Bytelocker icon indicating copy to clipboard operation
Bytelocker copied to clipboard

Open-source windows ransomware created for educational purposes

Bytelocker

This program is a educational Windows ransomeware similar to cryptolocker which uses AES-256 with a local password.

Usage

Instructions for making program encrypt a single folder

  • Open src/Bytelocker.cs in VS or any other editor/ide.
  • Enter folder to encrypt in the appropriate spot in the Encrypt() method. eg.
CryptoManagerMainHandler cmh = new CryptoManagerMainHandler();
cmh.EncryptFolder(@"c:\temp");

Instructions for making the program encrypt all drives

  • Open src/CryptoManager/CryptoManagerMainHandler.cs in VS or any other editor/ide.
  • Uncomment //dfm.ChooseDir(subDir); and //dfm.EncryptDir(); in EncryptAll() method.
  • Go to src/Bytelocker.cs.
  • Replace cmh.EncryptFolder(@"TEST_FOLDER_HERE"); in the Encrypt() method with cmh.EncryptAll();.

Instructions for decrypt

  • Open regedit.
  • Navigate to HKCU/Software/Bytelocker.
  • Copy the value under the name of id.
  • Go to https://www.base64decode.org/ and convert the id from b64 to text to get the password.

Features

  • Very strong AES-256 encryption.
  • Robust error-checking and handling.
  • Simple but effective UI with ability to list files encrypted.
  • Ability to copy file to the appdata dir, generate random GUID, and add to startup.

Vulnerabilities/Weaknesses

  • Password is stored locally in registry as base64.
  • Password can still be retreived through memory hacking.
  • Program is not super efficent.
  • Many variables are stored locally in registry.

Disclaimer

I am not responsible for any use of this program.