Rewterz Threat Alert – New VCrypt Ransomware Locks Files in Password-Protected 7ZIPs
May 7, 2020Rewterz Threat Advisory – CVE-2020-10732 – Linux Kernel information disclosure Vulnerability
May 8, 2020Rewterz Threat Alert – New VCrypt Ransomware Locks Files in Password-Protected 7ZIPs
May 7, 2020Rewterz Threat Advisory – CVE-2020-10732 – Linux Kernel information disclosure Vulnerability
May 8, 2020Severity
High
Analysis Summary
ProLock actors encrypt the files on the victim’s network using RSA-2048 algorithm. After encrypting a victim’s files, ProLock actors leave a .txt extension file as a ransom note on the victim computer. The ransom note instructs the victims to visit a TOR page and log in using a unique ID included in the ransom note. The TOR page then displays the ransom price and wallet address for the ransom payment. The ransom note indicates the decryption keys will be stored for one month. The ProLock actors provide an email address victims can use to contact the ProLock actors if the victim cannot connect to the TOR page. |
Impact
File encryption |
Indicators of Compromise
MD5
c579341f86f7e962719c7113943bb6e4
7f5e4679edcfae6068ffa2051c4010fa
SHA-256
a6ded68af5a6e5cc8c1adee029347ec72da3b10a439d98f79f4b15801abd7af0
8ef5c9aed65c4561a0e30f9b579cd96c6b97b385b9f1d57d6dab5a9f2bcf9e6f
SHA1
e2a961c9a78d4c8bf118a0387dc15c564efc8fe9
dd7af4dfd19a62982a0d5de8b35e331a481a6aad
Remediation
Block all threat indicators at your respective controls. Always be suspicious about emails sent by unknown senders. Never click on the links/attachments sent by unknown senders |