Opens profile photo
Follow
Click to Follow demonslay335
Michael Gillespie
@demonslay335
Loves cats, bunnies, and coding. #Ransomware Hunter. Creator of the service ID Ransomware. Views expressed are my own.
United Statesid-ransomware.malwarehunterteam.comJoined April 2014

Michael Gillespie’s Tweets

🔒New CryptoTester v1.4.0.2 for #ransomware analysis 🔎: TONS of fixes/additions to hexboxes, grouped algorithms in dropdown, flip endianness of keys, AES XTS mode, HMAC key derives, raw RSA (provide n + d/e, no padding), redesigned bruteforce key tool, lots of bugfixes.
Image
Image
Image
Image
8
391
New release of CryptoTester v1.3.0.4 for #Ransomware Analysis. Key Finder can grab PEM stubs/chunks, plus lots of bug fixes. Have a ciphertext + plaintext + key, but don't know what encryption algorithm? Try "Bruteforce Algorithm" to automatically test all that the tool supports.
Embedded video
GIF
6
347
💡 Bit of advice for #ransomware devs... Use SetFilePointerEx, 🛑 NOT 🛑 SetFilePointer. Don't be like AvosLocker, who fuck up tons of data in the middle of 4GB+ files because they ignore the high move value and return... Pays to read the damn documentation. 📚
5
167
Hmm, someone released a decryptor for #STOP #Djvu? Oh wait... it's more fucking #ransomware. Don't trust anything you find online saying it can decrypt Djvu unless it is from ME. This is just one example of the shaddy shit victims are falling for when they don't believe me.
Image
Image
Image
13
148
🔒CryptoTester v1.6.0.0 for #Ransomware Analysis🔍 Long overdue update with new algorithms, features, hashes, ECDH derives, Key Finder formats, ECC Validator, OAEP paddings... the changelog is 100 lines. 😅 Now hosted on GitHub w/ a readme!
8
151
🔒CryptoTester v1.5.0.0 for #Ransomware Analysis🔍 Soo many changes: GCM, custom padding, ECDH key exchanges, AutoIT RNG, RC4-DropN, Sosemanuk, new hashes, custom Salsa/ChaCha matrix, CNG RSA blobs, append/reverse input, new OAEP paddings... seriously check the changelog. 😅
Image
Image
Image
4
131
Dear #SunCrypt #Ransomware authors: please add some kinda checksum/verification to your crypto scheme. Currently, if you give a victim the wrong private Curve25519 key, it just fucks files, since any point is valid on the curve. Just append a simple hash or HMAC of the original.
Fry Reaction GIF
GIF
3
130
New CryptoTester v1.3.0.8 for #Ransomware #Analysis - input offset/len now accepts expressions, Key Finder detects ROT13/damaged keys in bins, bruteforce input with a list of keys, splice output, PHP mt_rand(), Blob Finder exports to clipboard and can generate keys... lots more!
Image
Image
Image
Image
4
106
🔒CryptoTester v1.7.0.0 for #Ransomware Analysis 🔍 Key Finder rewrite, new hashes, derive funcs, algorithms, padding modes, swap Hash and Derive process order, AES-CTR-LE, Encoding Param for RSA... another colossal update to read the changelog on. 😅
1
121
Got a bit of a funny case with helping a #ransomware victim decrypt their files, where the only encrypted/original file pairs they have are straight up porn videos. I mean, hey, whatever works. 🤷‍♀️😅 Porn to the rescue! 🤣
17
108
Small anti-anti-debug tip for complete RE noobs like me. If you see this little function called "IsDebuggerPresent", change EAX on its return to zero to keep going. 😅
Image
Image
5
94
🚨 ATTENTION STUDENTS. 🎓 👏 BACKUP 👏 YOUR 👏 DAMN 👏 SCHOOLWORK 👏 Oh you have this super-important-for-your-degree thesis you've slaved over for months? Why the hell can't you take 2 SECONDS to email it to someone? Back it up to a flash drive? PRINT IT for all I care.
7
102
New release of CryptoTester v1.2.0.1 for #ransomware analysis. Blob analyzer can accept base64 encoded blobs, and also added new tool Key Finder! Simply searches an exe for potential crypto keys (e.g. Crypto Blob, XML, PEM)
Image
Image
4
87
Can someone who has analyzed #Maze #Ransomware DM me? Is it really using "standard" ChaCha20? Got a victim with their private RSA key; can decrypt key/nonce, but not working on the files manually (criminal's tool works). Screenshot'd file, I'd expecting ASCII plaintext.
Image
6
83
Me: Why the fuck has my system been so slow all day, gah! *Finds window minimized on the 3rd monitor with a ransomware test bruteforcer in debug mode running* Me: Oh ya...
2
82
Fucking dumb #ransomware skid offences: 1. Educational MY ASS 2. Read whole file at once 3. Base64 -> String to Bytes -> AES -> Base64 again? 4. New key per file w/o saving ANY of them 5. Keep appending keys to global key variable 6. Multithread for race conditions on keygen
Image
Image
Image
3
71
🔒CryptoTester v1.4.0.0 for #Ransomware Analysis 🔍 New: Custom Spaces (' ') and Ascii Zeros ('0') padding modes (used by Python malware), CertUtilEncode algorithm, ASN.1 key usage, Add/Sub encryption detection, byte search in hex views, entropy display for RNG
Image
Image
Image
2
72
Seriously people, you can't just say "I need help" and give me NO DAMN CONTEXT. I am getting dozens of these a week. Start off the conversation with SOMETHING. Not just "I need help"... you don't go to the doctor and only say "I hurt"...
Image
Image
12
59
I really need to question 's security model when I get this for verifying access to an account. Are you seriously saving customer's passwords unhashed for support to see? Even part of the password?
Image
7
58
Thread: Let's take a look at the bullshit "Fast Data Recovery" is advertising about the #STOP #Djvu #Ransomware. As perhaps the #1 world-expert who has analyzed and followed this particular ransomware for over a year, I feel obligated to respond to this absolute horse manure. 💩
4
59