Inicio de zonavirus, antivirus

Variante de ransomware BITMAN (mezcla de CTBLOCKER, CRYPTOWALL, CRYPTOLOCKER, TESLACRYPT...) controlado a partir de ELISTARA 32.86 de hoy

msc hotline sat
Wednesday, September 2, 2015

Otra variante de ransomware, esta vez mezcla de varios de los ya conocidos ya que utiliza el nombre de MSCONFIG.EXE para guardar el fichero malicioso y lanzarlo en el siguiente reinicio en una clave O4 RUN, como el CTBLOCKER, añade tres letras al nombre de los ficheros cifrados, como el TESLACRYPT, presenta una pantalla de informacion para descifrado muy similar a la del CRYPTOWALL



Controlado especificamente a partir de ELISTARA 32.86, si bien anteriores versiones ya eliminan la carga en los posteriores reinicios, al eliminar la clave O4 RUN ... MSCONFIG:EXE por su similitud con el CTBLOCKER, pero añadimos su deteccion por cadenas desde el ELISTARA 32.86 de hoy



La pantalla de información del propio malware indica lo siguiente:



What happened to your files ?

All of your files were protected by a strong encryption with RSA-2048.

More information about the encryption keys using RSA-2048 can be found here: http://en.wikipedia.org/wiki/RSA_%28cryptosystem%29



What does this mean ?

This means that the structure and data within your files have been irrevocably changed, you will not be able to work with them, read them or see them,

it is the same thing as losing them forever, but with our help, you can restore them.



How did this happen ?

Especially for you, on our server was generated the secret key pair RSA-2048 - public and private.

All your files were encrypted with the public key, which has been transferred to your computer via the Internet.

Decrypting of your files is only possible with the help of the private key and decrypt program, which is on our secret server.



What do I do ?

Alas, if you do not take the necessary measures for the specified time then the conditions for obtaining the private key will be changed.

If you really value your data, then we suggest you do not waste valuable time searching for other solutions because they do not exist.



For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below:

1. http://aep554w4fm8j.fflroe598qu.com/5EE4842387BFE54A

2. http://aoei243548ld.keedo93i1lo.com/5EE4842387BFE54A

3. https://zpr5huq4bgmutfnf.onion.to/5EE4842387BFE54A



If for some reasons the addresses are not available, follow these steps:

1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en

2. After a successful installation, run the browser and wait for initialization.

3. Type in the address bar: zpr5huq4bgmutfnf.onion/5EE4842387BFE54A

4. Follow the instructions on the site.



IMPORTANT INFORMATION:

Your personal page: http://aep554w4fm8j.fflroe598qu.com/5EE4842387BFE54A

Your personal page (using TOR): zpr5huq4bgmutfnf.onion/5EE4842387BFE54A

Your personal identification number (if you open the site (or TOR 's) directly): 5EE4842387BFE54A




Y el preanalisis de virustotal ofrece el siguiente informe:



MD5 d2db87e5b0f4edf9b6d88e9ee61b0fff

SHA1 2d44c57f34f7c03ac1817819200744b95007addc

File size 257.5 KB ( 263654 bytes )

SHA256: a3eee91bc759ccb521b5658d35a8e413965a76bb369c3cc0cd18e3eaed39953f

File name: vcweke.exe

Detection ratio: 46 / 57

Analysis date: 2015-09-02 07:40:06 UTC ( 11 minutes ago )



0 1



Antivirus Result Update

ALYac Trojan.GenericKD.2644411 20150902

AVG Crypt4.BWCK 20150902

AVware Trojan.Win32.Generic!BT 20150901

Ad-Aware Trojan.GenericKD.2644411 20150902

Agnitum Trojan.Bitman! 20150901

AhnLab-V3 Trojan/Win32.CryptoWall 20150902

Antiy-AVL Trojan/Win32.Bitman 20150902

Arcabit Trojan.Generic.D2859BB 20150902

Avast Win32:Malware-gen 20150902

Avira TR/Crypt.ZPACK.152774 20150902

BitDefender Trojan.GenericKD.2644411 20150902

Bkav HW32.Packed.42DB 20150901

CAT-QuickHeal Trojan.Bagsu.r4 20150901

Comodo UnclassifiedMalware 20150902

Cyren W32/Trojan.LCYX-0212 20150902

DrWeb Trojan.DownLoader15.44548 20150902

ESET-NOD32 a variant of Win32/Kryptik.DTLD 20150902

Emsisoft Trojan.GenericKD.2644411 (B) 20150902

F-Secure Trojan.GenericKD.2644411 20150902

Fortinet W32/Bitman.DTLD!tr 20150902

GData Trojan.GenericKD.2644411 20150902

Ikarus Trojan.Win32.Crypt 20150902

Jiangmin Trojan/Bitman.hz 20150901

K7AntiVirus Trojan ( 004cd1521 ) 20150902

K7GW Trojan ( 004cd1521 ) 20150902

Kaspersky Trojan-Ransom.Win32.Bitman.vu 20150902

Malwarebytes Trojan.Agent.rgk 20150902

McAfee RDN/Ransom 20150902

McAfee-GW-Edition RDN/Ransom 20150902

MicroWorld-eScan Trojan.GenericKD.2644411 20150902

Microsoft Trojan:Win32/Bagsu!rfn 20150902

NANO-Antivirus Trojan.Win32.Bitman.dvfagf 20150902

Panda Trj/Genetic.gen 20150901

Qihoo-360 HEUR/QVM07.1.Malware.Gen 20150902

Rising PE:Trojan.Win32.Generic.18F76E0B!418868747 20150901

SUPERAntiSpyware Trojan.Agent/Gen-Dropper 20150829

Sophos Troj/Ransom-BDO 20150901

Symantec Trojan.Cryptolocker.N 20150901

Tencent Win32.Trojan.Bp-ransomware.Ejqz 20150902

TheHacker Trojan/Kryptik.dtld 20150831

TrendMicro TROJ_CRYPTESLA.CP 20150902

TrendMicro-HouseCall TROJ_CRYPTESLA.CP 20150902

VBA32 Hoax.Bitman 20150901

VIPRE Trojan.Win32.Generic!BT 20150901

ViRobot Trojan.Win32.S.Agent.263654 20150902

nProtect Trojan/W32.Bitman.263654 20150901





Dicha version del ELISTARA 32.86 que lo detecta y elimina, estará disponible en nuestra web a partir de las 19 h CEST de hoy



Si se ha detectado dicho engendro, antes de volver a conectar el ordenador que causó la codificación al ejecutar el fichero malicioso, recomendamos ARRANCAR EN MODO SEGURO y lanzar el ELISTARA 32.86 o superior, aceptando, cuando lo pregunte, ELIMINAR LOS TEMPORALES.



Y recordamos las recomendaciones sobre los ransomware en general:



http://www.satinfo.es/noticies/2015/recomendaciones-para-control-de-los-ransomwares-recordatorio/





saludos



ms, 2-9-2015

RSS Noticias AntivirusRSS Noticias Articulos AntivirusRSS Articulos RSS Descargas AntivirusRSS Descargas

>> Compartir

comparte con tus amigos, zonavirus.com
Redes Sociales en zonavirus
© 1998-2024 - pym:sol Aviso Legal | Política de Privacidad | Política de Cookies | Contacto