Name .CryptoHasYou. 7ev3n Alpha Alpha Ransom Ransomwar ware e AutoLocy !an"archor !itCryptor !ooyah !ra,ilian !rLoc !rowloc !uci !uy/nlocCo"e Cerer Chimera Chinese Ransom Coinault Coverton Cryai Cryola Cryptear Crypt;%leCrypt%n+inite Crypto&e+ense CryptoHost Crypto?oer Cryp Crypto toLo Loc cer er Crypto)ix Crypto8orLocer-4B Crypto8orLocer-4B CryptoDall Crypt Crypt -.4 C8!#Locer C8!#Locer DE! &eCrypt Protect &)ALocer &)ALocer 3.4 E&AE&A- Hi"" Hi""en en8 8ear ear El#Polocer Eni=ma ;aen
Extensions .enc .RBA .RIA .encr .e ncrypt ypt .locy
Extension Pattern
Comment
.i"#$%&'($E)A%L(A&&RE**' .cl+ EE was replace" to neutrali,e !ase" on Ethreat &A-
.loc
no local encryptionG rowser onlychan=eG no no +ile name 0.12.enco"e".0$A#4#5' extension &oes not "elete *ha"ow Copies
.cerer .crypt .txt .cl+ .coverton .eni=ma .6CRYP8EN&!LAC9&C:
.scl .crin+
i"$(%&'email(xerx
s victim>s +iles
.cr@oer .enc .encry rypt pte" e" no lon= lon=er er rele releva vant nt .co"e .i"(0%&()ACH%NE2(email(xoomx<"r.com(.co"e .Crypto8 .Crypto8orLocer-4B orLocer-4B 0ran"om2 .crypt Locs screen. Ransom note names are an %& .ctl .0$a#,'6FG7:2 wesites only .html no extension chan=e no extension chan=e .loc .loce e" " Jpen source" CKG H8 has PRN exploit .ha3 .eni=ma .loce" !ase" on Hi""en 8ear
;ury omasom opher Harasom Hi !u""y Hy"raCrypt iLoc iLocLi=ht ?i=saw ?o Crypter ?oCrypter 9eRan=er 9ey!8C 9EYHol"er 9imcilDare 9ryptoLocer LeChi++re Linux.Enco"er Locer Locy Lorto LowLevel4I )aouia )a=ic )atuLocer )ireDare )) Locer )oe+ NanoLocer Nemuco"
J++line ransomware J) Ransomware Jpera Jperatio tion n loal loal %%% PCloc Petya PowerDare Raa* Ra"amant
.crypt .html .cry
((($E)A%LA&&RE**'(.crypt J* ransomware 0PoC2 !ase" on Hi""en8ear hy"racrypt(%&($Mw'6: Cryp!oss ;amily
.crime .crime .tc . .loce" .loce" .encrypte" .eytc
!ase" on Hi""en8earG ut uses 8riple&E*G "ecrypter J* Ransomware
.imcilware .loce"
wesites only !ase" on Hi""en8ear
.LeChi++re Linux Ransomware no extension chan=e .locy .crime oor.
