FlyFar

README

Sep 23rd, 2023
140
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.75 KB | Cybersecurity | 0 0
  1. This is only for Educational purposes.
  2.  
  3. The purpose of this particular development is to demonstrate in my review paper about the file-less malware approach using JavaScript.
  4. Link to the paper: https://www.linkedin.com/pulse/survey-file-less-malware-approach-using-javascript-ruwan-geeganage
  5.  
  6. 3rd party libraries used
  7. - RSA encryption library
  8. - Base 64 decoding library
  9. - Command line execution mechanism of the Poweliks.
  10.  
  11. This uses the RSA 1024-bit public key for encryption.
  12. This is a POC for a file-less malware approach with JavaScript.
  13.  
  14. This a Ransomware.
  15. This ransomware will encrypt the first 23400 characters in PDF, TXT, DOC, DOCX, XLS inside the Document folder.
  16. eg: C:\Users\Victim\Documents\
  17.  
  18. Registry entry creation:
  19.  
  20. Encryption Module => HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\e
  21. FileReader Module => HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\f
  22. Decoder Module => HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\d
  23. Public Key => HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\pk
  24. Triggering point => HKCU\Software\Microsoft\Windows\CurrentVersion\Run\fileLessRw
  25.  
  26. The encryption and File Reader module is stored in Base 64 Encoded format.
  27. Execution module
  28. Commands in the triggering point entry will read the decoder module and execute it.
  29. The decoder reads the File Reader module and decodes it then executes it.
  30. The file reader module will read the encryption module and execute against all the files that satisfy the selection criteria.sd
  31. The encryption module reads the Public key and uses it for encryption.
  32. The encryption module adds a header to each file to identify any file which already been encrypted to avoid encryption again.
  33. PAYLOAD.JS contains all the code. Other than that, there are no files involved or created by the malware.
Add Comment
Please, Sign In to add comment