FAQ The Old Phantom Crypter - REBORN 2018
Q1. In which programming language is written stub?
A1. Stub of Crypter is written in VB.NET, stub of Memory Dropper is written in AutoHotKey.
Q2. Is Crypter really FUD?
A2. Yes, crypter is FUD or UD with 1 or 2 detection, depends how much time was last update.
Q3. How often is update?
A3. Updates is free and it is weekly(Every 3-4 days).
Q4. Can Crypter bypass Runtime?
A4. Yes, we are using new unique method to bypass runtime without RunPE. Our Crypter has been tested over Nod 32 10 Advanced Memory Scanner/Avast Premier/Avira Free/Norton/McAfee/AVG and MS Essential(Win.Defender). All were bypassed sucessfully!
Q5. Is Crypter compatible with native files like DarkComet or Netwire?
A5. Both Basic and Extended version ( Reborn only) are compatible with native files! Extended version has unique Encrypted RunPE which support native files too like C/C++/Delphi/VB6 and memory dropper module which is compatible with native files like DarkComet(Delphi/C++).
Q6. Is Crypter compatible with .NET files like LuminosityLink, Imminent, Orcus etc?
A6. YES, all .NET files is compatible with both Basic and Extended version.
Q7. Can protected file be executed over Windows 10?
A7. Yes, without any problems.
Q8. Does BASIC version include Exploits?
A8. NO, Only Extended version has exploits!
Q9. Is silent .doc exploit FUD?
A9. FUD or UD, but all major AntiVirus has been removed including Avast/AVG/NOD 32/MS Essental/Norton/McAfee/Kaspersky etc...
Q10. How often you update exploits?
A10. When it get too much detection.
Q11. Office exploits is silent or macro?
A11. Both, we have both silent CVE 2017-8759, CVE 2015-2545, ,CVE 2014-6352 CVE 2012-0158, CVE 2010-3333 and macro exploits for Exel and Word.
Q12. What is the best Exploit?
A12. Help file exploit(.chm) for sure! It is FUD, working over all OS, no dependency! Also new .mht exploit is very good and stable!
Q13. Which version is compatible with silent exploits?
A13. Currently, we have 4 silent .doc exploits and 1 .pptx silent exploit. First one CVE 2017-8759 which working on all Office 2007/2010/2013/2016 and all Windows OS Windows XP/7/8/8.1/10 second one is CVE 2010-3333 (Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via crafted RTF data, aka "RTF Stack Buffer Overflow Vulnerability."). Another one is CVE 2012-0158(2007 SP2 & 2010 SP1 Office version compatible) And the last one is CVE 2015-2545. We have also silent .ppt exploit for PowerPoint CVE 2014-6352 which working on all Windows OS (7/8/8.1/10) and Office 2007/2010/2013(SP1).
Q14. Can i get discount or vouch copy?
A14. No vouch copy, discount is possible but for it you must be our co-worker, for more info ask on Skype for it.
Q15. what is the output size?
A15. Output size iz around 50-150 KB.
Q16. Do you accept PayPal or other payment?
A16. No, we can accept only Bitcoin right now.
Q17. Where i can scan my crypted files or exploits?
A17. Use spyralscanner.com or Viruscheckmate scanner to scan crypted files or exploits, if you scan it on virustotal or jotti your license shoud be banned!
Q18. What is Bypass proactive?
A18. That is special module, which execute .exe via Microsoft powershell, it can be used to bypass UAC or Proactive/Cloud protection! Also it has Scthast startup to bypass some Proactive AntiVirus heuristic detection!
Q19. What if i get too much detection?
A19. If your file has detection like: Kazy, Bary, Zusy, Gen:Variant or HEUR:GEN32 please use Assembly Editor & Icon changer to remove it, otherwise send me a message for real detection like MSIL. Injetor, HEUR, Win32
Q20. How to update stub and application?
A20. All updates are automatically by app, for builder update check your inbox every time!
Main Page
Skype Support
Email: theoldphantomdelija@gmail.com