Installation
This threat has been observed to arrive as an obfuscated .NET executable file. It is based on the open-source ransomware called "hiddentear" and we have seen it use the following file names:
-
critical_updates.exe
-
dissdkchk.exe
-
servicec.exe
This threat may appear as a critical Windows update to lure potential victims to apply the fake update, thus trigerring the document encryption process that runs in the background.
Malicious hackers add fictitious details such as file properties, file names, and a Microsoft copyright to make the "critical update" file name appear legitimate. Unsuspecting victims can then be lead to download the update.
Payload
This threat searches for files in your folders and can target files with the following extensions to encrypt:
| .001 |
.clr |
.gif |
.mpg |
.rng |
.ut3 |
| .1cd |
.cms |
.grf |
.mpqge |
.rofl |
.utc |
| .3d |
.cod |
.gthr |
.mrw |
.rrt |
.utx |
| .3d4 |
.col |
.gz |
.mrwref |
.rsrc |
.uvx |
| .3df8 |
.cp |
.gzig |
.msg |
.rsw |
.uxx |
| .3fr |
.cpp |
.gzip |
.msp |
.rte |
.val |
| .3g2 |
.cr2 |
.h3m |
.mxp |
.rtf |
.vc |
| .3gp |
.crd |
.h4r |
.nav |
.rts |
.vcd |
| .3gp2 |
.crt |
.hkdb |
.ncd |
.rtx |
.vdf |
| .3mm |
.crw |
.hkx |
.ncf |
.rum |
.vdo |
| .7z |
.cs |
.hplg |
.nds |
.run |
.ver |
| .aac |
.csi |
.htm |
.nef |
.rv |
.vfs0 |
| .abk |
.cso |
.html |
.nfo |
.rw2 |
.vhd |
| .abw |
.css |
.hvpl |
.now |
.rwl |
.vmf |
| .ac3 |
.csv |
.ibank |
.nrg |
.sad |
.vmt |
| .accdb |
.ctt |
.icxs |
.nri |
.saf |
.vob |
| .ace |
.cty |
.idx |
.nrw |
.sav |
.vpk |
| .act |
.cwf |
.ifo |
.ntl |
.sb |
.vpp_pc |
| .ade |
.d3dbsp |
.img |
.odb |
.sc2save |
.vsi |
| .adi |
.dal |
.indd |
.odc |
.scm |
.vtf |
| .adpb |
.dap |
.ink |
.odf |
.scn |
.w3g |
| .adr |
.das |
.ipa |
.odi |
.scx |
.w3x |
| .adt |
.DayZProfile |
.isu |
.odm |
.sdb |
.wad |
| .ai |
.dazip |
.isz |
.odp |
.sdc |
.war |
| .aim |
.db0 |
.itdb |
.ods |
.sdn |
.wav |
| .aip |
.dbb |
.itl |
.odt |
.sds |
.wave |
| .ais |
.dbf |
.itm |
.oft |
.sdt |
.waw |
| .amf |
.dbfv |
.iwd |
.oga |
.sen |
.wb2 |
| .amr |
.dbx |
.iwi |
.ogg |
.sfs |
.wbk |
| .amu |
.dcp |
.jar |
.opf |
.sfx |
.wdgt |
| .amx |
.dcr |
.jav |
.orf |
.sh |
.wks |
| .amxx |
.dcu |
.java |
.owl |
.shar |
.wm |
| .ans |
.ddc |
.jc |
.oxt |
.shr |
.wma |
| .ap |
.ddcx |
.jfif |
.p12 |
.shw |
.wmd |
| .ape |
.dem |
.jgz |
.p7b |
.sid |
.wmdb |
| .api |
.der |
.jif |
.p7c |
.sidd |
.wmmp |
| .apk |
.desc |
.jiff |
.pab |
.sidn |
.wmo |
| .arc |
.dev |
.jpc |
.pak |
.sie |
.wmv |
| .arch00 |
.dex |
.jpe |
.pbf |
.sis |
.wmx |
| .ari |
.dic |
.jpeg |
.pbp |
.slm |
.wotreplay |
| .arj |
.dif |
.jpf |
.pbs |
.sln |
.wow |
| .aro |
.dii |
.jpg |
.pcv |
.slt |
.wpd |
| .arr |
.dir |
.jpw |
.pdd |
.snp |
.wpk |
| .arw |
.disk |
.js |
.pdf |
.snx |
.wpl |
| .asa |
.divx |
.json |
.pef |
.so |
.wps |
| .asc |
.diz |
.kdb |
.pem |
.spr |
.wsh |
| .ascx |
.djvu |
.kdc |
.pfx |
.sql |
.wtd |
| .ase |
.dmg |
.kf |
.php |
.sqx |
.wtf |
| .asf |
.dmp |
.kmz |
.pkb |
.sr2 |
.wvx |
| .ashx |
.dng |
.kwd |
.pkh |
.srf |
.x3f |
| .asmx |
.dob |
.kwm |
.pkpass |
.srt |
.xf |
| .asp |
.doc |
.layout |
.pl |
.srw |
