Cyber security

Prince Ransomware – A New Threat In Cybersecurity

Prince now has a Windows Defender flag, namely “Ransom:Win64/PrinceRansom.YAA!MTB”. This means that Prince Ransomware will no longer bypass Windows Defender without modifications to remove the signature.

If, for whatever reason, bypassing Windows Defender is a priority for you, contact me on Telegram and I will accept payment for any changes you may require.

Brief Overview

Prince is a ransomware written from scratch in Go. It uses a mixture of ChaCha20 and ECIES cryptography in order to encrypt files securely so that they cannot be recovered by traditional recovery tools.

Files which have been encrypted by Prince can only be decrypted using the corresponding decryptor.

Installation And Setup

Pre-requisites:

Compiling The Builder

  • In order to compile the builder program, you must run the Build.bat file.
  • This will automatically download the dependencies and build the Builder.exe file in the current directory.

Building The Ransomware

  • In order to build the encryptor and decryptor, you must run the Builder.exe program.
  • Ensure that the builder is in the same directory as the Encryptor and Decryptor directories, as it will not be able to build them otherwise.
  • The builder will generate a unique ECIES key pair and output the compiled executables to the current directory.
  • The Prince-Built.exe file is the encryptor. Use caution when handling it as it can cause a lot of damage to your system.
  • The Decryptor-Built.exe file is the decryptor. It will only decrypt files which were decrypted by the corresponding encryptor.

Encryption Process

  • The encryptor enumerates all drives on the system, and proceeds to iterate through each directory recursively.
  • It ignores blacklisted files, directories and extensions.
  • It generates a unique ChaCha20 key and nonce for each file, and encrypts the file using a pattern of 1 byte encrypted, 2 bytes unencrypted.
  • It encrypts the ChaCha20 key and nonce using the ECIES public key, and prepends them to the start of the file.

Benefits Of ChaCha20 And ECIES

I chose this unique combination of encryption methods for several reasons:

  • ChaCha20’s stream-based approach allows for byte-by-byte encryption, enabling the pattern of 1 byte encrypted, 2 bytes unencrypted.
  • ECIES offers similar security to RSA with shorter key lengths, making it a more efficient choice.

For more information click here.

Varshini

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

Kali Linux 2024.4 Released, What’s New?

Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and…

1 day ago

Lifetime-Amsi-EtwPatch : Disabling PowerShell’s AMSI And ETW Protections

This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for…

1 day ago

GPOHunter – Active Directory Group Policy Security Analyzer

GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory…

3 days ago

2024 MITRE ATT&CK Evaluation Results – Cynet Became a Leader With 100% Detection & Protection

Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…

6 days ago

SecHub : Streamlining Security Across Software Development Lifecycles

The free and open-source security platform SecHub, provides a central API to test software with…

1 week ago

Hawker : The Comprehensive OSINT Toolkit For Cybersecurity Professionals

Don't worry if there are any bugs in the tool, we will try to fix…

1 week ago