Disclaimer: This project is for educational and research purposes only. Do not use it for malicious intent.
RatLocker is a PowerShell-based proof-of-concept ransomware that simulates file renaming and wallpaper changes. It also includes a USB Rubber Ducky payload for automated execution.
- File Renaming: Appends
.ratl0ck3r
to targeted files inDesktop
,Pictures
,Music
,Videos
, andDownloads
. - Wallpaper Change: Replaces the desktop wallpaper with a custom image.
- Decryption Script: Drops a PowerShell script (
Decryption.ps1
) that must be placed in the affected folder to restore file names. - USB Rubber Ducky Payload: Automates script execution when plugged into a Windows machine.
The included Ducky script performs the following:
- Opens the Run dialog (
Win + R
). - Enables unrestricted PowerShell execution.
- Downloads and executes
Script.ps1
from GitHub.
- Move
Decryption.ps1
into the affected folder (Desktop
,Pictures
,Music
,Videos
, orDownloads
). - Run
Decryption.ps1
. - Enter the decryption password:
2us0jru04ws@gz@
(case-sensitive). - The script will rename all
.ratl0ck3r
files back to their original names in that folder.
- Open a PowerShell terminal.
- Run
Script.ps1
(Administrator rights not required).
- Flash the script to a USB Rubber Ducky.
- Plug it into a target Windows machine.
- The payload will automatically execute.