RANSOM_CRYPTOQKG.A
Windows
Threat Type: Ransomware
Destructiveness: No
Encrypted: Yes
In the wild: Yes
OVERVIEW
Spammed via email
Dubbed as qkG, this file-encrypting ransomware is written entirely in Visual Basics for Applications (VBA) macros. This is rare considering ransomware families that use malicious macros to download the malware After this malware infects the normal.dot template. files are then encrypted after they are closed.
This Ransomware arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
TECHNICAL DETAILS
58,880 bytes
No
15 Nov 2017
Encrypts files
Arrival Details
This Ransomware arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
Other Details
This Ransomware does the following:
- Executes malicious macro when user closes the document.
- Checks version of application
- Set privacy settings by modifying registries
- Appends the following ransomnote after the encrypted content in the document:
I’m QkG@PTM17! by TNA@MHT-TT2
Send $300 to the BTC Address: {BLOCKED}dTgtesLWthysLQQtsuszFbpydg
Contact Email: {email} - Targets opened documents in the affected system.
- Encrypts the contents of opened document after the user closes it.
This is the Trend Micro detection for Microsoft Word documents that are compromised through the insertion of a malicious macro.
SOLUTION
9.850
Step 1
Before doing any scans, Windows XP, Windows Vista, and Windows 7 users must disable System Restore to allow full scanning of their computers.
Step 2
Scan your computer with your Trend Micro product to delete files detected as RANSOM_CRYPTOQKG.A. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:
Did this description help? Tell us how we did.