Home / malware Ransom:Win32/Haknata.A!rsm
First posted on 11 February 2017.
Source: MicrosoftAliases :
There are no other names known for Ransom:Win32/Haknata.A!rsm.
Explanation :
Installation
This ransomware gets installed through remote desktop hacking.
It uses the following names for its executable files:
- HKLM\Software\Microsoft\Windows\CurrentVersion\Run
"Timon and Pumbaa" = "%malware% supermetroidrules"
Payload
Encrypts your files
This ransomware searches all available drives and encrypts files but avoids anything with file name or file path matching the following substrings with wild cards:
*.bat
*.dll
*.exe
*.ini
*.lnk
*.msi
*.scf
*\AVAST Software\*
*\AVG\*
*\AVIRA\*
*\ESET\*
*\Internet Explorer\*
*\java\*
*\TeamViewer\*
*\windows\*
*\winrar\*
*AppData*
*Atheros*
*boot*
*bootmgr*
*chrome*
*CONFIG.SYS*
*firefox*
*HakunaMatata
*IO.SYS*
*MSDOS.SYS*
*NTDETECT.COM*
*ntldr*
*NTUSER.DAT*
*opera*
*pagefile.sys*
*Realtek*
*Recovers files yako.html
Stops running services
This ransomware disables and stops the following services:
- FirebirdServerDefaultInstance
- MSExchangeAB
- MSExchangeADTopology
- MSExchangeAntispamUpdate
- MSExchangeEdgeSync
- MSExchangeFBA
- MSExchangeFDS
- MSExchangeImap4
- MSExchangeIS
- MSExchangeMailboxAssistants
- MSExchangeMailboxReplication
- MSExchangeMailSubmission
- MSExchangeMonitoring
- MSExchangePop3
- MSExchangeProtectedServiceHost
- MSExchangeRepl
- MSExchangeRPC
- MSExchangeSA
- MSExchangeSearch
- MSExchangeServiceHost
- MSExchangeThrottling
- MSExchangeTransport
- MSExchangeTransportLogSearch
- MSSQL$SQLEXPRESS
- MSSQLSERVER
- postgresql-9.0
- wsbexchange
It also disables and stops services with captions matching the following regex:
- %BACKP%
- %Exchange%
- %Firebird%
- %MSSQL%
- %postgresql%
- %SBS%
- %SharePoint%
- %SQL%
- %tomcat%
- %wsbex%
It disables the shadow copy backup:
- cmd.exe /c vssadmin.exe Delete Shadows /All /Quiet
It stops processes with the following file names:
- fb_inet_server.exe
- pg_ctl.exe
- sqlservr.exe
It also clears event logs for the folders:
- Application
- security
- setup
- system
Asks for ransom
This threat also drops the following ransom note, Recovers files yako.html, in each folder along with the encrypted files:
SHA1s used in this analysis:
- 0124490eab9422889d0a464e5ecaac00c9ae15a4
- 0eafa185fb574198198558042158aed23797d30c
- 13a549b9b50304b1074eb983976d6e7c392c145b
- 21f94cc641fccc9c2281148064a586168a0a593b
- 2443dcf645c02ff0ca16d6f8c67333a37b31c845
- 37ca888138bb26cb67f23ab10fa9e6c5f870498f
- 6be941c53db47ee74855f97fee780d29b8a40180
- 79f44b49f1d64ff7efdd3f4a0814098a39629e0d
- 7bd78aafd11203af3479f84d736c2b76e00dd157
- 8e4add0fdd9c4656f754e929d61e96a10e9343b5
- 9fe2d70d90fa6b870dfd670bfd9f38829f5a93f5
- aaad8d98edee94f59416f35da3c7d323746fd13a
- ad6823809b08990591d87e21b9e7c5ea7624b8c5
- b98986e32f9deb19ff563b47d7e9c11917c8c06b
- c401afa876e88b29b5ea4280f1349816c79f0411
- d5e1e86e1561e14aa167c36f77fc9e5d6c6cbe2b
- e89df94c96edf5c210727d50ed4463059c5c195b
- f59f26cbed8abfc54985403a60f1d5925269b389
Analysis by Jireh SanicoLast update 11 February 2017