| |
- builtins.object
-
- RansomWare
class RansomWare(builtins.object) |
|
RansomWare(key: bytes, url: str = None, wallet: str = '3LU8wRu4ZnXP4UM8Yo6kkTiGHM9BubgyiG', crypto: str = 'BitCoin', price: str = '0.01', interval_time: float = 0, encrypt: Callable = <function rc6_encryption at 0x000001A49532CDC0>, get_iv: Callable = <function RansomWare.<lambda> at 0x000001A49532D510>)
This class implements the ransomware. |
|
Methods defined here:
- __init__(self, key: bytes, url: str = None, wallet: str = '3LU8wRu4ZnXP4UM8Yo6kkTiGHM9BubgyiG', crypto: str = 'BitCoin', price: str = '0.01', interval_time: float = 0, encrypt: Callable = <function rc6_encryption at 0x000001A49532CDC0>, get_iv: Callable = <function RansomWare.<lambda> at 0x000001A49532D510>)
- Initialize self. See help(type(self)) for accurate signature.
- check_path(self, full_path: str) -> bool
- This method returns True when data in the path should be
encrypted or False when it should not.
- encrypt_file(self, file: _io._BufferedIOBase, data: bytes) -> None
- This function encrypts one file.
- exfiltrate_file(self, file: _io._BufferedIOBase) -> bytes
- This function performs exfiltration for one file.
- get_drives(self)
- This method returns parents path to start recursive functions
("/" for Linux and filesystem drives for Windows).
- is_windows_server(self) -> bool
- This method returns True when the system is a Windows Server.
- ransom_recursively(self, directory: str) -> None
- This function get recursive filenames and crypt files.
- set_system_drive(self) -> None
- This method modify system_directories with Windows system drive.
- start(self) -> None
- This function starts the attack.
- write_ransomnote(self) -> None
- This method writes the ransomnote.
Data descriptors defined here:
- __dict__
- dictionary for instance variables (if defined)
- __weakref__
- list of weak references to the object (if defined)
| |