Home / malware Ransom:Win32/Isda
First posted on 31 March 2015.
Source: MicrosoftAliases :
There are no other names known for Ransom:Win32/Isda.
Explanation :
Threat behavior
Installation
The threat copies itself to theso that it runs each time you start your PC:
\ .exe
It also drops an image file (.bmp) with a random file name containing instructions on how to restore your files. It drops the file in theso it will appear each time you start your PC:
\ .bmp
It also drops a copy of the image file into %APPDATA%\Roaming.
We have seen it use the following names for the image file:
- fud.bmp
- paycrypt.bmp
- strongcrypt.bmp
The image might look like the following:
It changes the desktop wallpaper to the image it dropped by changing the following registry entry:
In subkey: HKCU\Control Panel
Sets value: Desktop Wallpaper
With data: "%APPDATA%\Roaming\.bmp"
Payload
Encrypts your files
This ransomware searches for and encrypts files with the following extension on local and shared or network drives:
- .113
- .1cd
- .3gp
- .73b
- .7z
- .a3d
- .ab
- .abk
- .accdb
- .arj
- .as4
- .asm
- .asvx
- .ate
- .avi
- .bac
- .bak
- .bck
- .bkf
- .cdr
- .cer
- .cf
- .cpt
- .csv
- .db3
- .dbf
- .doc
- .docx
- .dt
- .dwg
- .erf
- .fbf
- .fbk
- .fbw
- .fbx
- .fdb
- .gbk
- .gho
- .gzip
- .iv2i
- .jpeg
- .jpg
- .key
- .keystore
- .ldf
- .m2v
- .m3d
- .max
- .mdb
- .mkv
- .mov
- .mpeg
- .nbd
- .nrw
- .nx1
- .odb
- .odc
- .odp
- .ods
- .odt
- .old
- .orf
- .p12
- .pef
- .ppsx
- .ppt
- .pptm
- .pptx
- .pst
- .ptx
- .pwm
- .pz3
- .qic
- .r3d
- .rar
- .raw
- .rtf
- .rwl
- .rx2
- .sbs
- .sldasm
- .sldprt
- .sn1
- .sna
- .spf
- .sr2
- .srf
- .srw
- .tbl
- .tib
- .tis
- .txt
- .wab
- .wps
- .x3f
- .xls
- .xlsb
- .xlsk
- .xlsm
- .xlsx
- .zip
It avoids encrypting files in folders that have the following strings:
- program files
- program files (x86)
- programdata
- system volume information
- temp
- windows
The threat changes the extension of the encrypted files in the format .id-<10 random numbers>_.
For example, we have seen the following:
- .id-<10 random numbers>_fud@india.com
- .id-<10 random numbers>_keybtc@foxmail2.com
- .id-<10 random numbers>_paybtc@india.com
- .id-<10 random numbers>_paycrypt@inbox.com
- .id-<10 random numbers>_sos@anointernet.com
- .id-<10 random numbers>_xsmail@india.com
It uses an AES encryption algorithm. The key is stored on the malware server that it connects to when it infects your PC.
Contacts remote host
It connects to a malware server and sends information such as:
- Computer name
- The 10 digit ID it adds to encrypted file extensions
- The appended extension name of the encrypted files
It will POST the above information to its server. We have seen the threat try to contact the following servers:
- http://euiloveyou.com/close/script.php
- http://hungariagogo.com/close/script.php
- http://muhojir.tj/script.php
- http://structretech.com/script.php
- http://valueseu.com/close/script.php
Analysis by Alden Pornasdoro
Symptoms
The following can indicate that you have this threat on your PC:
- You have these files:
- %APPDATA%\
.bmp \ .bmp
- Your files have extra information add the end, that look like the following:
- .id-<10 random numbers>_fud@india.com
- .id-<10 random numbers>_keybtc@foxmail2.com
- .id-<10 random numbers>_paybtc@india.com
- .id-<10 random numbers>_paycrypt@inbox.com
- .id-<10 random numbers>_sos@anointernet.com
- .id-<10 random numbers>_xsmail@india.com
- You see these entries or keys in your registry:
In subkey: HKCU\Control Panel
Sets value: Desktop Wallpaper
With data: "%APPDATA%\Roaming\.bmp"
- You see this message instead of your wallpaper, and whenever you start Windows:
Last update 31 March 2015