.xl |
| .aspx |
.docm |
.lbf |
.plc |
.ssa |
.xla |
| .asr |
.docx |
.lbi |
.pli |
.std |
.xlam |
| .asset |
.dot |
.lcd |
.pm |
.stt |
.xlc |
| .avi |
.dotm |
.lcf |
.png |
.stx |
.xlk |
| .avs |
.dotx |
.ldb |
.pot |
.sud |
.xll |
| .bak |
.dox |
.lgp |
.potm |
.sum |
.xlm |
| .bar |
.dpk |
.litemod |
.potx |
.svg |
.xlr |
| .bay |
.dpl |
.log |
.ppd |
.svi |
.xls |
| .bc6 |
.dpr |
.lp2 |
.ppf |
.svr |
.xlsb |
| .bc7 |
.dsk |
.lrf |
.pps |
.swd |
.xlsm |
| .bck |
.dsp |
.ltm |
.ppsm |
.swf |
.xlsx |
| .bdp |
.dvd |
.ltr |
.ppsx |
.syncdb |
.xltx |
| .bdr |
.dvi |
.ltx |
.ppt |
.t12 |
.xlv |
| .bib |
.dvx |
.lvl |
.pptm |
.t13 |
.xlwx |
| .bic |
.dwg |
.m2 |
.pptx |
.tar |
.xml |
| .big |
.dxe |
.m2v |
.prc |
.tax |
.xpi |
| .bik |
.dxf |
.m3u |
.prt |
.tax2015 |
.xpt |
| .bkf |
.dxg |
.m4a |
.psa |
.tax2016 |
.xvid |
| .bkp |
.elf |
.mag |
.psd |
.tbz2 |
.xwd |
| .blob |
.epk |
.man |
.psk |
.tch |
.xxx |
| .blp |
.eps |
.map |
.pst |
.tcx |
.yab |
| .bmc |
.eql |
.max |
.ptx |
.text |
.yps |
| .bmf |
.erf |
.mbox |
.puz |
.tg |
.z02 |
| .bml |
.err |
.mbx |
.pwf |
.thmx |
.z04 |
| .bmp |
.esm |
.mcd |
.pwi |
.tif |
.zap |
| .boc |
.euc |
.mcgame |
.pwm |
.tlz |
.zip |
| .bp2 |
.evo |
.mcmeta |
.pxp |
.tor |
.zipx |
| .bp3 |
.ex |
.md |
.py |
.tpu |
.zoo |
| .bpl |
.exif |
.md3 |
.qbb |
.tpx |
|
| .bsa |
.f90 |
.mdb |
.qdf |
.trp |
|
| .bsp |
.faq |
.mdbackup |
.qel |
.tu |
|
| .cag |
.fcd |
.mddata |
.qic |
.tur |
|
| .cam |
.fdr |
.mdf |
.qif |
.txd |
|
| .cap |
.fds |
.mdl |
.qpx |
.txf |
|
| .car |
.ff |
.mdn |
.qtq |
.txt |
|
| .cas |
.fla |
.mds |
.qtr |
.uax |
|
| .cbr |
.flac |
.mef |
.r3d |
.udf |
|
| .cbz |
.flp |
.menu |
.ra |
.umx |
|
| .cc |
.flv |
.mic |
.raf |
.unity3d |
|
| .ccd |
.for |
.mip |
.rar |
.unr |
|
| .cch |
.forge |
.mkv |
.raw |
.unx |
|
| .cd |
.fos |
.mlx |
.rb |
.uop |
|
| .cdr |
.fpk |
.mod |
.re4 |
.upk |
|
| .cer |
.fpp |
.mov |
.res |
.upoi |
|
| .cfg |
.fsh |
.moz |
.rev |
.url |
|
| .cfr |
.gam |
.mp3 |
.rgn |
.usa |
|
| .cgf |
.gdb |
.mp4 |
.rgss3a |
.usx |
|
| .chk |
.gho |
.mpeg |
.rim |
.ut2 |
|
It renames encyprted files with .locked extension, for example sample.zip.locked. It drops a ransom note (DECRYPT_YOUR_FILES.HTML) in each folder after encrypting files. See the following screenshot:
Modifies your PC settings without your permission
This ransomware also disables your Microsoft Windows Task Manager and locks you the out while your files are being encrypted, and displays the following message:
It also deletes shadow files to prevent you from restoring your files from a local backup. We have seen it run the following commands:
This threat might connect to the following urls:
- hXXp://content.screencast.com/users/Gurudrag/folders/Default/media/9289aabe-7b4a-4c7f-b3bb-bdf3407e7a2f/fantom1.jpg
- hXXp://powertoolsforyou.com/themes/prestashop/cache/stats.php
- hXXp://templatesupdates.dlinkddns.com/falssk/fksgieksi.php
This malware description was published from analyzing the following SHA1 files:
- 0b6dd724203dc66bfed1cb9ab372e249fb3740c2
- e10874c6108a26ceedfc84f50881824462b5b6b6
- 8c6fd4e90a529016c7795654ec36714fb06dfd32