"Hello, everyone! Today, we will explore the process of creating a simple malware using Python 3. In this page, we'll be focusing on ransomware. Let's dive right in!
To create malware, it's important to understand how ransomware works. Ransomware functions by
encrypting a user's files or even the entire computer, then demanding a ransom for decryption.
Without the decryption keys, the user cannot regain access to their files.
As mentioned earlier, the creation of ransomware involves two key components: encryption and
decryption. To demonstrate this process, we'll set up a virtual environment to run our code. By
exploring encryption and decryption techniques, we'll develop a basic ransomware program. It's
crucial to stress that this exercise should not be used for malicious intent. Instead, it can be
used for harmless pranks on friends. However, always remember to decrypt their files promptly if
they express concern. Safety and ethical considerations are paramount in our endeavors.
Before we proceed to create ransomware, it's essential to prepare a disposable or unused laptop for
testing purposes. If you don't have access to such a laptop or prefer not to risk harming a
computer, you can create a virtual environment to run the ransomware code. Running ransomware code
can be extremely risky, as it has the potential to encrypt all your data on the laptop, rendering it
irrecoverable.
Now, let's proceed with creating the malware. To set up a virtual laptop, you can refer to the
YouTube video below, which demonstrates how to create a virtual environment using Linode and VNC
Server. Linode and VNC Server offers free trials for new users, making it accessible for our
purpose. If you wish to subscribe for additional features, you have that option, but the free trial
is sufficient for us to run our ransomware code. You may also refer to this link to get more
details on how to set up the virtual laptop.
Now, let's take a look at the YouTube video below to create the encryption and decryption module
together! You will learn the core of the Ransomware and know how it actually works. You can create a
simple Ransomware by learning from the YouTube video below
The encryption module plays a pivotal role in our ransomware. It's the component that enables us to secure a ransom from the user by encrypting their files. Our goal is to create inconvenience for the user, ensuring that they pay for the decryption key. This is a enhanced edition of python code for the encryption part of a Ransomware.
Coding for the encryption file

The decryption module is essential to ensure that users cannot decrypt their files without our
decryption tools. As responsible cybercriminals, when users pay us a ransom, we will provide
them with the means to decrypt their files.Here is the enhanced edition of python code for the
decryption part of a Ransomware.
Coding for decryption file


We succesfully created a Ransomware by ourselves! By using Virtual Laptop and the run the enhanced Ransomware, we succeccfully encrypted all of the files in the laptop and get paid Ransom!! Watch the demonstration video for more explanation and understanding.
Ewen Cheung Yi Wen
Instagram: ewencheung_
Tel: +6012-630 2899
Meor Hazimi
Instagram: meor_hazimi
Tel: +6019-752 1755
Muhammad Aish Qayyim
Instagram: aishqym
Tel: +6012-342 5562
Aidil Asyraf
Instagram: aidislost
Tel: +6013-983 6733