A new ransomware distributed by attackers posing as a Windows Activator appearing to be distributed through external network drives. The ransomware found to be active from August 7th and spreading since then.
Researchers from 360totalsecurity spotted the ransomware contains hidden configuration function and the information used for encryption. Once the ransomware execution started it executes a number of parameters to implement different functions.
Also, the Ransomware contains a hidden form that will be displayed by pressing F8, the configuration page lets users configure the following information.
The key of the encrypted file
The file name of extortion message
User’s personal id
The suffix of the added file
Also, it contains “Exclude paths” which specifies the directories to be skipped, the excluded paths option contains the default windows files and programs path.
The encryption keys to be obtained form cosonar.mcdir.ru/get.php, in case if the fetch fails it uses default encryption key and the default user id to the process.
To implement the ransomware uses the open source library of CryptoPP and the AES algorithm used to encrypt the files.
Once the encryption completed it appends [.]keypass extension to all the files and asks victim’s to pay $300 within 72 hours to decrypt the files.
The ransomware is a global problem it emerges as a lucrative revenue model for cybercriminals. Some ransomware’s also have worm-like capabilities which enable to spread across the network.
To read the original article