Releases: leeberg/CashCatRansomwareSimulator
Releases · leeberg/CashCatRansomwareSimulator
V1.4 - The simple and spooky release
Description
- A New Spookier look with new timers and more menacing color scheme and countdown timer
- Removed ALL Dependencies - JUST a standalone EXE
- Remove ALL ACTUAL CryptoLocking components to stop triggering Windows Defender False Positive
- Now picks from a random list of real ransomware extensions for rename operations
V1.3 - The Spinning Edition
V1.2 - The ErrorWare Fix
Description
Updated Demo to Include the needed DLLs - whoops.
Also Featuring:
- Rudimentary Logging
- A Few Try Catches here and there
V1.1 - Optional Configuration File
Added ConfigurationFile Options
Usage
- Download and Extract This ZIp
- Run Cashcast.exe.
- Notice the .TXT files have been renamed!
- Enter the code 123456789 to rename all .LOCKY files back to .TXT
Configuration
- Place JSON file named "CashCat.Json" in the same directory as the executable.
- Population the Configuration JSON as follows:
{
"webHookEnabled": 0,
"webHookURI": "http://URIGORESHERE.COM",
"catMode": 0
}
Options
- webHookEnabled - instructs CashCat to execute a GET webhook execution on open
- webHookURI - Webhook URI to be called
- catMode - "Secret" CashCat mode!
V1 Release
Version 1
- Basically Functionality Working!
- Only "Fake Ransomware" mode exists - the "Cash Cat" easter egg background mode is currently not implemented.
Usage
- Download and Extract This ZIp
- Run Cashcast.exe.
- Notice the .TXT files have been renamed!
- Enter the code 123456789 to rename all .LOCKY files back to .TXT