Analysis by: John Rey Canon

 PLATFORM:

Windows

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Ransomware

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This Ransomware may be dropped by other malware.

  TECHNICAL DETAILS

File Size: 1,198 bytes
File Type: TXT
Memory Resident: No
Initial Samples Received Date: 19 Dec 2019

Arrival Details

This Ransomware may be dropped by the following malware:

  • Ransom.Win32.THTLOCKER

Other Details

This Ransomware does the following:

  • This is the Trend Micro detection for:
    • Ransom notes dropped by Ransom.Win32.THTLOCKER malware family.

Ransomware Routine

This Ransomware leaves text files that serve as ransom notes containing the following text:

    • Hello. Sorry, your company's server hard drive was encrypted by us.

      We use the most complex encryption algorithm (AES256).Only we can decrypt.

      Please contact us: {BLOCKED}hackerteam@protonmail.com (Please check spam,Avoid missing mail)

      Identification code: {BLOCKED}d9qrvM (Please tell us the identification code)

      Ransom: Please pay bitcoins.After the payment is successful, we will tell the Password.
      (If the contact is fast, we will give you a discount.)

      In order for you to believe in us, we have prepared the test server.Please contact us and we will tell the test server and decrypt the password.

      How to buy and pay for Bitcoin:

      http://www.localbitcoins.com
      Or you can google search "How to buy Bitcoin"
      If you know other trading websites better.



      We are a professional hacker team, not a virus.We only take directional attacks.We know everything about your company.If you refuse to pay, we will disclose important documents that we have(file,email,contracts and many more).


      We are a reputable organization and definitely not a liar.Our business covers more than 20 countries around the world. There are hundreds of companies that have successfully unlocked.

  SOLUTION

Minimum Scan Engine: 9.850
FIRST VSAPI PATTERN FILE: 15.568.05
FIRST VSAPI PATTERN DATE: 19 Dec 2019
VSAPI OPR PATTERN File: 15.569.00
VSAPI OPR PATTERN Date: 20 Dec 2019

Step 1

Before doing any scans, Windows 7, Windows 8, Windows 8.1, and Windows 10 users must disable System Restore to allow full scanning of their computers.

Step 2

Scan your computer with your Trend Micro product to delete files detected as Ransom.Win32.THTLOCKER.A.note. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:


Did this description help? Tell us how we did.