Info Security Memo
  • Blog
  • Sitemap
    • Categories
  • Contact
  • About
  • Resources
  • Tools
  • 51sec.org

Build Confidence

Focusing on Information Security 

Info Security Notes

Ransomware Locked Files on My Test Machine

3/21/2016

0 Comments

 
One of my test machines which I am using to download and test software from Internet was hit by Ransomware recently.

Check out what it did to my machine.

In most computer folders including c driver and d driver, even on the desktop, there are three following files which obviously is from hackers who is asking for money to decrypt your files.:
  • +REcovER+gdqvd+.txt
  • +REcovER+gdqvd+.html
  • +REcovER+gdqvd+.png
 photo 2016-03-20_9-52-10_zpseoi5kqjz.png 
 photo 2016-03-20_9-51-38_zpsdcpn7srs.png 
 photo 2016-03-20_9-50-39_zpsayfjxdsc.png

Here is full content from txt file +REcovER+gdqvd+.txt
"
NOT YOUR LANGUAGE? USE https://translate.google.com 
What's the matter with your files? 
Your data was secured using a strong encryption with RSA4096.
Use the link down below to find additional information on the encryption keys using RSA4096:https://en.wikipedia.org/wiki/RSA_(cryptosystem)  
What exactly that means? 
It means that on a structural level your files have been transformed. You won't be able to use, read, see or work with them anymore.
In other words they are useless, however, there is a possibility to restore them with our help. 
What exactly happened to your files? 
*** Two personal RSA4096 keys were generated for your PC/Laptop; one key is public, another key is private.
*** All your data and files were encrypted by the means of the public key, which you received over the web.
*** In order to decrypt your data and gain access to your computer you need a private key and a decryption software, which can be found on one of our secret servers. 
What should you do next? 
There are several options for you to consider:
1. You can wait for a while until the price of a private key will raise, so you will have to pay twice as much to access your files or
2. You can start getting BitCoins right now and get access to your data quite fast.
In case you have valuable files, we advise you to act fast as there is no other option rather than paying in order to get back your data. 
In order to obtain specific instructions, please access your personal homepage by choosing one of the few addresses down below:
http://irudhkunrlfu25fhkaqw34blr5qlby4tgq43t.orrisbirth.com/DE355220943297
http://74nfnjhlq45nkgws4hbdbk45wekfjhqw4talefgnv.curryfort.at/DE355220943297
http://g4dhhg53jsdjnnkjwjrfyiouh3o4u4th.vinerteen.com/DE355220943297 
If you can't access your personal homepage or the addresses are not working, complete the following steps:
1 Download TOR Browser - http://www.torproject.org/projects/torbrowser.html.en
2 Install TOR Browser
3 Open TOR Browser
4 Insert the following link in the address bar: k7tlx3ghr3m4n2tu.onion/DE355220943297
5 Follow the instructions on your screen 
IMPORTANT INFORMATION 
Your personal homepages:
http://irudhkunrlfu25fhkaqw34blr5qlby4tgq43t.orrisbirth.com/DE355220943297
http://74nfnjhlq45nkgws4hbdbk45wekfjhqw4talefgnv.curryfort.at/DE355220943297
http://g4dhhg53jsdjnnkjwjrfyiouh3o4u4th.vinerteen.com/DE355220943297  
Your personal page Tor-Browser k7tlx3ghr3m4n2tu.onion/DE355220943297
Your personal identification ID: DE355220943297
 "


Good thing is this computer is only used as a test machine. Nothing lost in this case. I am going to figure out more how to clean it up and post here. 

Based on suggestion from google search result listing in my reference link, I downloaded Malwarebytes Anti-Malware to have it a  try. After a simple click to install software, a threat scan completed in less than 10 minutes and found 11 potential threats which includes Trojan.Crypt malware under my documents folder.
 
 photo 2016-03-20_16-20-24_zps3uynmjh0.png 
 photo 2016-03-20_16-19-22_zpshqb6wpmt.png 
 photo 2016-03-20_16-29-32_zps0gx7opbl.png
 photo 2016-03-20_16-29-17_zpsozpeqxmo.png


 photo 2016-03-20_16-46-03_zps8eywxffy.png

After a reboot, a follow up scanning will make sure your compute is clean:

 photo 2016-03-21_10-24-10_zpsedyozbe9.png

Reference:
Remove “Your personal files are encrypted” virus (Guide)



0 Comments



Leave a Reply.

    Categories

    All
    Architecture
    Blog
    Checkpoint
    Cisco
    Cloud
    CyberArk
    F5
    Fortigate
    Guardium
    Juniper
    Linux
    Network
    Others
    Palo Alto
    Qualys
    Raspberry Pi
    Security
    SIEM
    Software
    Vmware
    VPN
    Wireless

    Archives

    March 2024
    February 2024
    January 2024
    December 2023
    November 2023
    October 2023
    September 2023
    August 2023
    July 2023
    June 2023
    May 2023
    April 2023
    March 2023
    February 2023
    January 2023
    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    October 2019
    September 2019
    June 2019
    July 2018
    May 2018
    December 2017
    August 2017
    April 2017
    March 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015

    Print Page:

    RSS Feed

    Email Subscribe
Powered by Create your own unique website with customizable templates.
  • Blog
  • Sitemap
    • Categories
  • Contact
  • About
  • Resources
  • Tools
  • 51sec.org