Home / malwarePDF  

Ransom:Win32/Isda


First posted on 31 March 2015.
Source: Microsoft

Aliases :

There are no other names known for Ransom:Win32/Isda.

Explanation :

Threat behavior

Installation

The threat copies itself to the so that it runs each time you start your PC:

  • \.exe


It also drops an image file (.bmp) with a random file name containing instructions on how to restore your files. It drops the file in the so it will appear each time you start your PC:

  • \.bmp


It also drops a copy of the image file into %APPDATA%\Roaming.

We have seen it use the following names for the image file:

  • fud.bmp
  • paycrypt.bmp
  • strongcrypt.bmp


The image might look like the following:



It changes the desktop wallpaper to the image it dropped by changing the following registry entry:

In subkey: HKCU\Control Panel
Sets value: Desktop Wallpaper
With data: "%APPDATA%\Roaming\.bmp"

Payload

Encrypts your files

This ransomware searches for and encrypts files with the following extension on local and shared or network drives:

  • .113
  • .1cd
  • .3gp
  • .73b
  • .7z
  • .a3d
  • .ab
  • .abk
  • .accdb
  • .arj
  • .as4
  • .asm
  • .asvx
  • .ate
  • .avi
  • .bac
  • .bak
  • .bck
  • .bkf
  • .cdr
  • .cer
  • .cf
  • .cpt
  • .csv
  • .db3
  • .dbf
  • .doc
  • .docx
  • .dt
  • .dwg
  • .erf
  • .fbf
  • .fbk
  • .fbw
  • .fbx
  • .fdb
  • .gbk
  • .gho
  • .gzip
  • .iv2i
  • .jpeg
  • .jpg
  • .key
  • .keystore
  • .ldf
  • .m2v
  • .m3d
  • .max
  • .mdb
  • .mkv
  • .mov
  • .mpeg
  • .nbd
  • .nrw
  • .nx1
  • .odb
  • .odc
  • .odp
  • .ods
  • .odt
  • .old
  • .orf
  • .p12
  • .pdf
  • .pef
  • .ppsx
  • .ppt
  • .pptm
  • .pptx
  • .pst
  • .ptx
  • .pwm
  • .pz3
  • .qic
  • .r3d
  • .rar
  • .raw
  • .rtf
  • .rwl
  • .rx2
  • .sbs
  • .sldasm
  • .sldprt
  • .sn1
  • .sna
  • .spf
  • .sr2
  • .srf
  • .srw
  • .tbl
  • .tib
  • .tis
  • .txt
  • .wab
  • .wps
  • .x3f
  • .xls
  • .xlsb
  • .xlsk
  • .xlsm
  • .xlsx
  • .zip


It avoids encrypting files in folders that have the following strings:

  • program files
  • program files (x86)
  • programdata
  • system volume information
  • temp
  • windows


The threat changes the extension of the encrypted files in the format .id-<10 random numbers>_.

For example, we have seen the following:

  • .id-<10 random numbers>_fud@india.com
  • .id-<10 random numbers>_keybtc@foxmail2.com
  • .id-<10 random numbers>_paybtc@india.com
  • .id-<10 random numbers>_paycrypt@inbox.com
  • .id-<10 random numbers>_sos@anointernet.com
  • .id-<10 random numbers>_xsmail@india.com


It uses an AES encryption algorithm. The key is stored on the malware server that it connects to when it infects your PC.

Contacts remote host

It connects to a malware server and sends information such as:

  • Computer name
  • The 10 digit ID it adds to encrypted file extensions
  • The appended extension name of the encrypted files


It will POST the above information to its server. We have seen the threat try to contact the following servers:

  • http://euiloveyou.com/close/script.php
  • http://hungariagogo.com/close/script.php
  • http://muhojir.tj/script.php
  • http://structretech.com/script.php
  • http://valueseu.com/close/script.php




Analysis by Alden Pornasdoro

Symptoms

The following can indicate that you have this threat on your PC:

  • You have these files:
    • %APPDATA%\.bmp
    • \.bmp
  • Your files have extra information add the end, that look like the following:

    • .id-<10 random numbers>_fud@india.com
    • .id-<10 random numbers>_keybtc@foxmail2.com
    • .id-<10 random numbers>_paybtc@india.com
    • .id-<10 random numbers>_paycrypt@inbox.com
    • .id-<10 random numbers>_sos@anointernet.com
    • .id-<10 random numbers>_xsmail@india.com
  • You see these entries or keys in your registry:

    In subkey: HKCU\Control Panel
    Sets value: Desktop Wallpaper
    With data: "%APPDATA%\Roaming\.bmp"
  • You see this message instead of your wallpaper, and whenever you start Windows:

Last update 31 March 2015

 

TOP