Home / malware Ransom:JS/CryptoRaa.A
First posted on 06 July 2016.
Source: MicrosoftAliases :
There are no other names known for Ransom:JS/CryptoRaa.A.
Explanation :
Installation
This threat can drop and open the following fake error notice in the %desktop% directory:
It drops the following files in the %documents% directory:
- Doc_attached_
: the ransom message - St.exe
It drops a ransom note (!!!README!!!.rtf) in the %desktop% directory.
It modifies the following registry keys:
- In subkey: HKCU\Administrator\Software\Microsoft\Windows\CurrentVersion\run
Sets value:
With data:- In subkey: HKCU\RAA\Raa-fnl\
Sets value: < >
With data: < >
Payload
Encrypts your files
This ransomware can search for files in all of the folders with the following extensions and then encrypt them:
- .cd
- .cdr
- .csv
- .dbf
- .doc
- .dwg
- .jpg
- .lcd
- .locked
- .mdb
- .png
- .psd
- .rar
- .rtf
- .xls
- .zip
Connects to a remote host
This threat does not require an internet connection to encrypt files.
The malware doesn't encrypt files in the following directories:
- Program Files
- Program Files (x86)
- Windows
- Recycle.Bin
- Recycler
- AppData
- Temp
- ProgramData
- Microsoft
Analysis by: Carmen LiangLast update 06 July 2016