0$A#;4#5'63-:2.locy Prepen"s +ilenames J* ransomware 0PoC2 !ase" on E&A-
.ma=ic $a#,'6IGF: .+uce"
!ase" on Hi""en8ear !ase" on E&A-
.9EY .9EYH4LE*
no extension chan=e 7,ip 0a4.exe2 variant cannot e "ecrypte"
.crypte"
.c+ .LJL .J) .EE .E E
email#$params'.c+
CryptoLocer Copycat encrypts "is partitions Jpen#source" Power*hell Ransomware as a *ervice .R&) .RR9
Rahni Rannoh Ransom3Rector Remin")e R o u *amas#*amsam *anction *craper *i"Locer Pompous *port *trictor *urprise *ynoLocer 8eslaCrypt 4.x # -.-.4 8eslaCrypt 3.4Q 8eslaCrypt I.A 8eslaCrypt I.8orrentLocer 8rol"esh 8rueCrypter /mreCrypt aultCrypt irus#Enco"er orist R8N la"er Russian
.loce" .raen .vscrypt ..in+ecte" remin" .rou .encrypte"AE* .encrypte"R*A .sanction .loce" .sport .loce" .surprise .vvv .ecc .micro .xxx .Encrypte" .etter(call(saul ..xtl enc
.co"ersu<=mail(com(i"$4#5'6-G3: .crypt
.vault ..xort Cry*i* .EnCiPhErE" .73i7A .xrtn .vault
aultCrypt +amily aultCrypt +amily
Encryption Al=orithm Also nown as AE*0-BF2 7ev3n#HJNES8 AE*0-BF2 AlphaLocer AE*0-BF2
AE*0-BF2 AE* J*8 AE*
AE*0-BF2
AE*0-BF2 R*A
AE*0-BF2 0RAR implementation2
R*A0-4I2 AE*0-BF2 AE*0-BF2 AE*0-BF2 AE*0-BF2 AE* 0-2
&ecryptor %n+o *creenshots httpTwww.nyxo KNA)E httpsT=ithu.co httpTwww.nyxo KNA)E httpT"ownloa".httpTwww.leepi httpT"ownloa". httpTwww.leepi KNA)E httpsT"ecrypter.emsiso+t.comauto KNA)E Rahni httpsTreaUta.co KNA)E httpsTnoransom.aspersy.com KNA)E *alam KNA)E httpTwww.nyxohttpTwww.nyxo httpTwww.nyxo httpTwww.nyxo httpsTwww.proo KNA)E KNA)E httpTresearchce KNA)E KNA)E httpsTlo=.malw KNA)E httpsTlo=.malw KNA)E 9inCrypt httpTwww.nyxone.commalware httpsTnoransom.aspersy.com KNA)E httpTwww.leepi KNA)E httpsTsupport.aspersy.comvirus KNA)E httpsTsupport.aspersy.comvirus KNA)E Hi""en 8ear httpTwww.utusen.comlo="eali KNA)E httpsTwww.proo KNA)E httpsT"ecrypter.emsiso+t.com KNA)E httpsT"ecrypter.emsiso+t.com KNA)E )anamecryptG httpTwww.leepin=computer.com KNA)E 8elo=raphG RJ% KNA)E httpsTwww.+iree httpsTreaUt httpsTreaUta.co a.co KNA)E eta httpTwww.nyxohttpTwww.nyxo httpTwww.nyxo httpTwww.nyxo httpTwww.leepin=computer.com KNA)E KNA)E CryptPro@ect httpsTsupport.aspersy.comvirus KNA)E CryptPro@ect httpsTwww.proo KNA)E KNA)E httpsTthisissecur KNA)E httpTwww.malwareremoval=ui"es.i KNA)E httpsTlo=.malw httpsTlo=.mal w KNA)E httpsT"ecrypter. httpsTlo=.malw KNA)E Cryptear KNA)E Los Pollos Hermanos KNA)E httpTwww.leepi KNA)E httpsTlo=.+ortin KNA)E
httpsTsupport.aspersy.comvirus httpsT"ecrypter.emsiso+t.com
AE*0-BF2
AE*0-BF2 8riple&E* 8riple&E* AE*
AE* AE*0-BF2 Linux.Enco"er.64G3: AE*0-2
