• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – New VCrypt Ransomware Locks Files in Password-Protected 7ZIPs
May 7, 2020
Rewterz Threat Advisory – CVE-2020-10732 – Linux Kernel information disclosure Vulnerability
May 8, 2020

Rewterz Threat Alert – ProLock RansomWare – IOCs

May 7, 2020

Severity

High

Analysis Summary

ProLock actors encrypt the files on the victim’s network using RSA-2048 algorithm. After encrypting a victim’s files, ProLock actors leave a .txt extension file as a ransom note on the victim computer. The ransom note instructs the victims to visit a TOR page and log in using a unique ID included in the ransom note. The TOR page then displays the ransom price and wallet address for the ransom payment. The ransom note indicates the decryption keys will be stored for one month. The ProLock actors provide an email address victims can use to contact the ProLock actors if the victim cannot connect to the TOR page.

Impact

File encryption

Indicators of Compromise

MD5

c579341f86f7e962719c7113943bb6e4
7f5e4679edcfae6068ffa2051c4010fa

SHA-256

a6ded68af5a6e5cc8c1adee029347ec72da3b10a439d98f79f4b15801abd7af0
8ef5c9aed65c4561a0e30f9b579cd96c6b97b385b9f1d57d6dab5a9f2bcf9e6f

SHA1

e2a961c9a78d4c8bf118a0387dc15c564efc8fe9
dd7af4dfd19a62982a0d5de8b35e331a481a6aad

Remediation

Block all threat indicators at your respective controls.
Always be suspicious about emails sent by unknown senders.
Never click on the  links/attachments sent by unknown senders
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.