Grinler wrote:Yes, thanks, I already tried it succesfully :)MAXS wrote:Anyone got this sample?I am pretty sure this CryptoLocker 2.0 posted above.
http://blog.trendmicro.com/trendlabs-se ... le-drives/
A forum for reverse engineering, OS internals and malware analysis
Grinler wrote:Yes, thanks, I already tried it succesfully :)MAXS wrote:Anyone got this sample?I am pretty sure this CryptoLocker 2.0 posted above.
http://blog.trendmicro.com/trendlabs-se ... le-drives/
string result;
try
{
string_2 = string_2.Trim();
if (string_2.ToLower().Trim().Contains("[end]"))
{
result = "finalized";
return result;
}
if (string_2.StartsWith("writeregistry"))
{
string[] string_3 = string_2.Split(new char[]
{
'|'
});
result = Conversions.ToString(this.method_14(string_3));
return result;
}
if (string_2.StartsWith("ddose"))
{
string[] string_4 = string_2.Split(new char[]
{
'|'
});
result = this.method_13(string_4);
return result;
}
if (string_2.StartsWith("download"))
{
string[] string_5 = string_2.Split(new char[]
{
'|'
});
result = this.method_12(string_5, false);
return result;
}
if (string_2.StartsWith("execute"))
{
string[] string_6 = string_2.Split(new char[]
{
'|'
});
result = this.method_11(string_6);
return result;
}
if (string_2.StartsWith("downloadandexecute"))
{
string[] string_7 = string_2.Split(new char[]
{
'|'
});
result = this.method_12(string_7, true);
return result;
}
if (string_2.StartsWith("disallowshutdown"))
{
string[] string_8 = string_2.Split(new char[]
{
'|'
});
result = this.method_10(string_8);
return result;
}
if (string_2.StartsWith("searchupload"))
{
string[] string_9 = string_2.Split(new char[]
{
'|'
});
result = this.method_9(string_9);
return result;
}
if (string_2.StartsWith("showmessage"))
{
string[] string_10 = string_2.Split(new char[]
{
'|'
});
result = this.method_8(string_10);
return result;
}
if (string_2.StartsWith("enablesockets"))
{
string[] string_11 = string_2.Split(new char[]
{
'|'
});
result = Conversions.ToString(this.method_7(string_11));
return result;
}
I have been attacked by a virus where all my excel, word, music files have been encrypted. My restore also sates that it has been unable to complete. When I first turned my computer on I received a message saying all my files were encrypted and sent to the police and that I would have to send £100 to get them unencrypted. I am not very computer literate so if there is a fix I would need to have clear simple detailed steps. I hope you can help as I desperately need a couple of my Excel files.
thisisu wrote:Can someone please take a look at this file and let me know what type of malware it came from?CryptoLocker. You can easily determine it yourself:
Fabian Wosar wrote:I wrote a small tool to scan for CryptoLocker files or determine if a specific file is encrypted by CryptoLocker based on the above check. I use it mostly to quickly determine if files that victims sent me are encrypted by CryptoLocker or not, as most users just send encrypted files and ask for help. If there is any interest in it, I can share it with you guys.I'm interested. Thank you for reviewing the file. :)
AliveNoMore wrote:I still can't run CryptoLocker. I've created a special VM for malware without additions, renamed devices and registry keys. What am I doing wrong? How are guys testing it?CryptoLocker is not VM aware. Most likely your infection has a hard time finding a valid C2 server as the vast majority of domains generated by the DGA are sinkholed. Just run a sniffer on the host and check if excessive DNS traffic is taking place. If it is, the malware desperately tries to find a C2 server.
Fabian Wosar wrote:Hm, thought it would actually be VM aware. Anyway, I suppose the only thing I can do to test it is to just let it run and hope it would manage to find a C2 server that isn't sinkholed, which could take a quite while?AliveNoMore wrote:I still can't run CryptoLocker. I've created a special VM for malware without additions, renamed devices and registry keys. What am I doing wrong? How are guys testing it?CryptoLocker is not VM aware. Most likely your infection has a hard time finding a valid C2 server as the vast majority of domains generated by the DGA are sinkholed. Just run a sniffer on the host and check if excessive DNS traffic is taking place. If it is, the malware desperately tries to find a C2 server.
tjcoder wrote:Just thought I'd add this for completeness: http://www.zdnet.com/cryptolockers-crim ... 000024579/When Crilock infects a computer it generates a new bitcoin address. Only in the beginning were they using static addresses.
They are using only 3 bitcoin addresses since the first infection, literally every bitcoin transaction is publicly logged by multiple parties this includes ones to exchanges and every single one leaving these 3 addresses, yet they've cashed out literally tens of millions of USD and nobody knows who they are or even where on earth they are located.. Someone is extremely lazy or hiding something and it's not the authors of this malware..