Skip to content

A set of tools for extracting information from a Xelera ransomware executable.

License

Notifications You must be signed in to change notification settings

0xBenCantCode/Xelera-Parser

Repository files navigation

Xelera-Parser

A set of tools for extracting information from a Xelera ransomware executable.

Note: Xelera ransomware is unlikely to become widespread. It appears to be a one-off solution, and its code quality is notably poor.
Read more: Seqrite Blog - Xelera Ransomware

📂 Repository Contents

  • decrypt_notoken887.py – Decrypts encrypted notoken887 output from final.pyc.
  • get_crypto_address.py – Extracts the Litecoin address from imports.pyc.
  • get_bot_token.py – Retrieves the Discord bot token from imports.pyc.
  • main.py – Retrieves bot token and Litecoin address from Xelera executable.

Usage

  • Run desired script and follow instructions in terminal.

Credits


For research and educational purposes only. Use responsibly.

About

A set of tools for extracting information from a Xelera ransomware executable.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages