https://github.com/evilbytecode/thunderkitty-ransomware
Ransomware written in go, encrypt - decrypt.
https://github.com/evilbytecode/thunderkitty-ransomware
fud go golang pentesting ransomware red-team virus
Last synced: 15 days ago
JSON representation
Ransomware written in go, encrypt - decrypt.
- Host: GitHub
- URL: https://github.com/evilbytecode/thunderkitty-ransomware
- Owner: EvilBytecode
- Created: 2024-06-28T11:44:57.000Z (10 months ago)
- Default Branch: main
- Last Pushed: 2024-06-28T13:13:36.000Z (10 months ago)
- Last Synced: 2025-03-26T08:37:33.095Z (about 1 month ago)
- Topics: fud, go, golang, pentesting, ransomware, red-team, virus
- Language: Go
- Homepage:
- Size: 1.95 MB
- Stars: 18
- Watchers: 1
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
### ThunderKitty-Ransomware
The encryption process involves the following steps:
1. **Generate a User ID**: A unique user ID is generated to identify the victim.
2. **Generate an Encryption Key**: A 256-bit AES encryption key is generated randomly.
3. **Encrypt Files**: All files in the specified target directory are recursively encrypted using AES-GCM (Galois/Counter Mode). Each file is encrypted with a unique nonce.
4. **Send Notification**: A notification containing the user ID, encrypted directory, and encryption key is sent to a specified Discord webhook.
5. **Create Ransom Note**: A ransom note is created on the victim's desktop, providing instructions on how to pay the ransom and recover the encrypted files.### Decryption
The decryption process involves the following steps:
1. **Obtain Decryption Key**: The victim must obtain the decryption key by following the instructions in the ransom note.
2. **Decrypt Files**: The victim uses the provided decryption script to decrypt the encrypted files using the obtained key.## Usage
### Ransomware.go
Replace the placeholders in the script with appropriate values:
- `dischook`: Your Discord webhook URL.
- `targetDir`: The directory to encrypt.
- `xmraddr`: Your Monero address for receiving the ransom.
- `cashamt`: The ransom amount.
- `email`: Your contact email.
