialsApril 18, 201738

Exploiting Eternalblue for shell with Empire & Msfconsole

By Hacking TutorialsMarch 17, 201637

Installing VPN on Kali Linux 2016 Rolling

Featured Downloads
  • directory_scanner.py (120572 downloads)
  • PEiD-0.95-20081103.zip (111425 downloads)
  • wifi_jammer.py (138169 downloads)
© Hacking Tutorials 2022

Type above and press Enter to search. Press Esc to cancel.

Go to mobile version