This Volatility plugin is used to search for AES key withing a memory snapshot of an infected host on which NotPetya is running.
Put the notpetya.py
file in the volatility/plugins/malware/
directory.
Plugin should appear under notpetyakeys
when running vol.py --info
.
This plugin depends on yara
.
vol.py -f mem --profile=<profile> notpetyakeys
Output is every AES key used by NotPetya (on per fixed drive). It is not possible for now to identify which key is associated to which device.
openssl aes-128-cbc -d -K <key> -nosalt -iv 0 -in <encrypted_file> -out <clear_file>
(c) Wavestone 2017
Thanks to @gentilkiwi and @th3m4ks