Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked [Java Script] file-less-ransomware-demo


blackhands

Recommended Posts

Link to the paper:
This is the hidden content, please

3rd party libraries used.sdf

 

RSA encryption library

Base 64 decoding library

Command line execution mechanism of the Poweliks.

 

This uses RSA 1024 bit public key to encryption.

This is a POC for a file-less malware approach with JavaScript.

This a Ransom ware.

This ransome ware will encrypt the first 23400 characters in PDF, TXT, DOC, DOCX, XLS inside the Document folder.

 

eg: C:\Users\Victim\Documents\

 

Registry entry creation

 

Encryption Module => HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\e

 

FileReader Module => HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\f

 

Decoder Module => HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\d

 

Public Key => HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\pk

 

Triggering point => HKCU\Software\Microsoft\Windows\CurrentVersion\Run\fileLessRw

 

Encryption nd File Reader module is stored in Base 64 Encoded format.

Exection module

 

Commands in the triggering point entry will read the decoder module and execute it.

Decoder reads the File Reader module and decode it then executes it.

File reader module will read encryption module and execute against all the files statisfy the selection criteria.sd

Encrption module reads Public key and use its for encryption.

Encrytion module adds a header to each file to identify any file which already encrypted to avoid encrytion again.

 

PAYLOAD.JS contains all the code. Other than that, there are no any files involved or created by the malware.

 

[HIDE-THANKS]

This is the hidden content, please
[/HIDE-THANKS]

Edited by J0k3rj0k3r
Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.