Lucene search

K
kitploitKitPloitKITPLOIT:6148014392352003446
HistoryMay 27, 2022 - 12:30 p.m.

Ransomware-Simulator - Ransomware Simulator Written In Golang

2022-05-2712:30:00
www.kitploit.com
17

The goal of this repository is to provide a simple, harmless way to check your AV’s protection on ransomware.

This tool simulates typical ransomware behaviour, such as:

  • Staging from a Word document macro
  • Deleting Volume Shadow Copies
  • Encrypting documents (embedded and dropped by the simulator into a new folder)
  • Dropping a ransomware note to the user’s desktop

The ransomware simulator takes no action that actually encrypts pre-existing files on the device, or deletes Volume Shadow Copies. However, any AV products looking for such behaviour should still hopefully trigger.

Each step, as listed above, can also be disabled via a command line flag. This allows you to check responses to later steps as well, even if an AV already detects earlier steps.

Usage

Run command:

Run Ransomware Simulator  
  
Usage:  
ransomware-simulator run [flags]  
  
Flags:  
    --dir string                     [Directory](<https://www.kitploit.com/search/label/Directory> "Directory" ) where files that will be encrypted should be staged (default "./encrypted-files")  
    --disable-file-encryption        Don't simulate document encryption  
    --disable-macro-simulation       Don't simulate start from a macro by building the following process chain: winword.exe -> cmd.exe -> ransomware-simulator.exe  
    --disable-note-drop              Don't drop pseudo ransomware note  
    --disable-shadow-copy-deletion   Don't simulate volume shadow copy deletion  
-h, --help                           help for run  
    --note-location string           Ransomware note location (default "C:\\Users\\neo\\Desktop\\ransomware-simulator-note.txt")

Download Ransomware-Simulator