The Annabelle Ransomware Is a Horrific Mess

Haythem Elmir
0 1
Read Time2 Minute, 26 Second

While most ransomware is created to actually generate revenue, some developers create them to show off their « skills ».  Such is the case with a new ransomware based off of the horror movie franchise Annabelle.

Discovered by security researcher Bart, Annabelle Ransomware includes everything but the kitchen sink when it comes to screwing up a computer. This includes terminating numerous security programs, disabling Windows Defender, turning off the firewall, encrypting your files, trying to spread through USB drives, making it so you can’t run a variety of programs, and then to sweeten the pot, it overwrites the master boot record of the infected computer with a silly boot loader.

Annabelle Ransomware
Annabelle Ransomware

Thankfully,  MalwareHunterTeam was able to extract the source code from the obfuscated executable so that we can get a better glimpse as to what this program is doing.

When first run, Annabelle will configure itself to start automatically when you login to Windows. It then terminates a variety of programs such as Process Hacker, Process Explorer, Msconfig, Task Manager, Chrome, and more.

It then configures Image File Execution registry entries to make it so you cannot launch a variety of programs such as the ones listed above and others such as Notepad++, Notepad, Internet Explorer, Chrome, Opera, bcdedit, and many more.

The ransomware will then try to spread itself using autoru.inf files. This method is fairly useless when it comes to newer versions of Windows that do not support an autoplay feature.

Autorun.inf Spreading

Well all this is done, it will start encrypting the computer with a static key. When encrypting files it will append the .ANNABELLE extension to the encrypted file’s name.

Encrypted files

It will then reboot the computer and when the user logs in, it will display the lock screen shown at the top of this article. The lock screen has a credits button that when clicked shows the below screen that states a developer named iCoreX0812 made the program and a way to contact them on Discord.

Credits Screen
Credits Screen

As a finishing touch, the developer decided to also run a program that replaces the master boot record of the infected computer so that it shows a « props » screen when the computer restarts.

MBR Lock Screen
MBR Lock Screen

Overall, this ransomware was developer to be a PITA and to show off the developer’s skills rather than to actually generate ransom payments.

The good news is that this ransomware is based off of Stupid Ransomware and is easily decryptable. As it uses a static key, Michael Gillespie was able to update his StupidDecryptor in order to decrypt this variant.

By replacing the MBR, running Rkill in safe mode to clean up the IFEO registry entries, using Michael’s decryptor to decrypt the files, and then a few security scans to remove any left overs you shouldbe able to get your computer back to normal.

To read the original article:

https://www.bleepingcomputer.com/news/security/the-annabelle-ransomware-is-a-horrific-mess/

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
100 %

Average Rating

5 Star
0%
4 Star
0%
3 Star
0%
2 Star
0%
1 Star
0%

Laisser un commentaire

Next Post

Microsoft Fixes Windows 10 Vulnerability But Doesn't

A Google security engineer says Microsoft has failed to properly patch a security flaw affecting Windows 10 and Windows Server 2016 distributions. The flaw affects the Windows Storage Services, a core OS service that manages file transfers and storage operations. More precisely, the vulnerability affects the « SvcMoveFileInheritSecurity » function that Windows […]