{"id":84610,"date":"2017-08-01T16:42:23","date_gmt":"2017-08-01T11:12:23","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=84610"},"modified":"2017-08-01T16:42:23","modified_gmt":"2017-08-01T11:12:23","slug":"cryptomix-ransomware-resurfaces-multiple-variants","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/cryptomix-ransomware-resurfaces-multiple-variants\/","title":{"rendered":"Cryptomix Ransomware resurfaces with multiple variants"},"content":{"rendered":"<p>Cryptomix Ransomware has been active for the last one year and has come up with multiple variants. It spreads via exploit kits, malicious attachments, and malicious links spread across the Internet on hacked domains.<\/p>\n<p>Cryptomix Ransomware does not change the desktop background but encrypts files stored on the infected system while appending a suffix as an extension. The variants of this malware append different extensions to the encrypted files as mentioned in the chart below (fig 1). Earlier this month, a new variant of the ransomware was observed adding the .AZER extension to the encrypted files. This variant works without any network communication and is completely offline. Also, recently we came across a new version called the &#8220;Exte&#8221; Ransomware. Zayka and Noob are the most recent versions of the CryptoMix family and these version drop the ransom note whose name is similar to that dropped by an older version of Exte but bearing different content. Also, it uses the same email ID for payment information.<\/p>\n<p>When files present on the infected system are encrypted, the ransomware payload drops a ransom note with a different name where previous variants were observed to be using names such as #_RESTORING_FILES_#.TXT, RESTORING FILES #.HTML, RESTORING FILES #.TXT, _HELP_INSTRUCTION.TXT.<\/p>\n<p>To decrypt the files, victims are asked to write to email IDs given in the ransom note and provide their email ID in order to receive instructions on how to pay the ransom.<\/p>\n<p>The chart below lists information related to the malicious process responsible for encryption, extensions added, dropped ransomware note, and associated emails used by the Cryptomix Ransomware variants.<\/p>\n<table width=\"704\">\n<tbody>\n<tr>\n<td width=\"81\"><strong>Ransomware<br \/>\nVariant\u00a0 Name<\/strong><\/td>\n<td width=\"168\"><strong>Responsible process<br \/>\nfor Encryption<\/strong><\/td>\n<td width=\"143\"><strong>Extension Appended <\/strong><\/td>\n<td width=\"161\"><strong>Ransom Note Name<\/strong><\/td>\n<td width=\"151\"><strong>Associated Email<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"81\">Code<\/td>\n<td width=\"168\">%appdata%\\AdobeFlash<br \/>\nPlayer_&lt;Machine_ID&gt;.exe<\/td>\n<td width=\"143\">.id_&lt;Machine_Id&gt;_email<br \/>\n_xoomx@dr.com_.code<\/td>\n<td width=\"161\">HELP_YOUR_FILES.HTML<br \/>\nHELP_YOUR_FILES.TXT<\/td>\n<td width=\"151\">ADMIN@HOIST.DESI<br \/>\nSHIELD0@USA.COM<\/td>\n<\/tr>\n<tr>\n<td width=\"81\">Wallet<\/td>\n<td width=\"168\">Downloaded Dropped Payload<\/td>\n<td width=\"143\">.[Attackers email id].<br \/>\nID[Machines 16 CHAR<br \/>\n_ID].WALLET<\/td>\n<td width=\"161\">\u201c#_RESTORING_FILES_#.TXT<\/td>\n<td width=\"151\">xoomx@dr.com<br \/>\nxoomx@usa.com<\/td>\n<\/tr>\n<tr>\n<td width=\"81\">CryptoShield<br \/>\n1.0<\/td>\n<td width=\"168\">Downloaded Dropped Payload<\/td>\n<td width=\"143\">.CRYPTOSHIELD<\/td>\n<td width=\"161\"># RESTORING FILES #.HTML<br \/>\n# RESTORING FILES #.TXT<\/td>\n<td width=\"151\">restoring_sup@india<br \/>\n.com;restoring_sup@<br \/>\ncomputer4u.com;restoring<br \/>\n_reserve@india.com<\/td>\n<\/tr>\n<tr>\n<td width=\"81\">Revenge<\/td>\n<td width=\"168\">Downloaded Dropped Payload<\/td>\n<td width=\"143\">\u00a0.REVENGE<\/td>\n<td width=\"161\"># !!!HELP_FILE!!! #.txt<\/td>\n<td width=\"151\">rev00@india.com<br \/>\nrevenge00@writeme.com<br \/>\nrev_reserv@india.com<\/td>\n<\/tr>\n<tr>\n<td width=\"81\">Mole02<\/td>\n<td width=\"168\">%appdata%\\1DDA7A65.exe<\/td>\n<td width=\"143\">.MOLE02<\/td>\n<td width=\"161\">_HELP_INSTRUCTION.TXT<\/td>\n<td width=\"151\">NA<\/td>\n<\/tr>\n<tr>\n<td width=\"81\">Azer<\/td>\n<td width=\"168\">%appdata%\\BC1DDA7A65.exe<\/td>\n<td