Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Is this Cryptolocker??


  • This topic is locked This topic is locked
5 replies to this topic

#1 MarEll_

MarEll_

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:08:49 PM

Posted 10 May 2015 - 07:17 AM

Hi there,
I appear to have some form of ransomware issue on my laptop that has encrypted my files (with an exx extension).
 
Here is a screenshot of the message:
Untitled.png?dl=0

https://www.dropbox.com/s/lligpxxd0tvg7rq/Untitled.png?dl=0
 
Running Win7 32bit.  For the most part I'm not too bothered about the files on there, however all my files in my dropbox have also been encrypted and have since synced to my other devices!

Here are the results of a Malwarebytes scan:

Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 10/05/2015
Scan Time: 12:27:28
Logfile: MWB Result.txt
Administrator: Yes

Version: 2.01.6.1022
Malware Database: v2015.05.10.02
Rootkit Database: v2015.04.21.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled

OS: Windows 7
CPU: x86
File System: NTFS
User: LAP

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 307551
Time Elapsed: 9 min, 47 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

Processes: 1
Trojan.CryptoLocker, C:\Users\LAP\AppData\Local\grrhuwl.exe, 3348, , [58a2811045459a9cb042a8addc26f30d]

Modules: 0
(No malicious items detected)

Registry Keys: 2
Trojan.Vawtrak, HKLM\SOFTWARE\CLASSES\CLSID\{56CBD3CF-BF99-4DF5-851F-F5B9B57496A1}, , [bd3d424f0c7ef6401595c941cf37e21e], 
Trojan.Vawtrak, HKU\S-1-5-21-3919543184-1015209820-3502251797-1000_Classes\CLSID\{56CBD3CF-BF99-4DF5-851F-F5B9B57496A1}, , [bd3d424f0c7ef6401595c941cf37e21e], 

Registry Values: 3
Trojan.CryptoLocker, HKU\S-1-5-21-3919543184-1015209820-3502251797-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|AVrSvc, C:\Users\LAP\AppData\Local\grrhuwl.exe, , [58a2811045459a9cb042a8addc26f30d]
Rootkit.Fileless.MTGen, HKU\S-1-5-21-3919543184-1015209820-3502251797-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|^5a6de492, , [41b95b3615750333f61669ff46bf7f81], 
Rootkit.Fileless.MTGen, HKU\S-1-5-21-3919543184-1015209820-3502251797-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|^dbcb03ca, , [c9312d64e2a8eb4b65a773f5ee1749b7], 

Registry Data: 0
(No malicious items detected)

Folders: 0
(No malicious items detected)

Files: 25
Trojan.CryptoLocker, C:\Users\LAP\AppData\Local\grrhuwl.exe, , [58a2811045459a9cb042a8addc26f30d], 
Trojan.Vawtrak, C:\ProgramData\{D9E629DC-CB1C-4A97-9900-81922B4EFFD4}\wmdrmnet.dll, , [bd3d424f0c7ef6401595c941cf37e21e], 
Trojan.Agent, C:\Users\LAP\AppData\Local\Temp\1911.tmp, , [a555cec396f40d29b87e94c280829f61], 
Trojan.VBCrypt, C:\Users\LAP\AppData\Local\Temp\1C61.tmp, , [35c59cf54545f2449caf6ee6d42e15eb], 
Trojan.Agent.SDLED, C:\Users\LAP\AppData\Local\Temp\1E21.tmp, , [ba40127f8dfd082ee215f415699d4eb2], 
Trojan.Vawtrak, C:\Users\LAP\AppData\Local\Temp\1FF8.tmp, , [14e6c3ce9befb1857c9299710df931cf], 
Trojan.Agent.ED, C:\Users\LAP\AppData\Local\Temp\33B8.tmp, , [2ecc97fa2c5ee056a6fe460c6c96d52b], 
Trojan.Agent.EDRP, C:\Users\LAP\AppData\Local\Temp\33D4.tmp, , [9f5bbbd63f4bd660031360aac83e837d], 
Trojan.Agent.IDED, C:\Users\LAP\AppData\Local\Temp\3CA5.tmp, , [b04a3f52a4e651e5f69cf85b19e9728e], 
Trojan.Inject, C:\Users\LAP\AppData\Local\Temp\54F.tmp, , [1ddd345dc5c54de9b853c092778b4bb5], 
Trojan.Pseudo.sram, C:\Users\LAP\AppData\Local\Temp\607A.tmp, , [c7332071bad01b1b9806c88c8e74956b], 
Trojan.Vawtrak, C:\Users\LAP\AppData\Local\Temp\7F3D.tmp, , [9763bed31a70b1859a5da2afed153dc3], 
Trojan.CryptoLocker, C:\Users\LAP\AppData\Local\Temp\8131.tmp, , [44b6781987034ee8e790b1a15ba7b34d], 
Trojan.CryptoLocker, C:\Users\LAP\AppData\Local\Temp\827F.tmp, , [ee0c9df41c6e320440372c2649b9b14f], 
Trojan.Vawtrak, C:\Users\LAP\AppData\Local\Temp\D029.tmp, , [9268cac7e9a16cca53bb24e60402c63a], 
Trojan.CryptoLocker, C:\Users\LAP\AppData\Local\Temp\D701.tmp, , [10eaf79acdbdb185e111b89d38caa957], 
Trojan.FakeMS.ED, C:\Users\LAP\AppData\Local\Temp\8CF.tmp, , [39c17b16f09afe38631af4620002f50b], 
Trojan.CryptoLocker, C:\Users\LAP\AppData\Local\Temp\A830.tmp, , [04f6048d91f99e9837bbe17472904db3], 
Trojan.CryptoLocker, C:\Users\LAP\AppData\Local\Temp\AF36.tmp, , [f208464b77130a2cc0b7da78e51d07f9], 
Backdoor.Papras, C:\Users\LAP\AppData\Local\Temp\{C94C9797-EB61-4678-91B4-471815ACC46F}\Display10.dll, , [31c9424fb7d3ad89fcc5070330d616ea], 
Trojan.FakeMS.ED, C:\Users\LAP\AppData\Local\Temp\{D765AD64-9C5E-4B2C-BAB6-210D24C024D9}\TMPA730.tmp, , [59a1a2ef7b0f0f27c5927ada4bb740c0], 
Trojan.FakeMS.ED, C:\Users\LAP\AppData\Local\Temp\{D7A98227-3F74-4B1A-98B9-23A653A8766C}\TMPA75F.tmp, , [aa50aee3ee9c3204abacdc7847bbdc24], 
Backdoor.Papras, C:\Users\LAP\AppData\Local\Temp\{0B51A5C0-0857-4602-AED0-C343FA215A1A}\tapiui62.dll, , [6b8f573ad4b63cfa477adc2eed195aa6], 
Trojan.CryptoLocker, C:\Users\LAP\AppData\Local\yeddssm.exe, , [1ae0335eb1d96bcbb63c490cde24f20e], 
Trojan.Kovter, C:\Users\LAP\AppData\Local\inuk\inuk.exe, , [31c9eea33357b48271835ef538ca51af], 

