Skip to content

hasherezade/petya_key

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

47 Commits
 
 
 
 
 
 

Repository files navigation

petya_key

A decoder for Petya victim keys, using the Janus' masterkey
It supports:

  • Red Petya
  • Green Petya (both versions) + Mischa
  • Goldeneye (bootlocker + files)

Read more about identifying Petya versions here

⏬ Download tools


DISCLAIMER: Those tools are provided as is and you are using them at your own risk. I am not responsible for any damage or lost data.


Usage:

./petya_key [victim_data]

where the [victim_data] is a file containing the 'personal decryption code' displayed by the bootlocker

  1. Save your "Personal decryption code" as a continuous string, without separators. Example of the valid file content:
e2NKAXKGX7YFYUHPUuwrcfZ6FUkkYtRUdvzqRUwacPgjMvyYr8mH5Pw4X8Wdt6XgLrK7G7m1TVVeBdVzRDayyHFWp76353A1
  1. Supply the saved file to the decoder:
./petya_key saved_id.txt

Choose your version of Petya from the menu. If the given data is valid, you will get your key, i.e:

[+] Your key   : TxgTCXnpUPSeR2U7
  1. Before unlocking attempt I strongly recommend you to make a dump of the full disk. Some versions of Petya are buggy. For example they may hang during decryption and corrupt your data.

In order to decrypt MFT, supply the generated key to the bootlocker.
In order to decrypt files you need supply the key to an appropriate decryption tool.