Win32/Filecoder.Rapid [Threat Name] go to Threat
Win32/Filecoder.Rapid.A [Threat Variant Name]
Category | trojan |
Size | 920576 B |
Aliases | Trojan.Win32.Agentb.iwqd (Kaspersky) |
Short description
Win32/Filecoder.Rapid.A is a trojan that encrypts files on local drives. To restore files to their original state the user is requested to send an e-mail to a specified address in exchange for a password/instructions.
Installation
When executed, the trojan copies itself into the following location:
- %appdata%\info.exe
In order to be executed on every system start, the trojan sets the following Registry entry:
- [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
- "Encrypter" = "%appdata%\info.exe"
The following file is dropped:
- %appdata%\recovery.txt
The following Registry entry is set:
- [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
- "userinfo" = "%appdata%\recovery.txt"
Payload information
Win32/Filecoder.Rapid.A is a trojan that encrypts files on local drives.
The trojan searches for files with the following file extensions:
- *.*
It avoids files which contain any of the following strings in their path:
- $*
- intel
- nvidia
- ProgramData
- temp
- Windows
It avoids files with the following filenames:
- How Recovery Files.txt
- info.exe
- recovery.txt
The trojan encrypts the file content.
The RSA, AES encryption algorithm is used.
The extension of the encrypted files is changed to:
- %filepath%.rapid
The following file is dropped in the same folder:
- How Recovery Files.txt
It contains the following text:
To restore files to their original state the user is requested to send an e-mail to a specified address in exchange for a password/instructions.
Other information
The trojan executes the following commands:
- cmd.exe /c vssadmin.exe Delete Shadows /All /Quiet
- cmd.exe /c bcdedit.exe /set {default} recoveryenabled No
- cmd.exe /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
The trojan keeps various information in the following Registry keys:
- [HKEY_CURRENT_USER\Software\EncryptKeys]
- "local_enc_private_key_len"
- "local_enc_private_key"
- "local_public_key_len"
- "local_public_key"
The trojan executes the following command:
- %appdata%\recovery.txt
The trojan opens the file using the default associated application.
It contains the following text: