Follow:

You have been re-routed to the Ransom:Win32/Lyposit.B write up because Trojan%3aWin32%2fLyposit.B has been renamed to Ransom:Win32/Lyposit.B
 

Ransom:Win32/Lyposit.B


This ransomware prevents you from accessing your computer. It covers your entire desktop with an image pretending to be from your local authorities, asking you to pay a fine to regain access. The image covering the desktop is downloaded from a certain website.



What to do now

Microsoft doesn’t recommend you pay the fine. There is no guarantee that paying the ransom will give you access to your files.

If you've already paid, see our ransomware page for help on what to do now.

Run antivirus or antimalware software

The following free Microsoft software detects and removes this threat:

Even if we've already detected and removed this particular threat, running a full scan might find other malware that is hiding on your PC.

Advanced troubleshooting

To restore your PC, you might need to download and run Windows Defender Offline. See our advanced troubleshooting page for more help.

You can also ask for help from other PC users at the Microsoft virus and malware community.

If you’re using Windows XP, see our Windows XP end of support page.

Threat behavior

This ransomware prevents you from accessing your computer. It covers your entire desktop with an image pretending to be from your local authorities, asking you to pay a fine to regain access. The image covering the desktop is downloaded from a certain website.

Installation

When run, it drops a copy of itself as a randomly named file in the following folders:

  • %ALLUSERSPROFILE%\Application Data
  • %LOCALAPPDATA%

For example:

C:\Documents and Settings\Administrator\Local Settings\Application Data\rttevjmgloi.exe

It creates the following registry key so that its copy automatically runs when Windows starts:

In subkey: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
Sets value: "Shell"
With data: "explorer.exe, %ALLUSERSPROFILE%\Application Data\<malware file name>"

It creates the following registry key as part of its installation process:

In subkey: HKCU\Software\Microsoft
Sets value: "AutoRun"
With data: "%ALLUSERSPROFILE%\Application Data\<malware file name>"

It then forces your computer to restart so that it automatically runs.

Payload

Blocks computer access

It prevents you from accessing your computer, as it displays an image that covers your entire desktop. The image contains instructions and information about paying a fine for you to regain access to the computer. The image may look similar to the following:

If your IP address is located in France:

If your IP address is located in Germany:

If your IP address is located in Spain:

If your IP address is located in Switzerland:

It downloads this image from a certain website. Lyposit has been known to download images from the following:

  • hali<blocked>were.org
  • iwhf8<blocked>fueuofbejkh.org
  • n8efhi<blocked>ifhuenfe.com
  • neufb<blocked>jefnike.com
  • urla<blocked>purla.org

If the website where it downloads the image from is unavailable, it displays the following instead:

Disables Task Manager

It prevents you from accessing Task Manager by modifying the following registry entry:

In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
Sets value: "DisableTaskMgr"
With data: "1"

Closes all windows

It monitors your computer for all open windows on the desktop. It then closes all windows except for its own process.

Analysis by Zarestel Ferrer


Symptoms

System changes

The following system changes may indicate the presence of this malware:

  • Your computer restarts, after which, your desktop displays an image similar to the following:

    If your IP address is located in France:

    If your IP address is located in Germany:

    If your IP address is located in Spain:

    If your IP address is located in Switzerland:

    If the website where it downloads the image from is unavailable, it displays the following instead:


Prevention


Alert level: Severe
First detected by definition: 1.141.559.0
Latest detected by definition: 1.175.577.0 and higher
First detected on: Nov 27, 2012
This entry was first published on: Nov 27, 2012
This entry was updated on: Jun 05, 2014

This threat is also detected as:
No known aliases