CryptoDefense and How Decrypt ransomware information guide and FAQ

From Botnets.fr
Revision as of 23:14, 27 March 2016 by Eric.freyssinet (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

(Publication) Link to the old Wiki page : [1] / Google search: [2]

CryptoDefense and How Decrypt ransomware information guide and FAQ
Botnet CryptoDefense, How_Decrypt
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2014 / 2014-03-19
Editor/Conference Bleeping Computer
Link http://www.bleepingcomputer.com/virus-removal/cryptodefense-ransomware-information (Archive copy)
Author Lawrence Abrams
Type Blogpost

Abstract

CryptoDefense is a ransomware program that was released around the end of February 2014 that targets all versions of Windows including Windows XP, Windows Vista, Windows 7, and Windows 8. When a computer is infected, the infection will perform the following actions:
  • Connects to the Command and Control server and uploads your private key.
  • Deletes all Shadow Volume Copies so that you cannot restore your files form the Shadow Volumes. This means you will only be able to restore your files by restoring from backup or paying the ransom. In some cases the infection does not properly clear the shadow copies, so you may want to use the instructions below to see if you can restore from them.
  • Scan your computer and encrypt data files such as text files, image files, video files, and office documents.
  • Create a screenshot of your active Windows screen and upload it their Command & Control server. This screen shot will be inserted in your payment page on their Decrypt Service site, which is explained further in this FAQ.
  • Creates a How_Decrypt.txt and How_Decrypt.html file in every folder that a file was encrypted. The HTML and TXT files will contain instructions on how to access a payment site that can be used to send in the ransom.
  • Creates a HKCU\Software\<unique ID>\ registry key and stores various configuration information in it. It will also list all the encrypted files under the HKCU\Software\<unique ID>\PROTECTED key.

Bibtex

 @misc{Abrams2014BFR16,
   editor = {Bleeping Computer},
   author = {Lawrence Abrams},
   title = {CryptoDefense and How Decrypt ransomware information guide and FAQ},
   date = {19},
   month = Mar,
   year = {2014},
   howpublished = {\url{http://www.bleepingcomputer.com/virus-removal/cryptodefense-ransomware-information}},
 }