Endpoint Protection

 View Only
  • 1.  #Ransomware encrypt without changing extension to files

    Posted Sep 06, 2016 05:41 AM

    Hi all,

    One of customers have been infected with one variant of @ransomware that no change extension files, so only way to monitor is control MD5 of honeypot files.

    I did not found a lot of information so I share with you, looks like other vendor call it CrypMIC, by the Neutrino Exploit Kit.

    If any more information is avalaible, please share.

    You can find a DLL in tmp DIR.

     

    Thanks,

    @rider



  • 2.  RE: #Ransomware encrypt without changing extension to files

    Posted Sep 06, 2016 06:31 AM


  • 3.  RE: #Ransomware encrypt without changing extension to files

    Posted Sep 06, 2016 07:55 AM

    The only way to is restore from a known good backup or re-image the machine.

    Are you running all components of SEP? How do you have it configured?

     



  • 4.  RE: #Ransomware encrypt without changing extension to files
    Best Answer

    Posted Sep 08, 2016 06:59 AM

    Thanks Brian and Ramji,

     

    SEP was updated and configured properly, submision is pending, if you need case number or submission id, I can contact you by PM, but there are not a lot of information about his kind of crypt, only, trend micro has something about it... and I think bleeping just bad-copy the report.

     

    Updated.

     

    Submission identified:

     

    Files Submitted

    #

    Filename

    MD5

    Determination

    Signature Protection Name

    RR Seq#

    1

    radD998D.tmp.zip

    0xF0950DA91831868C6F9A94A5BD70F61A

    Archive

    N/A

    N/A

    2

    radD998D.tmp.dll

    0x851CDCE29FC69522AB8EDB7A13000383

    NewThreat

    Ransom.CryptXXX

    180419

     

    Developer Notes:



    radD998D.tmp.zip is a container file e.g. archive, email

    radD998D.tmp.dll is a non-repairable threat.