RANSOM_CRYPTOQKG.A

 Analysis by: Jennifer Gumban

 PLATFORM:

Windows

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Ransomware

  • Destructiveness: No

  • Encrypted: Yes

  • In the wild: Yes

  OVERVIEW

Infection Channel:

Spammed via email

Dubbed as qkG, this file-encrypting ransomware is written entirely in Visual Basics for Applications (VBA) macros. This is rare considering ransomware families that use malicious macros to download the malware After this malware infects the normal.dot template. files are then encrypted after they are closed.

This Ransomware arrives as an attachment to email messages spammed by other malware/grayware or malicious users.

  TECHNICAL DETAILS

File Size:

58,880 bytes

Memory Resident:

No

Initial Samples Received Date:

15 Nov 2017

Payload:

Encrypts files

Arrival Details

This Ransomware arrives as an attachment to email messages spammed by other malware/grayware or malicious users.

Other Details

This Ransomware does the following:

  • Executes malicious macro when user closes the document.
  • Checks version of application
  • Set privacy settings by modifying registries
  • Appends the following ransomnote after the encrypted content in the document:
    I’m QkG@PTM17! by TNA@MHT-TT2
    Send $300 to the BTC Address: {BLOCKED}dTgtesLWthysLQQtsuszFbpydg
    Contact Email: {email}
  • Targets opened documents in the affected system.
  • Encrypts the contents of opened document after the user closes it.

This is the Trend Micro detection for Microsoft Word documents that are compromised through the insertion of a malicious macro.

  SOLUTION

Minimum Scan Engine:

9.850

Step 1

Before doing any scans, Windows XP, Windows Vista, and Windows 7 users must disable System Restore to allow full scanning of their computers.

Step 2

Scan your computer with your Trend Micro product to delete files detected as RANSOM_CRYPTOQKG.A. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:


Did this description help? Tell us how we did.