Ransomware application
Simple and effective ransomware application
The payload runs on the target’s machine and responsible for several tasks:
plgenerator.py
to load the payload generator window, where the payload’s data is defined:There are two sections:
{
"files": {
}
}
Files per full path which could save expensive search time:
{
"files": {
"fullPath": [
"C:\Users\User\Documents\file1.txt"
]
}
}
Files per root folder, which may include filenames or extensions:
{
"files": {
"fullPath": [
"C:\Users\User\Documents\file1.txt"
],
"roots": [
{
"paths": ["C:/Users/User/Documents", "C:/Users/User/videos"],
"files": [
"accounts",
"trip"
],
"extensions": [
".py",
".exe",
".mp4",
".doc"
]
}
]
}
}
The files can be restored by inserting the cipher key and decrypting them throught the user inetrface once the attack is completed.
As the program was written for educaiotnal purpose soley it does not remove the encryption key from the victim’s machine and provide a recovery option by revealing the key by a click of a button.
The server is used for payload registeriaiton, activation and storing their data and operation status. The payloads inform the server about the target files that were located and update their encryption status, send a copy of the generated cipher key and notify when an attacked is executed. The data can be extarcted any time and restored to the payloads when their activity is halted.
The server runs on the terminal and supports the following commands:
Prints all registered payload
>>> all
Prints single payload where id is the desired payload's id
>>> pl id
Quites server
>>> q