Physical Sectors: 0
(No malicious items detected)


(end)

 

 

 

 

 

 

 



BC AdBot (Login to Remove)

 


#2 buddy215

buddy215

  • Moderator
  • 13,260 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:02:49 PM

Posted 10 May 2015 - 08:08 AM

Well, that's what MBAM says among other really bad malware it identified. 

 

QUOTE AVG:

Over the last few months, AVG has tracked the rapid spread of a banking Trojan known as Vawtrak (aka Neverquest or Snifula).

Once it has infected a system, Vawtrak gains access to bank accounts visited by the victim. Furthermore, Vawtrak uses the infamous Pony module for stealing a wide range of login credentials.

While Vawtrak Trojans are not new, this particular sample is of great interest.

 

How and where is it spreading?

The Vawtrak Trojkan spreads in three main ways:

  • Drive-by download – in the form of spam email attachments or links to compromised sites
  • Malware downloader – such as Zemot or Chaintor
  • Exploit kit – such as Angler

nfo: There is a very active CryptoLocker support topic, which contains discussion and the experiences of a variety of IT consultants, end users, and companies who have been affected by CryptoLocker. If you are interested in this infection or wish to ask questions about it, please visit this CryptoLocker support topic. Once at the topic, and if you are a member, you can subscribe to it in order to get notifications when someone adds more information to the topic.

 

The bottom line....you won't be able to decrypt without paying the ransom and paying the ransom is no guarantee or may not be possible.


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

#3 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,596 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:49 PM

Posted 10 May 2015 - 08:17 AM

Are you sure the extension is .exx?

Any files that are encrypted with TeslaCrypt will have the .ecc extension added to the end of the filename.
Any files that are encrypted with Alpha Crypt (TeslaCrypt renamed) will have the .ezz extension added to the end of the filename.

A repository of all current knowledge regarding TeslaCrypt and Alpha Crypt is provided by Grinler (aka Lawrence Abrams), in this topic: TeslaCrypt and Alpha Crypt Ransomware Information Guide and FAQ

There are ongoing discussions in these topic:Information about decrypting files affected by TeslaCrypt ransomware can be found in this topic: Cisco's Talos Group releases decryptor for TeslaCrypt.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#4 ayates

ayates

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:08:49 PM

Posted 11 May 2015 - 01:32 PM

I have just had a customer that had what appears to be a variant of the TeslaCrypt ransomware and a number of shared folders on their fileserver where all encrypted and renamed with *.exx extension. Each folder then had the following txt file "HELP_RESTORE_FILES_trvrp.txt".

Luckily the customer had backup and shadow copies were still intact so we managed to recover all the files without issue.

We believe a user in the company clicked on a dodgy link from within an e-mail.

 

Anthony



#5 buddy215

buddy215

  • Moderator
  • 13,260 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:02:49 PM

Posted 11 May 2015 - 03:01 PM

Thanks for reporting that ayates and welcome to BC !

 

For you and others reading this: Threat Spotlight: TeslaCrypt – Decrypt It Yourself

QUOTE: Talos was able to develop a tool which decrypts the files encrypted by the TeslaCrypt ransomware.

 

EDIT: Just learned that the above fix will not work for .exx version.

TeslaDecrypt is only for the original .ecc version.


Edited by buddy215, 11 May 2015 - 03:34 PM.

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,596 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:49 PM

Posted 11 May 2015 - 04:27 PM

Any files that are encrypted with the newer unamed variant will have the .exx extension added to the end of the filename.

A repository of all current knowledge regarding TeslaCrypt and Alpha Crypt is provided by Grinler (aka Lawrence Abrams), in this topic: TeslaCrypt and Alpha Crypt Ransomware Information Guide and FAQ

There is an ongoing discussion in this topic: New TeslaCrypt version that uses the .EXX extension.

Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in that topic discussion. To avoid unnecessary confusion...this topic is closed.

Thanks
The BC Staff
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users