AE*0-BF2 AE*0-BF2 AE*0-BF2 AE*0-BF2
!ooyah Yaes
JR0-BB2 7,ip
ipasana PCo"e JR )o"i+ie" *alsa-4 *arento AE*0-BF2
KNA)E KNA)E KNA)E httpsT"ecrypter.emsiso+t.com KNA)E httpTwww.nyxo KNA)E httpsT"ecrypter. httpTwww.mal httpTwww.malw w KNA)E KNA)E KNA)E httpTwww.leepihttpsTwww.help httpTwww.leepi httpsTwww.help KNA)E httpTwww.nyxo KNA)E httpT+orum.male KNA)E httpTnews."rwehttpTwww.welive httpTnews."rwe httpTwww.welive KNA)E httpsT"ecrypter.emsiso+t.com KNA)E httpTwww.leepin=computer.com httpsTlo=.+ortin httpTwww.leepi httpTwww. leepi KNA)E KNA)E httpsT"ecrypter. httpsTlo=.mal httpsTlo=.malw w KNA)E httpsTlas.it"e+en"er.com-4B KNA)E httpTwww.leepin=computer.com KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E httpsTlo=.malw KNA)E KNA)E httpsTwww.proo KNA)E httpTnyxone.co httpTnyxone.co httpT=ithu.comCyercluesnanol KNA)E KNA) E httpsT"ecrypter.emsiso+t.com KNA)E httpsT=ithu.comAnteloxNemuco
httpTartla,e.l httpTnews.thewin"owsclu.comop httpsT"ecrypter.emsiso+t.com httpTwww.thewi httpsTlo=.malw httpsTlo=.mal w
KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E httpTwww.nyxone.commalware httpsT"ecrypter. httpTwww.l httpTwww.leepi KNA)E
A=ent.iih Aura
Curve25519 + ChaCha
AE*0-BF2 Q R*A0-45F2 samsam.exe AE*0-BF2 Q R*A0-45F2 )%9JPJN%.exe AE*0-BF2 AE*0-BF2 AE*0-BF2 AlphaCrypt AE*0-BF2 Q ECH& Q *HA AE*0-BF2 Q ECH& Q *HA AE*0-BF2 AE*0-BF2 AE* uses =p=.exe AE*0-BF2
R*A
Crypt4L4cer Crypto;ortress *ha"e 8!L Crypault la"er
aultCrypt Crypault
httpsTsupport.aspersy.comusvi KNA)E httpsTsupport.aspersy.comvir httpsTsuppor t.aspersy.comviruses"isin+ectio uses"isin+ectionB nB httpsTwww.=oo=l httpsTsupport.aspersy.comvir httpsTsuppor t.aspersy.comviruses"isin+ectio uses"isin+ectionInIhttpTi.im=ur.com httpsTlo=.malw KNA)E httpTlo=.talosin KNA)E KNA)E httpTsecurelist.comlo=research KNA)E httpTwww.leepihttpTwww.nyxo httpTwww.leepi httpTwww.nyxo KNA)E KNA)E httpTwww.nyxo KNA)E KNA)E KNA)E httpTwww.leepin=computer.com KNA)E KNA)E httpsTwww.en"= KNA)E httpTwww.leepi KNA)E httpTwww.leepin=computer.com KNA)E httpTwww.nyxo KNA)E httpTwww.leepihttpTwww.leep httpTwww.leepi httpTwww.leep httpTwww.thewin"owsclu.come KNA)E httpTwww.nyxo KNA)E httpTwww.nyxo KNA)E httpsTsupport.aspersy.comvirus KNA)E KNA)E httpTwww.nyxo KNA)E
ne.comima=esarticulosmalwarer ne.comima=esart iculosmalwarera,ilianRansom4.pn= a,ilianRansom4.pn=
hineseRansom.html
ne.comima=esarticulosmalwarecryp ne.comima=esart iculosmalwarecryptomixr-.pn= tomixr-.pn=
