Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Need help recovering from and identifying ransomware


  • This topic is locked This topic is locked
4 replies to this topic

#1 jadesama

jadesama

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:05:52 PM

Posted 24 February 2015 - 07:21 PM

Hello all,

 

I was recently hit with some ransomware and managed to stop it, but not before it encrypted many of my files. It did not leave any ransom URL so I have no idea which variant of ransomware I am dealing with. It also appears to be bundled with bot which hits various pages.

 

Below is a list of the malicious files:

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 353337
Time Elapsed: 14 min, 55 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Warn
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 0
(No malicious items detected)

Registry Values: 7
Trojan.Agent.ED, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|{2b25f4ae-bd75-f35b-e572-21ecfa7f3b89}, "C:\ProgramData\Microsoft\{2b25f4ae-bd75-f35b-e572-21ecfa7f3b89}\{2b25f4ae-bd75-f35b-e572-21ecfa7f3b89}.exe", Quarantined, [4cfbc161cbbf69cdc259eb3ca85a47b9]
Trojan.Agent.ED, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN|{2b25f4ae-bd75-f35b-e572-21ecfa7f3b89}, "C:\ProgramData\Microsoft\{2b25f4ae-bd75-f35b-e572-21ecfa7f3b89}\{2b25f4ae-bd75-f35b-e572-21ecfa7f3b89}.exe", Quarantined, [4cfbc161cbbf69cdc259eb3ca85a47b9]
Trojan.MSIL.ED, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|{8175969b-bbd0-51bb-4936-d566d21c5f6b}, "C:\ProgramData\Microsoft\{8175969b-bbd0-51bb-4936-d566d21c5f6b}\{8175969b-bbd0-51bb-4936-d566d21c5f6b}.exe", Quarantined, [6cdbee343a5063d3ca5b03196c96867a]
Trojan.MSIL.ED, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN|{8175969b-bbd0-51bb-4936-d566d21c5f6b}, "C:\ProgramData\Microsoft\{8175969b-bbd0-51bb-4936-d566d21c5f6b}\{8175969b-bbd0-51bb-4936-d566d21c5f6b}.exe", Quarantined, [6cdbee343a5063d3ca5b03196c96867a]
Trojan.Agent.ED, HKU\S-1-5-21-3376597385-2386937250-436963622-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|crypto13, C:\Users\Edwin\AppData\Roaming\tcopqnr.exe, Quarantined, [182fda48bfcb7db9038253d51de560a0]
Trojan.Agent, HKU\S-1-5-21-3376597385-2386937250-436963622-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER|zergling_rush, Quarantined, [e067f82a810957df94fdfda39b68c937], 
Trojan.Agent.Gen, HKU\S-1-5-21-3376597385-2386937250-436963622-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|MSConfig, "C:\Users\Edwin\AppData\Local\Temp\51f28\putwnskg.exe", Quarantined, [67e045ddd6b415211ef2d52a7d8748b8]

Registry Data: 1
Windows.Tool.Disabled, HKLM\SOFTWARE\POLICIES\MICROSOFT\WINDOWS NT\SYSTEMRESTORE|DisableConfig, 1, Good: (0), Bad: (1),Replaced,[d07709190585b482dde086460df8fb05]

Folders: 0
(No malicious items detected)

