{"id":87853,"date":"2019-07-03T12:48:00","date_gmt":"2019-07-03T07:18:00","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=87853"},"modified":"2019-07-03T12:55:44","modified_gmt":"2019-07-03T07:25:44","slug":"ransomware-tool-lockergoga","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/ransomware-tool-lockergoga\/","title":{"rendered":"Ransomware As A Tool &#8211; LockerGoga"},"content":{"rendered":"<p>Ransomware authors keep experimenting with the development of payload in various dimensions. In the timeline of ransomware implementations, we have seen its evolution from a simple screen locker to multi-component model for file encryption, from novice approach to a sophisticated one. The Ransomware as a Tool has evolved in wild and one of them has been received in the Quick Heal lab. This sample is identified as <strong><em><b><i>LockerGoga<\/i><\/b><\/em><\/strong>\u00a0and it is unique as it acts as a tool giving various options for performing encryption.<\/p>\n<p>Like any standard command-line tool, LockerGoga Ransomware shows help information for reference. On execution with parameter -h, it shows options like \u201c-v\u201d for the print version of LockerGoga and \u201c-m\u201d [Email ID as an argument] parameter to specify email id of the attacker for payment, in case victim wants to decrypt encrypted files. The same email id is mentioned in ransom note to contact for price of decrypter.<\/p>\n<figure id=\"attachment_87854\" aria-describedby=\"caption-attachment-87854\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87854\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/07\/Fig1.png\" alt=\"\" width=\"800\" height=\"257\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig1.png 666w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig1-300x96.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig1-650x209.png 650w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption id=\"caption-attachment-87854\" class=\"wp-caption-text\">Fig. 1: Command Line Options<\/figcaption><\/figure>\n<p>LockerGoga uses Boost library for parsing command line arguments.<\/p>\n<figure id=\"attachment_87855\" aria-describedby=\"caption-attachment-87855\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87855\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/07\/Fig2.png\" alt=\"\" width=\"800\" height=\"217\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig2.png 1052w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig2-300x82.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig2-768x209.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig2-650x177.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig2-789x215.png 789w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption id=\"caption-attachment-87855\" class=\"wp-caption-text\">Fig. 2: Implemented in Boost Library<\/figcaption><\/figure>\n<p>Last option in the command line tool \u201c-p\u201d allows to select the process in which malicious code needs to inject; if process name is not provided, then by default it will inject code into \u201cwinlogon.exe\u201c.<\/p>\n<p>The received sample contains four executable components inside it, such as<\/p>\n<ol>\n<li>encrypt32.dll<\/li>\n<li>encrypt64.dll<\/li>\n<li>{random_name}.exe (32 bit)<\/li>\n<li>{random_name}.exe (64 bit)<\/li>\n<\/ol>\n<p>Upon execution, the malware drops dll component according to system architecture as mentioned above, at location %AppData%\/Local\/Temp<\/p>\n<p>Then it will inject the shell code and RSA Public Key of 1024 bit to the process \u201cwinlogon.exe\u201d or in the process specified as an argument. The injected shell code is used to load dropped encrypt**.dll with the help of ldrloaddll.<\/p>\n<p>The encrypt**.dll has an export function \u201cencryptStart\u201d. This function contains code used to enumerate all drives and folders to generate a list of files present in it. All files list is stored in file C:\\cl.log.<\/p>\n<figure id=\"attachment_87856\" aria-describedby=\"caption-attachment-87856\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87856\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/07\/Fig3.png\" alt=\"\" width=\"800\" height=\"145\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig3.png 1240w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig3-300x54.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig3-768x139.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig3-650x118.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig3-789x143.png 789w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption id=\"caption-attachment-87856\" class=\"wp-caption-text\">Fig. 3: Content of cl.log<\/figcaption><\/figure>\n<p>For every single file listed in C:\\cl.log, it drops an executable file with {random name}.exe in %AppData%\/Local\/Temp or C:\\Windows\\Temp depending upon 64 or 32 bit architecture of the system and invoke that {random_named}.exe in a loop with -k{public key} {file_path(i.e. file to be encryp)} as the command line argument.<\/p>\n<p>Unique thing about LockerGoga Ransomware is that for every single file, it creates a new process, encrypts that file and terminates that process. By this technique, it might evade anti-ransomware product.\u00a0While encryption happens, it consumes most of the CPU resources almost up to 90%.<\/p>\n<figure id=\"attachment_87857\" aria-describedby=\"caption-attachment-87857\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87857\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/07\/Fig4.png\" alt=\"\" width=\"800\" height=\"247\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig4.png 919w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig4-300x93.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig4-768x237.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig4-650x201.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig4-789x244.png 789w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption id=\"caption-attachment-87857\" class=\"wp-caption-text\">Fig. 4: Encryption of files listed in C:\\cl.log<\/figcaption><\/figure>\n<p>After finishing the encryption of each file, it writes file name in C:\\cl.log.