Ransom.Linux.PLAYDE.YXEE3T
Linux
Threat Type: Ransomware
Destructiveness: No
Encrypted: No
In the wild: Yes
OVERVIEW
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It does not have any propagation routine.
It drops files as ransom note.
TECHNICAL DETAILS
Arrival Details
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Propagation
This Ransomware does not have any propagation routine.
Other Details
This Ransomware does the following:
- It runs ESXi-related commands to check that it is running in an ESXi environment
- If the sample is not running inside an ESXi environment, it will terminate and delete itself
- Once the ransomware runs in an ESXi environment, it will turn off any virtual machine and proceed on the encryption of VM files (VM disk, configuration, and metadata files)
It accepts the following parameters:
- -p → Execute normal functionality. Same as no command-line argument.
- -f → Encrypt a specific drive
- -s → Encrypt network shared resource
- -e → Encrypt a specific folder/file
Ransomware Routine
This Ransomware appends the following extension to the file name of the encrypted files:
- .PLAY
It drops the following file(s) as ransom note:
- {Root Directory}\PLAY_Readme.txt
SOLUTION
Step 1
Note that not all files, folders, and registry keys and entries are installed on your computer during this malware's/spyware's/grayware's execution. This may be due to incomplete installation or other operating system conditions. If you do not find the same files/folders/registry information, please proceed to the next step.
Step 2
Search and delete these files
- {Root Directory}\PLAY_Readme.txt
Step 3
Scan your computer with your Trend Micro product to delete files detected as Ransom.Linux.PLAYDE.YXEE3T. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:
Did this description help? Tell us how we did.