Analysis by: RonJay Kristoffer Caragay

ALIASES:

Ransom:Win32/FileCryptor (Microsoft); Trojan.Win32.Deshacop.ddy (Kaspersky); Trojan.Win32.Filecoder (Ikarus)

 PLATFORM:

Windows

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It deletes itself after execution.

  TECHNICAL DETAILS

Tamaño del archivo 1,748,992 bytes
Tipo de archivo EXE
Fecha de recepción de las muestras iniciales 16 Jan 2017

Arrival Details

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Other System Modifications

This Trojan adds the following registry entries:

HKEY_CLASSES_ROOT\.HakunaMatata
(Default) = "Crypted!"

HKEY_CLASSES_ROOT\.HakunaMatata\DefaultIcon
(Default) = "%System%\shell32.dll,47"

HKEY_CLASSES_ROOT\.HakunaMatata\shell\
open\command
(Default) = "cmd /s/c\"(ECHO {random note})|MSG *\""

Dropping Routine

This Trojan drops the following files:

  • {folders containing encrypted files}\Recovers files yako.html

Other Details

This Trojan renames encrypted files using the following names:

  • {original path and filename}.HakunaMatata

It deletes itself after execution.