Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

XTPLOCK 5.0


  • Please log in to reply
8 replies to this topic

#1 nickperth

nickperth

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:08:04 PM

Posted 12 October 2016 - 07:06 PM

Hi All, 

 

Does anyone have any info on XTPLOCK 5.0 im finding very little info on it.



BC AdBot (Login to Remove)

 


#2 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,479 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:07:04 AM

Posted 12 October 2016 - 07:12 PM

I haven't been able to find much info either, any info you find online will probably be derived from my tweet. I noticed a submission with the filemarker the other day and setup a capture rule. We believe based on the ransom note and style of the filemarker, it may be related to DMA Locker. There are alot of correlations.

If you can find the malware itself or how you got it, we will need it for analysis.

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#3 nickperth

nickperth
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:08:04 PM

Posted 12 October 2016 - 07:15 PM

I haven't been able to find much info either, any info you find online will probably be derived from my tweet. I noticed a submission with the filemarker the other day and setup a capture rule. We believe based on the ransom note and style of the filemarker, it may be related to DMA Locker. There are alot of correlations.

If you can find the malware itself or how you got it, we will need it for analysis.

I had it on a server, malware-bytes removed it, its done its damage, trying to recover from it now.

Got in via a compromised password



#4 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,479 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:07:04 AM

Posted 12 October 2016 - 07:49 PM

If you can't recover it, MBAM should have a hash in the log we can try to look it up by.

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#5 nickperth

nickperth
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:08:04 PM

Posted 12 October 2016 - 08:29 PM

If you can't recover it, MBAM should have a hash in the log we can try to look it up by.

Malwarebytes Anti-Malware
www.malwarebytes.org
 
Scan Date: 12/10/2016
Scan Time: 7:31 AM
Logfile: infection.txt
Administrator: Yes
 
Version: 2.1.8.1057
Malware Database: v2016.10.11.11
Rootkit Database: v2016.09.26.02
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled
 
OS: Windows Server 2008 R2 Service Pack 1
CPU: x64
File System: NTFS
 
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 645083
Time Elapsed: 9 min, 59 sec
 
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled
 
Processes: 0
(No malicious items detected)
 
Modules: 0
(No malicious items detected)
 
Registry Keys: 0
(No malicious items detected)
 
Registry Values: 2
Ransom.DMALocker, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Windows Firewall, C:\ProgramData\svchosd.exe, Quarantined, [97600493207a73c33e68aa4707fc59a7]
Ransom.DMALocker.Trace, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Windows Update, notepad C:\ProgramData\cryptinfo.txt, Quarantined, [9e593c5b811936003d6a6e83fd06d927]
 
Registry Data: 0
(No malicious items detected)
 
Folders: 9
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{439039F1-C62B-4A0B-879A-732CEF5C67AE}, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{439039F1-C62B-4A0B-879A-732CEF5C67AE}\Cache, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{532ED9E5-E6B3-4882-A886-4227EC90F27D}, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{532ED9E5-E6B3-4882-A886-4227EC90F27D}\Cache, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{C4CB573C-31E2-483D-A77C-F354909EA9E7}, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{C4CB573C-31E2-483D-A77C-F354909EA9E7}\Cache, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{D694B1EB-DFC1-415D-AE43-ADB7AF82B9CD}, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{D694B1EB-DFC1-415D-AE43-ADB7AF82B9CD}\Cache, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
 
Files: 28
Ransom.DMALocker.Trace, C:\Windows\System32\notepad.exe, Quarantined, [9e593c5b811936003d6a6e83fd06d927], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{439039F1-C62B-4A0B-879A-732CEF5C67AE}\20121219195528.log, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{439039F1-C62B-4A0B-879A-732CEF5C67AE}\20130308191103.log, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{439039F1-C62B-4A0B-879A-732CEF5C67AE}\20130308192522.log, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{439039F1-C62B-4A0B-879A-732CEF5C67AE}\20130308192650.log, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{439039F1-C62B-4A0B-879A-732CEF5C67AE}\Setup.dat, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{439039F1-C62B-4A0B-879A-732CEF5C67AE}\Setup.exe, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{439039F1-C62B-4A0B-879A-732CEF5C67AE}\Setup.ico, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{439039F1-C62B-4A0B-879A-732CEF5C67AE}\_Setup.dll, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{532ED9E5-E6B3-4882-A886-4227EC90F27D}\20140617002802.log, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{532ED9E5-E6B3-4882-A886-4227EC90F27D}\20140617003143.log, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{532ED9E5-E6B3-4882-A886-4227EC90F27D}\Setup.dat, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{532ED9E5-E6B3-4882-A886-4227EC90F27D}\Setup.exe, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{532ED9E5-E6B3-4882-A886-4227EC90F27D}\Setup.ico, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{532ED9E5-E6B3-4882-A886-4227EC90F27D}\_Setup.dll, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{C4CB573C-31E2-483D-A77C-F354909EA9E7}\20130630193918.log, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{C4CB573C-31E2-483D-A77C-F354909EA9E7}\Setup.dat, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{C4CB573C-31E2-483D-A77C-F354909EA9E7}\Setup.exe, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{C4CB573C-31E2-483D-A77C-F354909EA9E7}\Setup.ico, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{C4CB573C-31E2-483D-A77C-F354909EA9E7}\_Setup.dll, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{D694B1EB-DFC1-415D-AE43-ADB7AF82B9CD}\20131002171802.log, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{D694B1EB-DFC1-415D-AE43-ADB7AF82B9CD}\20131002172151.log, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{D694B1EB-DFC1-415D-AE43-ADB7AF82B9CD}\20131002173036.log, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{D694B1EB-DFC1-415D-AE43-ADB7AF82B9CD}\20131002173117.log, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{D694B1EB-DFC1-415D-AE43-ADB7AF82B9CD}\Setup.dat, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{D694B1EB-DFC1-415D-AE43-ADB7AF82B9CD}\Setup.exe, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{D694B1EB-DFC1-415D-AE43-ADB7AF82B9CD}\Setup.ico, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
PUP.Optional.Yontoo, C:\ProgramData\Tarma Installer\{D694B1EB-DFC1-415D-AE43-ADB7AF82B9CD}\_Setup.dll, Quarantined, [19de7b1c79213402b3b253718b7728d8], 
 
Physical Sectors: 0
(No malicious items detected)
 
 
(end)

Edited by nickperth, 12 October 2016 - 08:30 PM.


#6 nickperth

nickperth
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:08:04 PM

Posted 12 October 2016 - 08:31 PM

Can also provide a file that is encrypted if you would like that too for reference. 



#7 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,479 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:07:04 AM

Posted 12 October 2016 - 08:36 PM

Looks like MalwareBytes even agrees it is DMALocker. I've passed the hash onto hasherezade, she may be able to take a look at it. If it's anything like DMALocker 4.0, it might not be decryptable unless they introduced a new bug.

 

I have a few encrypted files on IDR saved from you and a few other victims, but if you have some which you have the original for comparison, that may be helpful.

 

You can also try the usual recovery/undelete methods like ShadowExplorer or Recuva if you don't have backups. Sometimes you may get lucky.


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#8 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,479 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:07:04 AM

Posted 15 October 2016 - 09:32 AM

Victims please check out @hasherezade's Tweet: https://twitter.com/hasherezade/status/787279186243231745?s=09

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#9 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,479 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:07:04 AM

Posted 31 October 2016 - 12:54 AM

Another variant of this was found that uses the file marker "!Locker#2.0". If anyone has been affected by this version, please check out @hasherezade's Tweet here: https://twitter.com/hasherezade/status/792911796176842754?s=09

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users