Home / malwarePDF  

Ransom:Win32/Dereilock.A


First posted on 06 January 2017.
Source: Microsoft

Aliases :

There are no other names known for Ransom:Win32/Dereilock.A.

Explanation :

Installation

This threat drops the following copy of itself:

  • %AppData%\roaming\microsoft\windows\start menu\programs\startup\logon.exe


It may download an updated copy of itself from the following URLs:
  • hxxp://arizonacode.bplaced .net/HF/SystemLocker/UNLOCKKEYS/LOGON.exe
  • hxxp://arizonacode.bplaced .net/HF/SystemLocker/unlock-everybody.txt


Payload

Encrypts files

This threat encrypts all files in the same folder where it is dropped and executed.

It adds the following file name extension for encrypted files:
  • .deria


It displays any of the following messages:



Clicking the "OK" button brings up the ransom note, which contains instructions how to pay the ransom via Skype:



It displays the following message if you try to terminate its process:

Terminates processes

This threat terminates processes with names that contain any of the following strings:
  • Certmgr
  • Control
  • Cscript
  • Procexp
  • procexp32
  • procexp64
  • Utilman






Analysis by Francis Tan Seng

Last update 06 January 2017

 

TOP