Win32/Filecoder.LockedFile [Threat Name] go to Threat
Win32/Filecoder.LockedFile.I [Threat Variant Name]
Category | trojan |
Size | 1242112 B |
Aliases | Ransom:Win32/GandCrab!bit (Microsoft) |
Trojan.Encoder.26420 (Dr.Web) | |
W32/Ransom.ACK (F-Prot) |
Short description
Win32/Filecoder.LockedFile.I is a trojan that encrypts files on fixed and network drives. To decrypt files the user is requested to comply with given conditions in exchange for a password/instructions.
Installation
When executed, the trojan copies itself into the following location:
- %malwarefolder%\NW[%variable%].exe
A string with variable content is used instead of %variable% .
This copy of the trojan is then executed.
Payload information
Win32/Filecoder.LockedFile.I is a trojan that encrypts files on fixed and network drives.
The trojan searches for files with the following file extensions:
- *.7Z
- *.ACCDB
- *.BAK
- *.CDR
- *.CELL
- *.DB
- *.DB2
- *.DB3
- *.DBC
- *.DBF
- *.DBK
- *.DBS
- *.DBS
- *.DBX
- *.DOC
- *.DOCX
- *.DOT
- *.DOTX
- *.DT
- *.DWG
- *.EQL
- *.GZ
- *.HCDT
- *.HML
- *.HPT
- *.HSDT
- *.HWDT
- *.HWP
- *.HWPX
- *.HWT
- *.JPEG
- *.JPG
- *.LDF
- *.MDB
- *.MDF
- *.MYD
- *.NDF
- *.NDF
- *.NS2
- *.NS3
- *.NS4
- *.NSF
- *.NXL
- *.NXT
- *.ODS
- *.ODT
- *.PSD
- *.RAR
- *.SDF
- *.SHOW
- *.SQL
- *.SQLITE
- *.SQLITE3
- *.SQLITEDB
- *.TAR
- *.TIB
- *.VHD
- *.VPD
- *.XLS
- *.XLSX
- *.ZIP
It avoids files with the following extensions:
- *.BLF
- *.BMP
- *.DLL
- *.ICO
- *.LOG
- *.LOG1
- *.LOG2
- *.RBS
- *.RDP
- *.REGTRANS-MS
- *.RTF
- *.SEARCH-MS
- *.SEK
- *.SETTINGCONTENT-MS
- *.TMP
- *.VBS
- *.XML
It avoids files which contain any of the following strings in their path:
- (X86)\ACRONIS\
- (X86)\BACKUP MANAGER\
- (X86)\BACKUPCLIENT\
- (X86)\CARBONITE\
- (X86)\DROPBOX\
- (X86)\GOOGLE\DRIVE\
- (X86)\MICROSOFT ONEDRIVE\
- (X86)\ONEDRIVE\
- \$RECYCLE.BIN\
- \7-ZIP\
- \ASPNET_CLIENT\
- \AVAST
- \AVDEFENDER
- \AVG
- \BITDEFENDER
- \BOOT\
- \COMMON FILES\
- \DEFAULT USER\
- \DVD MAKER\
- \ESET
- \INTERNET EXPLORER\
- \KASPERSKY LAB
- \KASPERSKYLAB
- \MALWAREBYTES
- \MCAFEE
- \MICROSOFT OFFICE\
- \MICROSOFT SILVERLIGHT\
- \MICROSOFT\CRYPTO\
- \MICROSOFT\OFFICE\
- \MICROSOFT\PROVISIONING\
- \MSOCACHE\
- \PANDA SECURITY
- \PROGRAMDATA\MICROSOFT\
- \REFERENCE ASSEMBLIES\
- \SOPHOS
- \SYMANTEC ENDPOINT
- \TEMP\
- \TOR BROWSER\
- \TREND MICRO
- \WINDOWS DEFENDER\
- \WINDOWS MEDIA PLAYER\
- \WINDOWS NT\
- \WINDOWS SIDEBAR\
- \WINDOWS.OLD\
- \WINDOWS\
- \WINDOWS10UPGRADE\
- \WINDOWSAPPS\
- \WINDOWSPOWERSHELL\
- \WINRAR\
- FILES\ACRONIS\
- FILES\BACKUP MANAGER\
- FILES\BACKUPCLIENT\
- FILES\CARBONITE\
- FILES\DROPBOX\
- FILES\GOOGLE\DRIVE\
- FILES\MICROSOFT ONEDRIVE\
- FILES\ONEDRIVE\
The trojan encrypts the file content.
The RSA, ChaCha20 encryption algorithm is used.
The name of the encrypted file is changed to:
- [ransomriggs@qq.com].%randomstring1%-%randomstring2%.EMAN50
A string with variable content is used instead of %randomstring1-2% .
To decrypt files the user is requested to comply with given conditions in exchange for a password/instructions.
When searching the drives, the trojan creates the following file in every folder visited:
- #README_EMAN50#.rtf
It contains the following text:
Information stealing
Win32/Filecoder.LockedFile.I is a trojan that steals sensitive information.
The trojan collects the following information:
- malware version
- computer name
- user name
The trojan attempts to send gathered information to a remote machine.
The trojan contains a URL address. The HTTP protocol is used in the communication.
Other information
The trojan creates the following file:
- %userdata%\%variable%.bmp
A string with variable content is used instead of %variable% .
This file/image is set as a wallpaper.
The following Registry entries are set:
- [HKEY_CURRENT_USER\Control Panel\Desktop]
- "Wallpaper" = "%userdata%\%variable%.bmp"
- "WallpaperStyle" = 0
- "TileWallpaper" = 0
The trojan creates the following files:
- %malwarefolder%\ALL_dmp.fldp
- %malwarefolder%\log.txt
- %malwarefolder%\LFIN_%id%.txt
A string with variable content is used instead of %id% .