orumstBB5IF3eyhol"er#ransomware orumstBB5IF3eyhol"er #ransomware#support#an" #support#an"#help#topic# #help#topic#how#"ecrypt=i how#"ecrypt=i+how#"ecrypt +how#"ecrypthtml html
ima=esarticulosmalwaremoe+4.pn=
aa*.html
7 e."esearchtmVischWUVRansomwareQRansom3I =FiB*N.@p=
tatic.comima=esnewsransomware tatic.comima=esne wsransomwarettruecrypte ttruecryptertruecrypt rtruecrypter.pn= er.pn=
Propose" Name Remin")e Don"e Don"erCr rCrypt ypter er ort eta PLA/E7 DHA8 %* *X
Extensions .remin" .h3ll .h3ll .crypttt .loc .neitrino .xcrypt .xort
.PLA/E7
Extension Pattern
PoC "ecrypt(your(+iles.html *ECRE8%*H%&%NHERE%N*% &E.9EYG A88EN8%JN.88G REA&(%8.88 ) E**AE.88
xort.txt .i"(1(email(,eta<"r.com HELP(YJ/R(;%LE*.H8)L ;%LE*(!AC9.88 PLA/E7.txt 4252016XYLITOL.KEY66
sU( 0prepen"s +ile2
.loce"
DHA8 %* *X(.txt PLEA*E REA&.txt %(A.txt /NLJC9(;%LE*(%N*8R/C8% JN*.txt
Comment *tatus httpTwww.leepin=computer.coHuntin= +or sample *u *umitt mitte e" to %&R Nee" Nee" ana analyse lyse" " 07+ 07+7F" 7F""BBI BBIBa BaF F++4I 4I e"5 "53eBe 3eBe-I I+ + *umitte" to %&R Nee"s i"enti+ie" *umitte" to %&R Nee"s i"enti+ie" *umitte" to %&RG ransom emailT Nee"s i"enti+ie" "anny.walswen
-+43F"3cFaFcc+""aF47BcFF"2
Name .Crypt rypto oHasY HasYo ou. 7ev3n AutoLocy !an"archor !itCryptor !ooyah !ra,ilian !rowloc !uy/n uy/nlo loccCo" Co"e e Cerer Chimera Coinault Coverton Cryai Cryola Cryptear Crypt%n+inite Crypto&e+ense CryptoHost Crypto?oer CryptoLocer Crypto8orLocer-4B CryptoDall Crypt C8!#Locer C8!#Locer DE! &eCrypt Protect &)ALocer &)AL &)ALoc oce err 3.4 3.4 E&AE&A- Hi"" Hi""en en8 8ear ear El#P El#Po olol loloce ocerr ;ury omasom opher Harasom Hi !u""y Hy"raCrypt iLoc iLocLi=ht ?i=saw
)icroso+t &etection Name 8ro@anT @anTDi Din3 n3- -& &ynam yname erac ac RansomTDin3-Empercrypt.A
)icroso+t %n+o httpsTwww.microso+ httpsTwww.microso+
Din3-Criit
httpsTwww.microso+
RansomT?*!rolo Rans Ransom omTT Din3 in3-C -Cen"o en"o" "e.A e.A Din3-Cerer Din3-Chicrypt RansomT )*%Laultloc.A
www.microso+t.coms httpsTwww.microso+ httpsTwww.microso+ httpsTwww.microso+ httpsTwww.microso+
RansomT Din3-Crowti
httpsTwww.microso+
RansomT Din3-Crowti Din3-;ortrypt
httpsTwww.microso+
RansomT Din3-Cr Criloc.A
httpsTwww.microso+
RansomT Din3-Crowti Din3-;ortrypt
httpsTwww.microso+
RansomT )*%L[email protected]
httpsTwww.microso+
RansomT Din3-&)ALocer Rans Ransom omTT Din3 in3-& -&)ALo )ALoc ce er.A r.A Rans Ransom omTT )*%L )*%LR Ry, y,er erlo lo Rans Ransom omTT Powe wer* r*he helllPo lPolo loc c.A .A
httpsTwww.microso+ httpsTwww.microso+ httpsTwww.microso+ httpsTwww.microso+
8ro@anT Din3-Harasom.A
httpsTwww.microso+
RansomT Din3-8o+y.
