Skip to content

zisk/evil-decrypter

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

45 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Evil Decrypter

Brute force decrypted for NegozI Ransomware, which encrypts file to the .evil extension.

Each file is encrypted with a unique key based on the uptime of the machine so a boot time much be provided. This is logged every day with the ID of 6013. Likewise, the write time of the file should be preserved so that the program can work backwords from there. You can also use a Redis sever for caching keys once they are calculated, which may save time the more files are run through.

Like the original malware, requires .NET 4.0 or greater.

  -f, --file       Full path to file to be decrypted

  --dir            Process all .evil files in directory

  -d, --date       Required. Time of machine boot.

  -b, --buffer     Required. Millisecond buffer to add on either side of time

  -o, --offset     Offset of beginning tick

  -v, --verbose    Verbose output

  --single         (Default: true) Run single threaded. (Default)

  --multi          (Default: false) Run multi threaded.

  --redis          Specify Redis server for caching.

  --del            Delete file if successfully decrypted

  --help           Display this help screen.

  --version        Display version information.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages