Skip to content

ret2c/TerryWare

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

TerryWare 🦀

Ransomware I wrote in Rust to demo for my blog post on reverse engineering
I'm not a great programmer, I only have experience with scripting, so apologies for the sloppy code.

TerryWare Demo:


Ransomware is designed to only trigger for Windows users named 'Terry', and it will only encrypt files under (C:\Users\Terry\*).
The key for decryption is: e558e84dba2de0209ce8d1ec73db5d3b, stemming from the first 16 bytes of 'terrypass' put through SHA256.
This is also the AES-128 key used for encrypting files.

fn generate_aes_key() -> [u8; 16] {
    let dictionary = ["t", "e", "r", "r", "y", "p", "a", "s", "s"];
    let password = dictionary.join("");
    let mut hasher = Sha256::new();
    hasher.update(password.as_bytes());
    let result = hasher.finalize();
    let mut key = [0u8; 16];
    key.copy_from_slice(&result[..16]);
    key
}

Thank you

Idov31 for inspiring the functionality of encrypt()/decrypt() functions
TCM Security for a great Rust course

About

Simple CLI ransomware written in Rust

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages