Skip to content

EvilBytecode/ThunderKitty-Ransomware

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 

Repository files navigation

ThunderKitty-Ransomware

The encryption process involves the following steps:

  1. Generate a User ID: A unique user ID is generated to identify the victim.
  2. Generate an Encryption Key: A 256-bit AES encryption key is generated randomly.
  3. Encrypt Files: All files in the specified target directory are recursively encrypted using AES-GCM (Galois/Counter Mode). Each file is encrypted with a unique nonce.
  4. Send Notification: A notification containing the user ID, encrypted directory, and encryption key is sent to a specified Discord webhook.
  5. Create Ransom Note: A ransom note is created on the victim's desktop, providing instructions on how to pay the ransom and recover the encrypted files.

Decryption

The decryption process involves the following steps:

  1. Obtain Decryption Key: The victim must obtain the decryption key by following the instructions in the ransom note.
  2. Decrypt Files: The victim uses the provided decryption script to decrypt the encrypted files using the obtained key.

Usage

Ransomware.go

Replace the placeholders in the script with appropriate values:

  • dischook: Your Discord webhook URL.
  • targetDir: The directory to encrypt.
  • xmraddr: Your Monero address for receiving the ransom.
  • cashamt: The ransom amount.
  • email: Your contact email.

image image

Releases

No releases published

Packages

No packages published

Languages