8000 GitHub - mkceta/RUSB: Ransomware on USB PoC
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

mkceta/RUSB

Folders and files

< 7BE4 td colSpan="3" class="bgColor-muted p-1 rounded-top-2">

Latest commit

 

History

2 Commits
NameName
Last commit message
Last commit date
 
 

Repository files navigation

RUSB

Ransomware on USB PoC using batch and aescrypt only

Disclaimer

RUSB is purely academic, use at your own risk. I do not encourage in any way the use of this software illegally or to attack targets without their previous authorization.

How it works

(R:)USB
 ├ Filename.txt.lnk
 └ System Volume Information
    ├ RUSB1.bat
    ├ RUSB2.bat
    ├ Aescrypt.exe
    └ Filename.txt

The folder System Volume Information (SVI) is automatically created by Windows for every partition, the main reason of us using it is that it cannot be seen by a regular user, even if the see hidden files option is enabled.

The whole process is simple: The victim opens Filename.txt.lnk wich will open RUSB1.bat, RUSB1.bat will send RUSB2.bat and Aescrypt.exe (CLI) to %USERPROFILE% this files will encrypt all the user files, then create a file called README.txt at the desktop with the intructions to recover the files, after that they will encrypt theirselves.

This project is still in development

About

Ransomware on USB PoC

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published
0