{"id":86754,"date":"2018-09-03T17:22:13","date_gmt":"2018-09-03T11:52:13","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=86754"},"modified":"2018-09-05T14:37:21","modified_gmt":"2018-09-05T09:07:21","slug":"troldeshs-one-variant-encryption-offender","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/troldeshs-one-variant-encryption-offender\/","title":{"rendered":"\u201cTroldesh&#8217;s\u201d One More Variant in the Encryption\u00a0Offender"},"content":{"rendered":"<p>Over the past few days, we have been observing criminals\/hackers using a new carrier to deliver the ransomware malware. Recently, Quick Heal Security Labs observed a new variant of Troldesh ransomware which encrypts the data and adds\u00a0the extension as <strong><b>\u201c.no_more_ransom\u201d<\/b><\/strong>. This ransomware comes under Crypto-Ransomware variant, the origin of this is said to be from Russia and from there it is spread all over the world. There are various names for this ransomware they are Troldesh, aka Encoder.858 or Shade.<\/p>\n<p><strong><b>Infection Vector<\/b><\/strong><\/p>\n<p>It has been observed that this ransomware is spread basically through<\/p>\n<ol>\n<li>RDP Brute-force Attack<\/li>\n<li>Spam and phishing emails<\/li>\n<li>Exploit Kits<\/li>\n<\/ol>\n<p>In RDP Brute-force Attack, the Remote Desktop Protocol (RDP) running on port 3389\u00a0is targeted with a typical brute force attack. As a result the attacker gets hold of victim\u2019s administrative user credentials and then it executes the ransomware payload on the victim\u2019s system to infect the data.<\/p>\n<p>In spam or phishing emails, users receive emails which will lead to phishing sites that will download a macro based word document\/js file or malicious payload directly. Another way is directly attaching a document inside the email or sometimes attaching a compressed file having a malicious payload file.<\/p>\n<p><strong><b>Payload Analysis<\/b><\/strong><\/p>\n<p>When the malicious file gets executed it drops the copy of itself at the below location \u201c AppData\\Roaming\\ \u201c. Once it drops its copy it deletes the actual payload from where it has been executed and then executes the payload from Appdata location.<\/p>\n<p>The actual payload contains\u00a0the below command which is used to create the self copy at Appdata location,when malicious payload is executed it launches the schtasks.exe(Schedule Tasks) with the below command which creates a task named as Encrypter :<\/p>\n<p><strong><em><b><i>&#8220;C:\\Windows\\System32\\schtasks.exe&#8221; \/Create \/SC MINUTE \/TN Encrypter \/TR <\/i><\/b><\/em><\/strong> <strong><em><b><i>C:\\Users\\user_name\\AppData\\Roaming\\info.exe<\/i><\/b><\/em><\/strong><\/p>\n<p>Where,<\/p>\n<p>\/SC MINUTE : Specifies the schedule type.<\/p>\n<p>\/TN ENCRYPTER : Specifies a name for the task.<\/p>\n<p>\/tr C:\\Users\\XXXX\\AppData\\Roaming\\info.exe : Specifies the program or command that the task runs.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-86763\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/09\/Process-execution-1-300x22.png\" alt=\"\" width=\"668\" height=\"50\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/Process-execution-1-300x22.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/Process-execution-1-768x57.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/Process-execution-1-650x49.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/Process-execution-1-789x59.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/Process-execution-1.png 815w\" sizes=\"(max-width: 668px) 100vw, 668px\" \/>Fig 1 : Process Execution<\/p>\n<p>The payload has been scheduled\u00a0to run after every 1 min, it has a wait time of 1 hour and execution time limit of 72 hours.\u00a0Once the ransomware payload gets executed it then encrypts the file and adds\u00a0the extension as <strong><b>\u201c .no_more_ransom\u201d<\/b><\/strong>.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-86775 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/09\/task-650x101.png\" alt=\"\" width=\"650\" height=\"101\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/task-650x101.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/task-300x46.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/task.png 717w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/>Fig 2: Created Task<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-86779 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/09\/task-details-650x54.png\" alt=\"\" width=\"650\" height=\"54\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/task-details-650x54.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/task-details-300x25.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/task-details.png 699w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/>Fig 3: Task Details<\/p>\n<p>During our analysis we have also found that the malicious payload also contains the Anti-debugging identifier which detects whether the calling process is being debugged by a user-mode debugger or not. Below image represents\u00a0the example of the same,\u00a0when the payload is executed and if any debugger is in running state then it gives\u00a0the below prompt\/error message.