CryptoLocker - New Ransomware

dbdawn

New Member
Reaction score
9
I haven't seen this personally yet, but there is a new ransomware that has appeared in the past couple of days and it encrypts user's documents. This is different than the other ones and seems to be slipping by the antivirus/malware vendors. Removal of the malware is easy but recovering the files is only granted after payment of the fee or restoring backups.

Further reading:
http://www.bleepingcomputer.com/forums/t/506924/cryptolocker-hijack-program/
http://forums.malwarebytes.org/index.php?showtopic=132765
http://www.reddit.com/r/techsupport/comments/1luimt/cryptolocker_unknown_randsomware/


QjqBDRr.jpg
 
I have been hearing about this the past couple of weeks on Mike Tech Show the podcast. I myself have YET to run into it.

Is this alot more serious than the FBI virus?
 
I "saw" it yesterday. I covered a call out for a friend because he wasn't able to get there for a few days. The customer said that Crypto Locker was on his screen and that they weren't able to open files on their network shares. When I arrived, the customer had a few print-outs about how to remove it, but said that he hadn't done anything himself.

When I looked at the machine, there was no trace of it anywhere. Nothing detected by the antivirus, nothing in the registry, no malware running....nothing. The only symptom was the encrypted files. I tried a few decrypters, just to be sure, but nothing worked. We restored what we could from backup.
 
Does this seem to open up itself from Network shares?

I was reading the links on the OP's post and I see that alot of the users were using Trend Micro software. I just wanna get the heads up so I know what to do. Business clients this won't be an issue so much because of them implementing backups, but residentials is another thing. I can advise them to implement one and tell them the benefits but in the end I can't twist their arm.

Anyway.. in for more info on this. Very interesting topic.
 
I've yet to see a definitive answer as to how the machines are being compromised. So far, all I've seen are reports of servers being hit because of use of the default rdp port and brute force password attempts. If this is the case, then this is why I've yet to run into it.

Op, any idea how your customer got hit?
 
Removal seems to be easy

Step 1: Boot up the infected computer, press F8 at the very beginning, choose “Safe Mode with Networking” and press Enter to get in safe mode with networking.
Step 2: Press Ctrl+Alt+Del keys together and stop CryptoLocker processes in the Windows Task Manager.
Step 3: Open Control Panel from Start menu and search for Folder Options. When Folder Options window opens, click on its View tab, tick Show hidden files and folders and non-tick Hide protected operating system files (Recommended) and then press OK.
Step 4: Search for all infected files and registry entries and remove them from your computer as follows:

%Temp%\[RANDOM CHARACTERS].exe
C:\Documents and Settings\<Current User>
C:\Users\<Current User>\AppData\
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableTaskMgr” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\random

Other sources

%AppData%\random.exe
%LocalAppData%\random.dat
%LocalAppData%\random.exe

on the other hand fixing the damage seems near impossible

Connection with the C&C server is established through either a hardcoded IP (184.164.136.134, which is down now) or if that fails through a domain generation algorithm located at 0x40FDD0 and seeded by GetSystemTime. At this time I found that xeogrhxquuubt.com and qaaepodedahnslq.org are both active and point to 173.246.105.23.
• The communication channel uses POST to the /home/ directory of the C&C server. The data is encrypted using RSA. The public key can be found at offset 0x00010da0 inside the malware file.
• On first contact the malware will send in an information string containing the malware version, the system language, as well as an id and a group id. In return it receives a RSA public key. In my case this has been:
• -----BEGIN PUBLIC KEY-----
• MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAkQBZgSk3NNo54cxwl3nS
• zZHMhFI4oU0ygX81IFsktcaCAIUrMSnUVQEcFvhcidh/5JuE+piQY5Z3iuDcKqiF
• 0yWZ7rck+xC1i/xaY5nNxJnh/clEqO8qRNg9DTe6qDlVO8PAHgr882dUHTzZgdAN
OWR8+5rWxck9LxtB8+DSE8cWy
• The key is saved inside the HKCU\Software\CryptoLocker. If you want to capture the key on your system, the easiest way to do so is to break on CryptStringtoBinaryA.
• The malware targets files using the following search masks:
*.odt, *.ods, *.odp, *.odm, *.odc, *.odb, *.doc, *.docx, *.docm, *.wps, *.xls, *.xlsx, *.xlsm, *.xlsb, *.xlk, *.ppt, *.pptx, *.pptm, *.mdb, *.accdb, *.pst, *.dwg, *.dxf, *.dxg, *.wpd, *.rtf, *.wb2, *.mdf, *.dbf, *.psd, *.pdd, *.eps, *.ai, *.indd, *.cdr, ????????.jpg, ????????.jpe, img_*.jpg, *.dng, *.3fr, *.arw, *.srf, *.sr2, *.bay, *.crw, *.cr2, *.dcr, *.kdc, *.erf, *.mef, *.mrw, *.nef, *.nrw, *.orf, *.raf, *.raw, *.rwl, *.rw2, *.r3d, *.ptx, *.pef, *.srw, *.x3f, *.der, *.cer, *.crt, *.pem, *.pfx, *.p12, *.p7b, *.p7cThe

encryption used to encrypt files matching these masks is a mix of RSA and AES. Essentially the malware will generate a new AES 256 key for each file it is going to encrypt. The key is then used to encrypt the content of the file. The AES key itself is then encrypted using the public RSA key obtained from the server. The RSA encrypted blob is then stored together with the encrypted file content inside the encrypted file. As a result encrypted files are slightly larger than their originals. Last but not least the malware records the file it encrypted inside the HKCU\Software\CryptoLocker\Files key. Value names are the file paths where "\" has been replaced with "?". I haven't looked into the meaning of the DWORD value yet.

All systems I have looked at were infected through social engineering. Victims got emails with alleged customer complaints containing attachments that were infected with a malware downloader. The downloader then downloaded and installed the actual CryptoLocker malware. Based on the targeted file types list, it is also clear that the malware is specifically targeting business users. Crypto malware targeted towards home users, will target music, picture, and video files. This malware though primarily targets file formats used by companies, completely ignoring common home user file types.

To recover the AES keys used to encrypt the files, you will require the private half of the RSA key that was generated by the server. Without access to the server, decryption is impossible.
 
I've yet to see a definitive answer as to how the machines are being compromised. So far, all I've seen are reports of servers being hit because of use of the default rdp port and brute force password attempts. If this is the case, then this is why I've yet to run into it.

Op, any idea how your customer got hit?

I have only seen one, wasn't even my customer but I did take a look. I think it was a malicious email attachment, one of those .exe inside a .zip file deals.

Also more information.

http://www.kernelmode.info/forum/viewtopic.php?f=16&t=2945

http://blog.emsisoft.com/2013/09/10/cryptolocker-a-new-ransomware-variant/
 
I always wonder if paying the ransom will actually get your files decrypted.

I suppose if you're desperate enough you'll try it but I haven't heard about anybody who actually paid it.
 
Actually if you read the OP's link from Bleepingcomputer one user named Proapps actually did pay the ransom. It worked partially from what I was reading yet his computer kept blue screening.
 
Wow... so a ransomware that actually isn't a bluff?

We've got some data recovery experts here. If a file were encrypted. Would it technically create an encrypted version, then delete the original, or would the file be modified...

IE could basic undeleters save us in this? This one is very troubling in nature.


Oh also, I may have found a supposed solution.
http://www.bleepingcomputer.com/forums/t/494759/decrypt-protect-ransomware/?p=3054229
I'm right now searching to see if I can get my hands on a copy of the virus, and see if I can test... which even if I find it that may be a challenge, as from what I'm reading, these virus's themselves could be a few stages above and beyond normal testing... IE they may not run in a VM.
 
Last edited:
Wow... so a ransomware that actually isn't a bluff?

We've got some data recovery experts here. If a file were encrypted. Would it technically create an encrypted version, then delete the original, or would the file be modified...

IE could basic undeleters save us in this? This one is very troubling in nature.


Oh also, I may have found a supposed solution.
http://www.bleepingcomputer.com/forums/t/494759/decrypt-protect-ransomware/?p=3054229
I'm right now searching to see if I can get my hands on a copy of the virus, and see if I can test... which even if I find it that may be a challenge, as from what I'm reading, these virus's themselves could be a few stages above and beyond normal testing... IE they may not run in a VM.

Over on BC there was a user that re-infected the machine so they could get to the ransom page, the malware already recognized the files as having been encrypted and showed the ransom page.

Also the solution you listed will not work. This variant uses RSA and AES 256 to encrypt the files, so unless you can get access to the C&C server it will be impossible to decrypt these files.

More info. http://www.kernelmode.info/forum/viewtopic.php?f=16&t=2945
 
I always wonder if paying the ransom will actually get your files decrypted.

I suppose if you're desperate enough you'll try it but I haven't heard about anybody who actually paid it.

Yes, there have been reports that paying the ransom, will work.
 
Yes, there have been reports that paying the ransom, will work.

Indeed, most reports seem to indicate that they handle their extortion plan pretty professionally. I haven't heard any reports of them taking more than they claim to want (though they use moneypack cards so I suppose they couldn't), and in most cases the software removes more or less all traces of them (I think there's a few stories of cases where it failed to remove, but it looks like it tries).

(now that isn't to say that there won't be a variant, run by a less scrupulous group that considers the link to their own servers, a liability and removes the repair option)
 
It is big business and all about managing customer expectations. Get a few good reviews on tech forums that say "I paid & got my stuff back". however it could be a shill spreading disinformation amongst the panic & FUD. Who checks on a forum?
$300 seems a reasonable gamble to take. (The actual amount is limited by how much the bad guys can physically collect through their pyramid of mules)
Once the tipping point is reached and everyone "knows" you should just pay, Dr.Evil doesn't need to be an "honest" crook anymore.

Perhaps this will encourage people to spend $300 on a backup:rolleyes:

Course the scary thing of this is, a small percentage of what prior to this virus I would have considered, good enough for the home environment... could be completely compromised via this system. IE a dropbox or google drive, anything that syncronizes on the spot but does not have versioning... is doomed.

Also watching the thread on bleeping computer... it seems my hypothesis of undeleting or even advanced file recovery is doomed. it appears to take the time to re-write the section of HD that contained the files, multiple times. This group wasn't playing around when they designed this virus. They aren't doing the typical sucker people who don't have the skills to cover it, or people who aren't willing to take it to a real tech...

If someone brought one to me... and say the only copy of their thesis they had spent 5 years working on was encrypted... or even a small business that runs daily backups (lets face it... can you honestly tell a 20 man shop that what they've worked on for 1 day, is worth less than $300)
 
Maybe someone should hack their C&C server, grab the keys, and make the world a better place? Anonymous? :D
 
Maybe someone should hack their C&C server, grab the keys, and make the world a better place? Anonymous? :D

Would be nice, but greatest question at that point... assuming someone succesfully hacked the C&C server. and gained... a huge database of keys... tracing the keys to the owners (there's a seperate key for each file from what I gather) would in and of itself be a nightmare. From the understanding though, payments are processed manually, I suppose if someone could get remote access, and mark everyone as "paid" telling the program to send the keys home, that might be plausible.
 
Back
Top