<\/p>\n<p><strong><b>Encryption Process:<\/b><\/strong><\/p>\n<p>It uses two encryption algorithms, AES-128bit for file content encryption and RSA-1024 bit to encrypt AES key used for file content encryption.<\/p>\n<p><strong><b>Generation of AES Key:<\/b><\/strong><\/p>\n<p><strong><b>\u00a0<\/b><\/strong>Initially, it used \u201cCryptGenRandom\u201d API to generate the random seed of 32(20h) bytes. Then it used another 32(20h) byte from resource section to make a key stack of 40h byte, which was used for generating AES key.<\/p>\n<p>Along with Boost library, LockerGoga Implements Crypto++ Library for encryption process which makes reversing the sample very difficult.<\/p>\n<figure id=\"attachment_87858\" aria-describedby=\"caption-attachment-87858\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87858\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/07\/Fig5.png\" alt=\"\" width=\"800\" height=\"232\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig5.png 1528w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig5-300x87.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig5-768x223.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig5-650x188.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig5-789x229.png 789w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption id=\"caption-attachment-87858\" class=\"wp-caption-text\">Fig. 5: Random seed from Crypt Random<\/figcaption><\/figure>\n<figure id=\"attachment_87859\" aria-describedby=\"caption-attachment-87859\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87859\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/07\/Fig6.png\" alt=\"\" width=\"800\" height=\"335\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig6.png 1023w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig6-300x126.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig6-768x322.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig6-650x273.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig6-789x331.png 789w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption id=\"caption-attachment-87859\" class=\"wp-caption-text\">Fig. 6: Generation of AES Key<\/figcaption><\/figure>\n<p>Implementation of Crypto++ library enables AES new instruction set (AES-NI) which were introduced by Intel in 2009.<\/p>\n<p>AESKEYGENASSIST and AESENC instruction are used to implement AES encryption,<\/p>\n<p>AESKEYGENASSIST is used for round key expansion and AESENC is used to perform one round encryption of AES.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-87873 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/07\/Fig7-1.png\" alt=\"\" width=\"1053\" height=\"272\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig7-1.png 1053w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig7-1-300x77.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig7-1-768x198.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig7-1-650x168.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig7-1-789x204.png 789w\" sizes=\"(max-width: 1053px) 100vw, 1053px\" \/><\/p>\n<figure id=\"attachment_87861\" aria-describedby=\"caption-attachment-87861\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87861\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/07\/Fig7_1.png\" alt=\"\" width=\"800\" height=\"220\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig7_1.png 951w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig7_1-300x82.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig7_1-768x211.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig7_1-650x178.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig7_1-789x217.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig7_1-304x84.png 304w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption id=\"caption-attachment-87861\" class=\"wp-caption-text\">Fig 7: AES-NI instructions<\/figcaption><\/figure>\n<p>After all above operations, it generates 32-byte data from which 16 bytes are used as Key and other 16 bytes as an Initialization Vector (IV).<\/p>\n<figure id=\"attachment_87870\" aria-describedby=\"caption-attachment-87870\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87870\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/07\/Fig8-1.png\" alt=\"\" width=\"800\" height=\"243\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig8-1.png 729w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig8-1-300x91.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig8-1-650x197.png 650w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption id=\"caption-attachment-87870\" class=\"wp-caption-text\">Fig 8: AES Key and IV layout<\/figcaption><\/figure>\n<p>Malware changes file extension to .locked before encrypting it.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-87863\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/07\/Fig9.png\" alt=\"\" width=\"800\" height=\"247\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig9.png 1039w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig9-300x93.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig9-768x237.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig9-650x201.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig9-789x244.png 789w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-87864\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/07\/Fig9_1.png\" alt=\"\" width=\"800\" height=\"42\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig9_1.png 672w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig9_1-300x16.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig9_1-650x34.png 650w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<figure id=\"attachment_87865\" aria-describedby=\"caption-attachment-87865\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87865\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/07\/Fig9_2.png\" alt=\"\" width=\"800\" height=\"31\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig9_2.png 642w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig9_2-300x12.png 300w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption id=\"caption-attachment-87865\" class=\"wp-caption-text\">Fig. 9: File Rename to .locked<\/figcaption><\/figure>\n<p>The public key used in the encryption is in PEM format<\/p>\n<figure id=\"attachment_87866\" aria-describedby=\"caption-attachment-87866\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87866\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/07\/Fig10.png\" alt=\"\" width=\"800\" height=\"90\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig10.png 893w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig10-300x34.