Posted 18 March 2014 - 12:40 PM
Posted 18 March 2014 - 12:43 PM
New variant? Seems like a hybrid cryptolocker....
It is called CryptoDefense and it seems/acts just like CryptorBit except it looks like its fully encrypting the files.
I had a client that it hit their backup server share and encrypted all of their shadowprotect image backups so I had to pay the ransom.
Here is a link to an encrypted txt file and an unencrypted text file in a zip:
http://stevewooton.com/crypto/CryptoDefense.zip
Here is the HOW_DECRYPT.txt it is saving in every folder with my personal link XXX'd out.
All files including videos, photos and documents on your computer are encrypted by CryptoDefense Software.
Encryption was produced using a unique public key RSA-2048 generated for this computer. To decrypt files you need to obtain the private key.
The single copy of the private key, which will allow you to decrypt the files, located on a secret server on the Internet;
the server will destroy the key after a month. After that, nobody and never will be able to restore files.
In order to decrypt the files, open your personal page on the site https://rj2bocejarqnpuhm.onion.to/XXX and follow the instructions.
If https://rj2bocejarqnpuhm.onion.to/XXX is not opening, please follow the steps below:
1. You must download and install this browser http://www.torproject.org/projects/torbrowser.html.en
2. After installation, run the browser and enter the address: rj2bocejarqnpuhm.onion/XXX
3. Follow the instructions on the web-site. We remind you that the sooner you do, the more chances are left to recover the files.
IMPORTANT INFORMATION:
Your Personal PAGE: https://rj2bocejarqnpuhm.onion.to/XXX
Your Personal PAGE(using TorBrowser): rj2bocejarqnpuhm.onion/XXX
Your Personal CODE(if you open site directly): XXX
Here are a couple screenshots:
Edited by coolmarve, 18 March 2014 - 12:51 PM.
Posted 18 March 2014 - 03:10 PM
Yes, CryptorBit creates a HowDecrypt.txt file and a HowDecrypt.gif in every folder that a file was encrypted.New variant? Seems like a hybrid cryptolocker....
It is called CryptoDefense and it seems/acts just like CryptorBit except it looks like its fully encrypting the files...HOW_DECRYPT.txt it is saving in every folder
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 18 March 2014 - 03:39 PM
Updates:
Malwarebytes found one infection after the problem was reported:
Trojan.Agent Registry Value "HKLM\Software\Microsoft\Windows\CurrentVersion\Run|Regedit32 Value: Run|Regedit32"
But I was editing the registry at the time and I was in that postion in the registry. I had not yet deleted anything but I was looking at two entries
fupygryqukyb C:\Documents and Settings\<user>\fupygryqukyp.exe
yryno C:\Documents and Settings\<user>\Application Data\Tena\yryno.exe
yryno.exe would not delete, gave "Access Denied" each time I tried. When I tried Attrib from a command window, it would fail to remove any settings.
Had to use Unlocker to delete the file even though it found no "triggers" on the file.
Puts HOW_DECRYPT.HTML, HOW_DECRYPT.TXT and a shortcut to HOW_DECRYPT.HTML in every folder it has access to.
Posted 18 March 2014 - 03:45 PM
Yes, CryptorBit creates a HowDecrypt.txt file and a HowDecrypt.gif in every folder that a file was encrypted.New variant? Seems like a hybrid cryptolocker....
It is called CryptoDefense and it seems/acts just like CryptorBit except it looks like its fully encrypting the files...HOW_DECRYPT.txt it is saving in every folder
A repository of all current knowledge regarding CryptorBit and HowDecrypt is provided by Grinler (aka Lawrence Abrams), in this tutorial: CryptorBit and HowDecrypt Information Guide and FAQ
There is also a lengthy ongoing discussion in this topic: HowDecrypt or CryptorBit Encrypting Ransomware - $500 USD Ransom Topic. Since this infection is so widespread, rather than have everyone start individual topics, it would be best (and more manageable for staff) if you reposted this information in that topic discussion.
Thanks
The BC Staff
Edit: I see you already reposted here.
Gotcha I posted it there. I am not totally sure if this is a variant of that or cryptolocker. Almost looks like a combination of the two or a new threat all together.
Posted 18 March 2014 - 03:56 PM
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 18 March 2014 - 05:52 PM
As more information and details come to light we eventually will know for sure. That topic already has a lot of exposure so the info will get out much faster and to a larger audience.
according to several sources this looks like a completely new ransomware not by the makers of cryptolocker or cryptorbit.
I will be pulling a ton of info off the source PC tomorrow and posting it up for anyone that is interested. For now I don't have much from the source PC because I had my client unplug it the second I found out where the source of the encrypting was.
Posted 18 March 2014 - 06:30 PM
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 18 March 2014 - 06:34 PM
Hello, guys! I'm new to this forum and I've also been hit by this ransomware. I couldn't believe it. I've done extensive research into this topic and there are a few things to consider. I even wrote a blog with my discoveries but there are many details that I omitted so that I won't warn the crooks to possibly update it.
1. Older variants of Cryptolocker or Bitcrypt create files named "Howdecrypt". This one in particular creates three files named "HOW_DECRYPT" with .txt, -html and .url entensions. (In most -if not all- folders).
2. This one doesn't change the background nor does it show its GUI (That one you see everywhere when you search 'Cryptolocker')
3. This makes exclusive use of https://rj2bocejarqnpuhm.onion.to/ to contact the server. As I couldn't find it on Google until now, I figured out it was new.
4. The crook was even 'gentle' enough to upload a video in Youtube showing you step-by-step how the malware works and to make a payment.
5. Compared to all the previous ransomware I read about (which also make use of onion.to), this one has the 'nicest' GUI around.
6. Contrary to previous variants, this one takes a screenshot of the victims and uploads it to that server.
I consider my files lost because I am NOT paying the ransom. If anyone has the executables, please let me know. I have done a lot of research on my own, which I would only share privately in an attempt to avoid warning the creators about their mistakes. I have a blog in which I documented what happened to me. Just imagine how p*ssed off I was... I hope we could do something!
If someone has some Malware samples, please let me know. I need to make my further research. Unfortunately, I removed it by mistake with another Antivirus (Avast! Free never detected it btw).
Edited by Sonnyk88, 18 March 2014 - 06:43 PM.
Posted 19 March 2014 - 05:07 AM
Hello again, this is my personal blog in which I explain every single detail I found about this malware. http://howdecrypt.blogspot.com
Also, thanks coormarve! The samples your provided were quite useful!
Please help me fight these crooks!
Posted 19 March 2014 - 06:30 AM
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 19 March 2014 - 11:32 AM
Posted 19 March 2014 - 04:55 PM
Been doing a lot of research today on this with DecrypterFixer. Will post a summary topic and FAQ on it soon.
If anyone has any virus samples please submit them here:
http://www.bleepingcomputer.com/submit-malware.php?channel=166
check your pm
also I edit'ed my initial post with an infection sample
Posted 19 March 2014 - 07:42 PM
Posted 19 March 2014 - 09:31 PM
Hmmmm I don't have a copy of the decrypter.exe, but a thought if lucky, Is the decrypter system swap-able?? ( transfer from one infected system to another system that is infected, run and decrypt those personal files also,)
may have to tell the decrpter where the files are located..
I did say if lucky.
Quads
0 members, 1 guests, 0 anonymous users