Skip to content

Automatically runs ransomware in a safe environment and exports the encrypted files.

License

Notifications You must be signed in to change notification settings

SirEOF/automated_ransomware_runner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Automated ransomware runner

Runs a sequence of commands, which can be defined in the run.json, in a virtual box. Afterwards it exports and compresses the files and folders in the output folder on the host machine. The operations in the run.json are setup to copy the ransomware executable on the internal drive, starting the executable, waiting for some time and then copying the encrypted files to the output folder. The purpose of this runner is to generate a set of files encrypted by ransomware by automatically running ransomware executables in a save environment.

Virtual box setup for optimally running ransomware

  • Fully updated Windows 10
  • Disabled Windows Defender
  • Disabled UAC

Setup

Use the constants in the script do define:

  • Virtual box machine name
  • Virtual box user name
  • Virtual box password
  • Zip Input folder (Virtual box output folder)
  • Zip Output folder

Structure of the run.json

[[{
    "command": "C:\\Windows\\System32\\cmd.exe",
    "parameters": ["/C", "copy", "F:\\evil_file1", "C:\\Users\\Malware\\Desktop\\evil_file1.exe"],
    "sleep": 10
}]]
  • command: Command run in the virtual box as string.
  • parameters: Parameters of the command, annotaged as array ["parameter1", "parameter2", ...].
  • sleep: Suspends the execution of the script for x seconds after each command. This is necessary for the execution of the ransomware that it can perform its malicious behaviour.

About

Automatically runs ransomware in a safe environment and exports the encrypted files.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages