Skip to content

Actual real-world ransomware coded in WinAPI C++ with the help of the Cryptography API made to encrypt a whole Windows installation

License

Notifications You must be signed in to change notification settings

malwarepad/toy-ransomware

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

toy-ransomware

Have you always looked at malware that encrypts files surprised, saying to yourself "Oh man, how the hell did they even craft this?". Well when I was younger, I truly did wonder! Ransomware samples were exactly what brought me into the malware researching part of computers...

Today we're going to analyze exactly how ransomware attacks work: literally step-by-step! ...and then create our own, exclusively for entertainment and education usage. This is an actual real-world ransomware coded in WinAPI C++ with the help of the Cryptography API made to encrypt a whole Windows installation.

Message Encrypted files

Warning

The code in this repository - paired with an actual server - is as destructive as it gets. Files WILL be encrypted and I'm not responsible for any damage made by this source code. This repository is made to educate people on ransomware attacks and help them find ways in order to prevent them. Malware should never be used for any other purpose!

Stack

Sources/Helpful resources

How can I use it

First ask yourself "why do I want to use it?". My answer will depend on that...

  • "I want to use it to prank my friends": Rethink it. It will get picked up by their antivirus along with being completely unethical and illegal. You would be lucky to not have charges pressed.
  • "I want to start a ransomware attack": Yeah good luck with that buddy. That's also highly illegal and would probably get you in a lot of trouble along with more than likely destroying your life. Rethink that too.
  • "I want to educate myself on the attacks": Feel free to examine the source code without running any executable. To be extra safe don't even clone the repository, just use GitHub's editor.
  • "I am a professional and want to make a presentation for my students/company in a controlled environment": To use the code I provided, you have to pair it with the correct server. In order to do that, you'll have to edit GetEncryptionKey.cpp and change the host and/or port. Your webserver should be able to respond to a simple POST request to /victim with { success: true, privateKey: "xyz" } for encrypting and when re-sending it has to respond with { success: false } to signal decryption mode. If you need any help with that, contact me over at [email protected].

License

This project is licensed under the "GNU General Public License v3.0" license which you can see on the LICENSE file.

Contributing

You can contribute with algorythm improvements, just keep the purpose and mechanism the same. I won't really go deep in digging up pull requests...

About

Actual real-world ransomware coded in WinAPI C++ with the help of the Cryptography API made to encrypt a whole Windows installation

Topics

Resources

License

Stars

Watchers

Forks