httpsTwww.microso+
RansomT)*%L?i=sawLocer.A RansomT)*%L?i=sawLoce r.A
httpsTwww.microso+
?o Crypter ?oCrypter 9eRan=er 9ey!8C 9EYHol"er 9imcilDare 9ryptoLocer LeChi++re Linux.Enco"er Locer Locy Lorto LowLevel4I )aouia )a=ic )atuLocer )oe+ NanoLocer Nemuco" J++line ransomware J) Ransomware Jperation loal %%% PCloc Petya Raa* Raa* Ra"amant Rannoh Rannoh Remin")e Rector Remin")e Rou *amas#*amsam *anction *craper *i"Locer Pompous *port *trictor *urprise *ynoLocer
RansomT )acJ*(9eRan=er.A RansomT Din3-%s"a RansomT !A8iow
httpsTwww.microso+ httpsTwww.microso+
RansomT Din3-Locy 8ro@an&ownloa"erT ?*Locy
httpsTwww.microso+
Din3-8aaum
httpsTwww.microso+
?*Nemuco"
httpsTwww.microso+
Din3-8escrypt
httpsTwww.microso+
8eslaCrypt 3.4Q 8eslaCrypt I.A 8eslaCrypt I.8orrentLocer 8rueCrypter /mreCrypt aultCrypt irus#Enco"er orist R8N Alpha Ransomware 4
RansomT Din3-8eerac Din3-;ortrypt D in3-8rol"esh
httpsTwww.microso+ httpsTwww.microso+
RansomT !A8iow
httpsTwww.microso+
*an"ox %JCs httpsTwww.hyri"#a httpsTwww.hyri"#a httpsTwww.hyri"#a httpsTwww.hyri"#a httpsTwww.hyri"#a
ecurityportalthreat .comsecurityportal httpsTwww.hyri"#a httpsTwww.hyri"#a httpsTwww.hyri"#a
.comsecurityportal httpsTwww.hyri"#a
httpsTwww.hyri"#a .comsecurityportal httpsTwww.hyri"#a
httpsTwww.hyri"#a .comsecurityportal httpsTwww.hyri"#a .comsecurityportal
.comsecurityportal httpsTwww.hyri"#a
httpsTwww.hyri"#a
*nort KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E
.comsecurityportal .comsecurityportal
.comsecurityportal
.comsecurityportal
.comsecurityportal
KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E httpsTotx.alienvault.comrowseUVRannoh
httpsTwww.hyri"#a
KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E
.comsecurityportal .comsecurityportal .comsecurityportal
KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E KNA)E
)easure 8ype !acup an" Restore Recovery Process !loc )acros PJ &isale D*H PJ ;ilter Attachments )ail ateway Level Attachments ;ilter )ail ateway Level - pro=ram Restrict PJ execution *how ;ile /ser Extensions Assistence En+orce /AC Prompt PJ
&escription )ae sure to have a"eUuate acup processes on place an" +reUuently test ainrestore these acups +rom the %nternet. &isale macros J++ice o+ +iles "ownloa"e" 8his e &isacan le D incon+i=ure" "ows *criptto Howor st in two "i++erent mo"esT ;ilter the +ollowin= attachments on your mail =atewayT .exeG .atG .psG .@sG .@seG .scrG .comG .vG .vsG .veG ;ilter the +ollowin= attachments on.ocxG your.@arG mail =atewayT 0;ilter Level plus2executions ."ocG .xlsG .rt+ !loc all pro=ram +rom the ZLocalApp&ataZ an" ZApp&ataZ +ol"er *et the re=istry ey [Hi"e;ileExt[ to 4 in or"er to show all +ile extensionsG even o+ ive nown +ile 8his avoi"in= En+orce a"ministrative a"ministrat users totypes. con+irm anhelps action that reUuires elevate" ri=hts Remove A"min !est Practice Remove an" restrict a"ministrative ri=hts whenever possile. Privile=e" )alware canDin"ows only mo"i+y +iles to that users worstation have write access to. Restrict Dorstation !est Practice Activate the ;irewall restrict to Communication worstation communication *an"oxin= Email A"vance" /sin= san"ox that opens email attachments an" removes %nput )alware analysis Execution 3r" Party 8ools attachments *o+tware thatase" allowson toehavior control the execution o+ processes # Prevention sometimes inte=rate" in Antivirus so+tware
;ootnotes Comple Complexit xityy E++ect E++ective ivenes nesss %mpa %mpact ct
8he comple complexit xityy o+ implem implement entati ation on also also inclu" inclu"es es the costs costs o+ implem implement entati ation on 0 &o not overr overrate ate a >hi=h >hi=h>> in this this column column as it is a relati relative ve e++ect e++ective ivenes nesss in compa compa 8he 8he e++e e++ect ctss on usi usine ness ss proc proces esse sesG sG a"mi a"mini nist stra rati tion on or user user expe experi rien ence ce
Comple Com plexit xity1 y1 E++e E++ecti ctiven veness ess1 1 %mp %mpact act1 1 Medium
High
Low
Low
High
Low
Low
Medium
Medium
Low
Medium
Low
Low
High
High
Medium
Medium
Medium
Low
Low
Low
Low
Medium
Low
Medium
Medium
Medium
Medium
Low
Low
Medium
High
-
Medium
Medium
-
.=. simple to implement ut costly2 rison to other measures
Possi Pos sile le %ss %ssues ues
A"ministrative A"ministrative !* scripts on Dorstations J++ice Communication with ol" versions o+ )icroso+t J++ice +iles s De eme""e" so+tware installers installer a"ministrator a"ministrator resentment Hi=her a"ministrative a"ministrative costs
Lin Lin httpTwin"ows.microso+t.come httpTwin"ows. microso+t.comen#uswin"owsac#up n#uswin"owsac#up#restore#+aU #restore#+aUK8CVwin" K8CVwin"ows#7 ows#7 httpsTwww.I4Itechsup httpsTsuppor httpsTsupport.o++ice.co t.o++ice.comen#usarticleEna men#usarticleEnale#or#"isale le#or#"isale#macros#in#J++ic #macros#in#J++ic httpTwww.win"owsnetworin=.c httpTwww.win" owsnetworin=.comaseDin"ows8ip omaseDin"ows8ipsDin"owsPA" sDin"owsPA"min8ipsCustomi,atio min8ipsCustomi,ation&is n&is
httpTwww.+at"ex.netp httpsTcommunity httpsTcommunity.spicewors.co .spicewors.comtopic35F43#crypt mtopic35F43#cryptolocer#preve olocer#prevention# ntion# httpTwww.seven+orums.comtuto httpTwww.seve n+orums.comtutorials4B74#+ile#ext rials4B74#+ile#extensions#hi"e#show ensions#hi"e#show.html .html httpsTtechnet.microso+t.co httpsTtechnet. microso+t.comen#uslirary men#uslirary""3BBFI0D*.42.asp ""3BBFI0D*.42.aspxx
#+iles#-43F+"#"I4#Ie7I#IBe#F+e"a7eBcFuiVen#/*WrsVen #+iles#-43F+"#"I4#Ie7I#IBe#F+e" a7eBcFuiVen#/*WrsVen#/*Wa"V/* #/*Wa"V/* aleDin"ows*criptin=HostD*H.html
it#up"ate"
*ourceT httpsTwww.en"=ame.comlo=your#paca=e#has#een#success+ully#encrypte"#teslacrypt#Ia#an"#ma
*ourceT *ymantecG iaT
Composition
8his initial list has een compose" y )osh
Jther Contriutors
;lorian Roth
*upport
%+ you are a security researcher an" want to support usG please contact me on 8witter an" %>ll =rant you write httpsTi"#ransomware.malwarehunterteam.com httpsTartla,e.lo=spot.com httpTwww.maleal.com httpTwww.leepin=computer.com httpsTlo=.malwareytes.or= httpTwww.nyxone.com httpTwww.tripwire.comstate#o+#securitysecurity#"ata#pr httpTwww.thewin"owsclu.comlist#ransomware#"ecrypt
*ources
photo
%"enti+y ransomware y ransom note or encrypte" +ile sample
tectionransomware#happy#en"in=#4#nown#"ecryption#cases r#tools