A new in-development ransomware was discovered that has an interesting characteristic. Instead of the distributed executable performing the ransomware functionality, the executables compiles an embedded encrypted C# program at runtime and launches it directly into memory.
Discovered by MalwareHunterTeam, this ransomware contains an encrypted string that is embedded into the dropper as shown below.

This string is then decrypted using an included decryption key.

Now that the source code for the ransomware executable has been decrypted, the decrypted code is sent to another function that compiles it using the CSharpCodeProvider class and launches it directly into memory.

This method is probably being used to prevent the dropper from being detected by security software as any malicious behavior is hidden inside the encrypted string.
As for the ransomware itself, other than it saving the decryption key and IV to a file on the desktop, it is fully functional. Therefore, it wouldn't be surprising to see the ransomware being distributed at some point.
When executed, it will encrypt the files on the victim's computer and rename the files using the template sequre@tuta.io_[hex]. For example, a file called 11.jpg would be encrypted and renamed to sequre@tuta.io_31312E6A7067 .

In each folder that is scanned, a ransom note named HOW DECRIPT FILES.hta is created, which provides payment instructions as shown below.

While this ransomware is still in development, it does use an interesting feature that we have not seen in ransomware before. This goes to show how attackers continue to try and think up new ways to bypass security programs that protect your computer.
Comments
evandrix - 4 months ago
sample hash?
Lawrence Abrams - 4 months ago
https://www.virustotal.com/#/file/208cca124ddafe35a122f6bdd36191151a2730b4e1051804d5f68d0cb4b44145/detection
evandrix - 4 months ago
thank you very much~! ^_^ :D
Amigo-A - 4 months ago
Is this a new version of CryptConsole Ransomware?
Demonslay335 - 4 months ago
Yes, it's CryptConsole. Still decryptable.
ebrelion - 4 months ago
I don't understand : the CSharpCodeProvider class seems to need Visual Studio on the host. Does this mean that only developpers PC can be attacked ?
Lawrence Abrams - 4 months ago
Visual Studio does not need to be installed. It's built into the Net Framework.