A new Chinese MBRLocker called DexLocker has been discovered that asks for 30 Yuan to get access to a computer. First discovered by security researcher JAMESWT, this ransomware will modify the master boot record of the victim's computer so that it shows a ransom note before Windows starts.

Unfortunately, I was not able to get this sample to run, so I have no first hand analysis of this ransomware. The AnyRun video posted by JAMESWT, though, shows that once you install the ransomware, it immediately reboots the computer and the victim is greeted with an ascii skull and a message to send 30 yaun to the 2055965068 qq address in order to get access to their computer again.

DexCrypt Lock Screen
DexCrypt Lock Screen

Microsoft's Windows Defender Security Team saw Jame's tweet and tweeted that they have labeled the MBRLocker as Ransom:DOS/Dexcrypt.A and that it can be detected by Windows Defender.

According to kangxiaopao, you can enter the ssssss password to gain access. If this password does not work and it does only replace the MBR, it can be fixed by booting up into the Windows Recovery Console and restoring the Master Boot Record using the following commands:

bootrec /RebuildBcd
bootrec /fixMbr
bootrec /fixboot

Once you enter these commands, you can reboot and get access again to Windows again.

Related Articles:

Kraken Cryptor Ransomware Connecting to BleepingComputer During Encryption

The Week in Ransomware - October 19th 2018 - GandCrab, Birbware, and More

GandCrab Devs Release Decryption Keys for Syrian Victims

SEO Poisoning Campaign Targeting U.S. Midterm Election Keywords

The Week in Ransomware - October 12th 2018 - NotPetya, GandCrab, and More




Ransom Note:

   .-'      '-.
  /            \ 
 |              |
 |,  .-.  .-.  ,|
 | )(__/  \__)( |
 |/     /\     \|
 (_     ^^     _)
   | \IIIIII/ |
   \          /
    `yao mi ma gei 30 yuan jia qq 2055965068`