Disclaimer: This project is for educational and research purposes only. Do not use it for malicious intent.
RatLocker is a PowerShell-based proof-of-concept ransomware that simulates file renaming and wallpaper changes. It also includes a USB Rubber Ducky payload for automated execution.
- File Renaming: Appends
.ratl0ck3rto targeted files inDesktop,Pictures,Music,Videos, andDownloads. - Wallpaper Change: Replaces the desktop wallpaper with a custom image.
- Decryption Script: Drops a PowerShell script (
Decryption.ps1) that must be placed in the affected folder to restore file names. - USB Rubber Ducky Payload: Automates script execution when plugged into a Windows machine.
The included Ducky script performs the following:
- Opens the Run dialog (
Win + R). - Enables unrestricted PowerShell execution.
- Downloads and executes
Script.ps1from GitHub.
- Move
Decryption.ps1into the affected folder (Desktop,Pictures,Music,Videos, orDownloads). - Run
Decryption.ps1. - Enter the decryption password:
2us0jru04ws@gz@(case-sensitive). - The script will rename all
.ratl0ck3rfiles back to their original names in that folder.
- Open a PowerShell terminal.
- Run
Script.ps1(Administrator rights not required).
- Flash the script to a USB Rubber Ducky.
- Plug it into a target Windows machine.
- The payload will automatically execute.