Home / malware Win32/Troldesh
First posted on 14 July 2016.
Source: MicrosoftAliases :
There are no other names known for Win32/Troldesh.
Explanation :
Installation
The threat creates the following files:
- %APPDATA%\windows\crsrss.exe - copy of the malware
- %ProgramData%\drivers\crsrss.exe - copy of the malware
- %TEMP%\state.tmp - temporary file used for the encryption
It changes the following registry entry so that it runs each time you start your PC:
In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "Client Server Runtime Subsystem" or "CSRSS"
With data: ""
It also modifies the following registry entry - possibly as a way of storing configuration data the ransomware uses during encryption:
In subkey: HKLM\Software\System\Config
Sets value: "i"
With data: "", for example "f70cf3801cb6f9da2858"
Payload
Encrypts your files
This threat encrypts files on your PC that have the following extensions.
- 1cd
- 3ds
- 3fr
- 3g2
- 3gp
- 7z
- accda
- accdb
- accdc
- accde
- accdt
- accdw
- adb
- adp
- ai
- ai3
- ai4
- ai5
- ai6
- ai7
- ai8
- anim
- arw
- as
- asa
- asc
- ascx
- asm
- asmx
- asp
- aspx
- asr
- asx
- avi
- avs
- backup
- bak
- bay
- bd
- bin
- bmp
- bz2
- c
- cbf
- cdr
- cer
- cf
- cfc
- cfm
- cfml
- cfu
- chm
- cin
- class
- clx
- config
- cpp
- cr2
- crt
- crw
- crypted
- cs
- css
- csv
- cub
- dae
- dat
- db
- dbf
- dbx
- dc3
- dcm
- dcr
- der
- dib
- dic
- dif
- divx
- djvu
- dmp
- dng
- doc
- docm
- docx
- dot
- dotm
- dotx
- dpx
- dqy
- dsn
- dt
- dtd
- dwg
- dwt
- dx
- dxf
- edml
- efd
- elf
- emf
- eml
- emz
- epf
- eps
- epsf
- epsp
- erf
- exr
- f4v
- fbk
- fdb
- fido
- fld
- flm
- flv
- frm
- fxg
- geo
- gif
- grs
- gz
- h
- hdr
- hpp
- hta
- htc
- htm
- html
- icb
- ics
- iff
- inc
- indd
- ini
- iqy
- j2c
- j2k
- java
- jp2
- jpc
- jpe
- jpeg
- jpf
- jpg
- jpx
- js
- jsf
- json
- jsp
- kdc
- kmz
- kwm
- lasso
- lbi
- lgf
- lgp
- log
- lst
- m1v
- m4a
- m4v
- max
- md
- mda
- mdb
- mde
- mdf
- mdw
- mef
- mft
- mfw
- mht
- mhtml
- mka
- mkidx
- mkv
- mos
- mov
- mp3
- mp4
- mpeg
- mpg
- mpv
- mrw
- msg
- mtr
- mxl
- myd
- myi
- nef
- nrw
- obj
- odb
- odc
- odm
- odp
- ods
- oft
- one
- onepkg
- onetoc2
- opt
- oqy
- orf
- p12
- p7b
- p7c
- pam
- pbm
- pct
- pcx
- pdd
- pdp
- pef
- pem
- pff
- pfm
- pfx
- pgm
- php
- php3
- php4
- php5
- phtml
- pict
- pl
- pls
- pm
- png
- pnm
- pot
- potm
- potx
- ppa
- ppam
- ppm
- pps
- ppsm
- ppt
- pptm
- pptx
- prn
- ps
- psb
- psd
- pst
- ptx
- pub
- pwm
- pxr
- py
- qt
- r3d
- raf
- rar
- raw
- rdf
- rgbe
- rle
- rqy
- rss
- rtf
- rw2
- rwl
- safe
- sct
- sdpx
- shtm
- shtml
- slk
- sln
- sql
- sr2
- srf
- srw
- ssi
- st
- stm
- svg
- svgz
- swf
- tab
- tar
- tbb
- tbi
- tbk
- tdi
- tga
- thmx
- tib
- tif
- tiff
- tld
- torrent
- tpl
- txt
- u3d
- udl
- uxdc
- vault
- vb
- vbk
- vbm
- vbs
- vcs
- vda
- vdr
- vdw
- vdx
- vhd
- vib
- vrp
- vsd
- vss
- vst
- vsw
- vsx
- vtm
- vtml
- vtx
- wav
- wb2
- wbm
- wbmp
- wim
- wmf
- wml
- wmv
- wpd
- wps
- x3f
- xl
- xla
- xlam
- xlk
- xlm
- xls
- xlsb
- xlsm
- xlsx
- xlt
- xltm
- xltx
- xlw
- xml
- xps
- xsd
- xsf
- xsl
- xslt
- xsn
- xtp
- xtp2
- xyze
- xz
- zip
The encrypted files will have their extension changed to one of the following:
- .da_vinci_code
- .magic_software_syndicate
In earlier versions, from April 2015 to June 2016, we have seen this ransomware rename the encrypted file in the format=.xbtl, for example DWoqBAnMDpI9ij0IjGn1uaRpz-jzei37J5dFIrnROGE=.xtbl.
After it encrypts your files, the threat drops a ransom note in each folder where it encrypted files. The note has the file name in the format README.txt (for example, README8.txt) and looks like the following:
In July 2016 we've seen a newer version that sends victims to a Tor website for the recovery code and ransom payment process. Note, however, that during analysis the website was blocked or not responding, as showing the following screenshot:
It also displays a wallpaper that looks like the following (in some cases the message was garbled or included unidentifiable characters and symbols):
We've also seen the threat connect to the following remote servers on ports 443 and 80 to send information about your PC to a remote attacker:
- 131.188.40.189
- 194.109.206.212
- 208.83.223.34
- 86.59.21.38
It also connects to the legitiate website http://whatismyipaddress.com to determine the IP of the infected PC.
Analysis by Marianne Mallen and Patrick EstavilloLast update 14 July 2016