Home / malware Ransom:Win32/Genasom.BQ
First posted on 24 May 2014.
Source: MicrosoftAliases :
There are no other names known for Ransom:Win32/Genasom.BQ.
Explanation :
Threat behaviorTrojan:Win32/Ransom.BQ is a trojan that encrypts data files on the local drive. The trojan displays a message requesting a sum of money in exchange for decryption of the files.
Installation
This trojan may be installed when visiting a compromised website via a PDF exploit that allows the download and execution of arbitrary code. When the trojan runs, it creates a text file on the Windows desktop named "how to decrypt files.txt". The trojan then executes its file encryption payload.
Payload
Encrypts files using a random key
The trojan searches for data files having the following file extensions:For each file found, the trojan encrypts the file using a random cipher key. Displays "ransom note"The trojan displays a message using Notepad that requests money in exchange for decrypting files. The text file content are as follows: Attention!!!
- .jpg, .jpeg - JPEG picture file
- .psd - Adobe Photoshop document
- .cdr - CorelDRAW Image file
- .dwg - AutoCAD Drawing Database file
- .max - 3D modeling scene file
- .mov - movie file
- .m2v - MPEG-2 movie file
- .3gp - 3G (mobile device) audio/video file
- .doc, .docx - document file
- .xls, .xlsx - spreadsheet file
- .ppt, .pptx - Microsoft PowerPoint slideshow
- .rar, .zip - archive container file
- .mdb - Microsoft Access database
- .mp3 - audio file
- .cer - Internet Security Certificate file
- .p12 - Personal Information Exchange/SSL certificate file
- .pfx - Personal Information Exchange/PKCS certificate file
- .kwm, .pwm - WebMoney secret key file, personal key file
- .txt - text file
- .pdf - Portable document format file (commonly Adobe document file)
- .avi - audio/video file
- .flv - flash video file
- .lnk - link/shortcut file
- .bmp - Bitmap image file
- .1cd - CD image file
- .md - compressed file archive
- .mdf - ISO CD image file
- .dbf - dBase database
- .odt - Open Document text file
- .vob - DVD video object file
- .ifo - DVD video disc information file
- .mpeg, .mpg - MPEG video file
All your personal files (photo, documents, texts, databases, certificates, kwm-files, video) have been encrypted by a very strong cypher RSA-1024. The original files are deleted. You can check this by yourself - just look for files in all folders.
There is no possibility to decrypt these files without a special decrypt program! Nobody can help you - even don't try to find another method or tell anybody. Also after n days all encrypted files will be completely deleted and you will have no chance to get it back.
We can help to solve this task for 120$ via wire transfer (bank transfer SWIFT/IBAN). And remember: any harmful or bad words to our side will be a reason for ingoring your message and nothing will be done.
For details you have to send your request on this e-mail (attach to message a full serial key shown below in this 'how to..' file on desktop): datafinder @ fastmail.fm The trojan also creates a Bitmap image in the Temporary files folder (%TEMP%\.bmp) and displays the image:
Analysis by Tim Liu & Shawn WangSymptoms
System changes
The following system changes may indicate the presence of this malware:
- The modification of common data files having any of the following file extensions:
.jpg, .jpeg, .psd, .cdr, .dwg, .max, .mov, .m2v, .3gp, .doc, .docx, .xls, .xlsx, .ppt, .pptx, .rar, .zip, .mdb, .mp3, .cer, .p12, .pfx, .kwm, .pwm, .txt, .pdf, .avi, .flv, .lnk, .bmp, .1cd, .md, .mdf, .dbf, .mdb, .odt, .vob, .ifo, .mpeg, .mpg, .doc, .docx, .xls, .xlsx- The display of the following message requesting for money in exchange for a decryption key:
Last update 24 May 2014