width=\"143\">&#8220;-email-[webmafia@<br \/>\nasia.com].AZER&#8221;<\/td>\n<td width=\"161\">INTERESTING_INFORMACION<br \/>\n_FOR_DECRYPT.TXT<\/td>\n<td width=\"151\">webmafia@asia.com<br \/>\ndonald@trampo.info<\/td>\n<\/tr>\n<tr>\n<td width=\"81\">Exte<\/td>\n<td width=\"168\">%appdata%\\BC1DDA7A65.exe<\/td>\n<td width=\"143\">.EXTE<\/td>\n<td width=\"161\">_HELP_INSTRUCTION.TXT<\/td>\n<td width=\"151\">exte1@msgden.net<br \/>\nexte2@protonmail.com<br \/>\nexte3@reddithub.com<\/td>\n<\/tr>\n<tr>\n<td width=\"81\">Zayka &amp; Noob<\/td>\n<td width=\"168\">%appdata%\\BC1DDA7A65.exe<\/td>\n<td width=\"143\">Either .ZAYKA or .NOOB<\/td>\n<td width=\"161\">_HELP_INSTRUCTION.TXT<\/td>\n<td width=\"151\">admin@zayka.pro<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Fig 1<\/p>\n<p><strong>Quick Heal Detection<\/strong><\/p>\n<p>Quick Heal detects the Cryptomix ransomware sample and its dropped components with proactive as well behavior-based detection as shown below.<\/p>\n<figure id=\"attachment_84611\" aria-describedby=\"caption-attachment-84611\" style=\"width: 295px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-84611 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/08\/Cryptomix-1.png\" alt=\"Fig 2\" width=\"295\" height=\"158\" \/><figcaption id=\"caption-attachment-84611\" class=\"wp-caption-text\">Fig 2. Quick Heal Virus Protection<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_84612\" aria-describedby=\"caption-attachment-84612\" style=\"width: 453px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-84612 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/08\/Cryptomix-2.png\" alt=\"Fig 3\" width=\"453\" height=\"258\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/08\/Cryptomix-2.png 453w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/08\/Cryptomix-2-300x171.png 300w\" sizes=\"(max-width: 453px) 100vw, 453px\" \/><figcaption id=\"caption-attachment-84612\" class=\"wp-caption-text\">Fig 3. Quick Heal Behavior-based Detection<\/figcaption><\/figure>\n<p><strong>Steps to stay away from ransomware:<\/strong><\/p>\n<ol>\n<li>Take regular backups of your important data.<\/li>\n<li>Use an <a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-total-security\" target=\"_blank\">antivirus software<\/a> that can block infected websites and emails. Always keep the software up-to-date.<\/li>\n<li>Apply all recommended security updates and patches for your Operating System, and commonly targeted applications like Adobe, Microsoft Office, Java, and web browsers.<\/li>\n<li>Do not respond to emails coming from unknown, unwanted or unexpected sources that urge you to click on links or download attachments, no matter how urgent such emails might sound.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><strong>ACKNOWLEDGMENT<\/strong><\/p>\n<p>&#8211; Subject Matter Expert<\/p>\n<ul>\n<li>Anita Ladkat | Quick Heal Security Labs<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptomix Ransomware has been active for the last one year and has come up with multiple variants. It spreads via exploit kits, malicious attachments, and malicious links spread across the Internet on hacked domains. Cryptomix Ransomware does not change the desktop background but encrypts files stored on the infected system while appending a suffix as [&hellip;]<\/p>\n","protected":false},"author":29,"featured_media":84613,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[910,5],"tags":[1480],"class_list":["post-84610","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","category-security","tag-cryptomix-ransomware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/84610"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=84610"}],"version-history":[{"count":1,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/84610\/revisions"}],"predecessor-version":[{"id":84614,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/84610\/revisions\/84614"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/84613"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=84610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=84610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=84610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}