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-86783 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/09\/debugger.png\" alt=\"\" width=\"407\" height=\"160\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/debugger.png 407w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/debugger-300x118.png 300w\" sizes=\"(max-width: 407px) 100vw, 407px\" \/>Fig 5: Debugger Prompt\/Error Message<\/p>\n<p><strong><b>Encryption Note<\/b><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-86785 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/09\/encryption.png\" alt=\"\" width=\"512\" height=\"259\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/encryption.png 512w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/encryption-300x152.png 300w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/p>\n<p><strong><b>Quick Heal Detection<\/b><\/strong><\/p>\n<p>Quick Heal Virus Protection successfully detects and deletes malicious payload.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-86787\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/09\/vp-300x157.png\" alt=\"\" width=\"300\" height=\"157\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/vp-300x157.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/vp.png 359w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Fig 6: Virus Protection<\/p>\n<p>Behaviors detection module of Quick\u00a0Heal also detects the malicious payload by its behavior and successfully blocks\/quarantines\u00a0the malicious payload.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86810\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/09\/bdsone.png\" alt=\"\" width=\"296\" height=\"159\" \/><\/p>\n<p style=\"text-align: center\">Fig 7: Behavior Detection<\/p>\n<p>Anti-ransomware feature of Quick\u00a0Heal detects\u00a0the malicious payload.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-86790 size-medium\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/09\/arw-300x175.png\" alt=\"\" width=\"300\" height=\"175\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/arw-300x175.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/arw-768x449.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/arw-650x380.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/arw-789x461.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/09\/arw.png 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Fig 8: Anti-Ransomware Detection.<\/p>\n<p><strong><b>Best practices to stay safe from such malware attacks<\/b><\/strong><\/p>\n<ul>\n<li>Do not download attachments or click on links received from unwanted or untrusted email sources.<\/li>\n<li>Always turn on email protection of your antivirus software.<\/li>\n<li>Don\u2019t enable \u2018macros\u2019 or \u2018editing mode\u2019 upon execution of the document.<\/li>\n<li>Keep your <a href=\"https:\/\/bit.ly\/2ncPU26\"><u>antivirus\u00a0<\/u><\/a>updated and ensure you are using the latest version.<\/li>\n<li>Always keep a secure backup of your important data.<\/li>\n<li>Apply all recommended updates on your Operating System and programs like Adobe, Java, Internet browsers, etc.<\/li>\n<li>Ensure that your computer\u2019s Automatic Updates are enabled.<\/li>\n<\/ul>\n<p>We strongly advise our users to protect themselves by applying the below-mentioned firewall policies in Quick Heal firewall feature.<\/p>\n<ul>\n<li>Deny access to Public IPs to important ports (in this case RDP port 3389)<\/li>\n<li>Allow access to only IPs which are under your control.<\/li>\n<li>Along with blocking RDP port, we also suggest blocking SMB port 445. In general, it\u2019s advised to block unused ports.<\/li>\n<\/ul>\n<p>Get more such safety measures <a href=\"https:\/\/blogs.quickheal.com\/ransomware-alert-follow-steps-secure-system-ongoing-ransomware-attack\/\"><u>here<\/u><\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><b>Subject Matter Expert: \u00a0\u00a0\u00a0<\/b><\/strong><strong><b>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/b><\/strong><\/p>\n<p>Gulamgaus Shaikh, Ganesh Vetal, Mahendra KR \u00a0 | Quick Heal Security Labs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the past few days, we have been observing criminals\/hackers using a new carrier to deliver the ransomware malware. Recently, Quick Heal Security Labs observed a new variant of Troldesh ransomware which encrypts the data and adds\u00a0the extension as \u201c.no_more_ransom\u201d. This ransomware comes under Crypto-Ransomware variant, the origin of this is said to be from [&hellip;]<\/p>\n","protected":false},"author":50,"featured_media":86804,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[164,289,133,129,24,910,1],"tags":[],"class_list":["post-86754","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-crime","category-cyber-safety","category-hacker","category-hacktivism","category-malware","category-ransomware","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86754"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=86754"}],"version-history":[{"count":20,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86754\/revisions"}],"predecessor-version":[{"id":86805,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86754\/revisions\/86805"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/86804"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=86754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=86754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=86754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}