Files: 14
Trojan.Agent.ED, C:\ProgramData\Microsoft\{2b25f4ae-bd75-f35b-e572-21ecfa7f3b89}\{2b25f4ae-bd75-f35b-e572-21ecfa7f3b89}.exe, Delete-on-Reboot, [4cfbc161cbbf69cdc259eb3ca85a47b9], 
Trojan.MSIL.ED, C:\ProgramData\Microsoft\{8175969b-bbd0-51bb-4936-d566d21c5f6b}\{8175969b-bbd0-51bb-4936-d566d21c5f6b}.exe, Delete-on-Reboot, [6cdbee343a5063d3ca5b03196c96867a], 
Trojan.Agent.ED, C:\Users\Edwin\AppData\Roaming\tcopqnr.exe, Quarantined, [182fda48bfcb7db9038253d51de560a0], 
Trojan.Clicker, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\conhost.exe, Quarantined, [47003ae8dfab2016664909f00df4d52b], 
Trojan.Agent.ED, C:\Users\Edwin\AppData\Local\Temp\PWdU.dll, Quarantined, [bb8c35ed2b5f3501bacbeb3df40e2ad6], 
Trojan.Agent.DED, C:\Users\Edwin\AppData\Local\Temp\BC8F.tmp, Quarantined, [89bee2407911ff37daf103f056ab0af6], 
Trojan.Agent.DED, C:\Users\Edwin\AppData\Local\Temp\9416.tmp, Quarantined, [192e65bd028834020ebd9063926ffa06], 
Trojan.Agent.DED, C:\Users\Edwin\AppData\Local\Temp\A8AD.tmp, Quarantined, [fa4d6bb7a3e77db9c5067d76d72a28d8], 
Trojan.Clicker, C:\Users\Edwin\AppData\Local\Temp\Low\SessionWin32k\1205\conhost.exe, Quarantined, [7ec935ed5e2c4bebdad55e9bed14ee12], 
Trojan.Clicker, C:\Users\Edwin\AppData\Local\Temp\Low\SessionWin32k\3301\conhost.exe, Quarantined, [b3944bd7543647efedc27a7f36cba35d], 
Trojan.Clicker, C:\Users\Edwin\AppData\Local\Temp\Low\SessionWin32k\897\conhost.exe, Quarantined, [e95e0c16d9b1c175ac03b247d72a44bc], 
Trojan.Agent.ED, C:\Users\Edwin\AppData\Local\Temp\59580\AppData\Roaming\isguqfj.exe, Quarantined, [0047f32f0f7b2610e79e53d5b74b0000], 
Trojan.Agent.B47Gen, C:\Windows\Installer\{0B90A30B-97CE-4E51-9F8F-AB238699EA09}\msiexec.exe, Quarantined, [7bcc6fb3fb8f241257616cbcbe44c838], 
Trojan.Agent.Gen, C:\Users\Edwin\AppData\Local\Temp\51f28\putwnskg.exe, Quarantined, [67e045ddd6b415211ef2d52a7d8748b8], 

Physical Sectors: 0
(No malicious items detected)


(end)

Please, any assistance would be greatly appreciated!

 

Thanks again.



BC AdBot (Login to Remove)

 


m

#2 nasdaq

nasdaq

  • Malware Response Team
  • 38,250 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:04:52 PM

Posted 01 March 2015 - 10:09 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.
===

Please run the Malwarebytes tool and clean everything that has been found.

===

Please download AdwCleaner by Xplode onto your Desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Click the Report button and the report will open in Notepad.
IMPORTANT
  • If you click the Clean button all items listed in the report will be removed.
If you find some false positive items or programs that you wish to keep, Close the AdwCleaner windows.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Check off the element(s) you wish to keep.
  • Click on the Clean button follow the prompts.
  • A log file will automatically open after the scan has finished.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleaner[Sn].txt (n is a number).
===

Download the version of this tool for your operating system.
Farbar Recovery Scan Tool (64 bit)
Farbar Recovery Scan Tool (32 bit)
and save it to a folder on your computer's Desktop.
Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
===

Please paste the logs in your next reply DO NOT ATTACH THEM unless specified.
To attach a file select the "More Reply Option" and follow the instructions.

How is the computer running?

Wait for further instructions.

#3 jadesama

jadesama
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:05:52 PM

Posted 01 March 2015 - 03:38 PM

I have decided to scrap my old workstation and simply start fresh on a new install of Windows. However, I am still looking for a method to decrypt the files created after my latest backup. I believe I was hit with the TeslaCrypt ransomware as all the encrypted files have an .ecc extension. 

 

It is safe to assume these files are forever gone, correct?

 

I am also unsure of how I got attacked, but I have restricted executables from running in the AppData, etc. directories as noted in the ransomware guides.

 

Are there any other precautions I can take?



#4 nasdaq

nasdaq

  • Malware Response Team
  • 38,250 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:04:52 PM

Posted 02 March 2015 - 08:53 AM

It is safe to assume these files are forever gone, correct?

Yes.

Have you seen this page.
http://www.bleepingcomputer.com/forums/t/568525/new-teslacrypt-ransomware-sets-its-scope-on-video-gamers/page-2

Read the last message by Grinler
===

For your information.
http://www.bleepingcomputer.com/tutorials/keep-your-computer-safe-online/

#5 nasdaq

nasdaq

  • Malware Response Team
  • 38,250 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:04:52 PM

Posted 08 March 2015 - 09:30 AM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users