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig10-768x86.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig10-650x73.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig10-789x88.png 789w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption id=\"caption-attachment-87866\" class=\"wp-caption-text\">Fig. 10: Public key used in this variant<\/figcaption><\/figure>\n<p>Convert them into Microsoft Blob format shown below.<\/p>\n<figure id=\"attachment_87867\" aria-describedby=\"caption-attachment-87867\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87867\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/07\/Fig11.png\" alt=\"\" width=\"800\" height=\"151\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig11.png 873w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig11-300x57.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig11-768x145.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig11-650x123.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig11-789x149.png 789w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption id=\"caption-attachment-87867\" class=\"wp-caption-text\">Fig 11: Public key in MS BLOB Format<\/figcaption><\/figure>\n<figure id=\"attachment_87868\" aria-describedby=\"caption-attachment-87868\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87868\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/07\/Fig12.png\" alt=\"\" width=\"800\" height=\"219\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig12.png 989w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig12-300x82.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig12-768x210.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig12-650x178.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig12-789x216.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig12-304x84.png 304w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption id=\"caption-attachment-87868\" class=\"wp-caption-text\">Fig 12: AES Key and IV encrypted with RSA Public Key<\/figcaption><\/figure>\n<p>Along with Key (10h), IV (10h) and 8h bytes used as file size (i.e. file to be encrypted) are encrypted by RSA-1024 bit with \u2018MGF1 (SHA-1)\u2019 (i.e. mask generation function for the OAEP padding scheme) and appended to the end of the file.<\/p>\n<figure id=\"attachment_87869\" aria-describedby=\"caption-attachment-87869\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87869\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/07\/Fig13.png\" alt=\"\" width=\"800\" height=\"243\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig13.png 1553w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig13-300x91.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig13-768x233.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig13-650x198.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/07\/Fig13-789x240.png 789w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption id=\"caption-attachment-87869\" class=\"wp-caption-text\">Fig 13: File Content Encrypted with AES Key and IV<\/figcaption><\/figure>\n<p>After that it encrypts the file content with AES key and IV in CTR mode with a key length of 128 bits.<\/p>\n<p><strong><b>Conclusion:<\/b><\/strong><\/p>\n<p>LockerGoga has shown a unique and rare mechanism for encrypting files by creating one master and multiple slave process.<\/p>\n<p><strong><b>Key features:<\/b><\/strong><\/p>\n<p>Use Boost Library for handling complex mathematical computation.<\/p>\n<p>Instead of using Microsoft Crypto API for encryption, implemented the Crypto++ library (Boost Software License)<\/p>\n<p><strong><b>IoCs:<\/b><\/strong><\/p>\n<p>1E8A6AABF4ADF3AE1890A4C8A2CFF276 &#8211; LockerGoga<\/p>\n<p>91976DBD489FEAE2D8719545C8DE304A- encrypt32.dll<\/p>\n<p>174E3D9C7B0380DD7576187C715C4681-encrypt64.dll<\/p>\n<p>E9E6EBC6A0D5183FC8E66472B3419F1E-{random_name}.exe-64 bit<\/p>\n<p>A52F26575556D3C4ECCD3B51265CB4E6 &#8211; {random_name}.exe-32 bit<\/p>\n<p><strong><b>Subject Matter Expert:<\/b><\/strong><\/p>\n<p>Goutam Tripathy,\u00a0Rahul Sharma,\u00a0Manisha Prajapati\u00a0| Quick Heal Security Labs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware authors keep experimenting with the development of payload in various dimensions. In the timeline of ransomware implementations, we have seen its evolution from a simple screen locker to multi-component model for file encryption, from novice approach to a sophisticated one. The Ransomware as a Tool has evolved in wild and one of them has [&hellip;]<\/p>\n","protected":false},"author":51,"featured_media":87872,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1653,285,164,24,75,910,1210],"tags":[22,50,47],"class_list":["post-87853","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-antivirus","category-applications","category-cyber-crime","category-malware","category-microsoft-windows","category-ransomware","category-threat-report-2","tag-email-malware","tag-ransomware","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87853"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/51"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=87853"}],"version-history":[{"count":2,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87853\/revisions"}],"predecessor-version":[{"id":87874,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87853\/revisions\/87874"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/87872"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=87853"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=87853"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=87853"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}