Analysis by: Joshua Paul Ignacio

 ALIASES:

N/A

 PLATFORM:

Linux

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Ransomware

  • Destructiveness: No

  • Encrypted: No

  • In the wild: Yes

  OVERVIEW

Canal de infecção: Downloaded from the Internet

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.

  TECHNICAL DETAILS

Tipo de compactação: 150,808 bytes
Tipo de arquivo: ELF
Residente na memória: No
Data de recebimento das amostras iniciais: 14 Feb 2021
Carga útil: Encrypts files, Displays message/message boxes

Arrival Details

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Installation

This Ransomware drops the following files:

  • /{Malware Path}/lambda.log → logs list of files to be encrypted and if encryption is successful.

Other Details

This Ransomware does the following:

  • It requires the following parameters to perform its intended routine:
    • {Malware Filename} {File Path to start encryption}

Ransomware Routine

This Ransomware appends the following extension to the file name of the encrypted files:

  • .crypted

It drops the following file(s) as ransom note:

  • /{Encrypted Directory}/{Filename of Encrypted File}.crypted.README_TO_RESTORE

It avoids encrypting files with the following file extensions:

  • .crypted
  • .a
  • .so
  • .la
  • .o

  SOLUTION

Mecanismo de varredura mínima: 9.800
Primeiro arquivo padrão VSAPI: 16.538.02
Data do lançamento do primeiro padrão VSAPI: 14 Feb 2021
VSAPI OPR Pattern Version: 16.539.00
VSAPI OPR Pattern veröffentlicht am: 15 Feb 2021

Scan your computer with your Trend Micro product to delete files detected as Ransom.Linux.CRYPTED.A. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:


Did this description help? Tell us how we did.