Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

After a brief hiatus malware developers release CryptoWall 3.0


  • Please log in to reply
274 replies to this topic

#46 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  •  Avatar image
  • Admin
  • 45,363 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:03:06 AM

Posted 03 February 2015 - 11:28 AM

Should not be any autostarts

BC AdBot (Login to Remove)

 


#47 White Hat Mike

White Hat Mike

  •  Avatar image
  • Members
  • 312 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:::1
  • Local time:04:06 AM

Posted 03 February 2015 - 11:45 AM

Should not be any autostarts

 

Autostart entries have been removed, as has the file dropped within the Startup folder.

 

However, some odd things...  the CryptoWall 3.0 executable that resides on the machine, while it could be spoofed, has a Created and Access timestamp of "1/22/15 1:48pm".  There are several ransom notes that were dropped on 1/17/2015.  However, the registry key that is added by CryptoWall 3.0, containing ransom note text as well as the list of encrypted files were last modified on 1:48pm and 9:14pm respectively, both on 1/22/15.

 

The path of the executable with, what appears to be the CryptoWall 3.0 payload, is consistent with other CryptoWall infections...  C:\<random>\<random>.exe

 

Grinler, have you received a submission of a CryptoWall 3.0 binary yet?  If not, would you like me to submit it for review?

 

EDIT: I can also provide the sandbox analysis reports (WildFire, Joe Sandbox) if needed.


Edited by White Hat Mike, 03 February 2015 - 11:46 AM.

Information Security Engineer | Penetration Tester | Forensic Analyst

CipherTechs.com


#48 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  •  Avatar image
  • Admin
  • 45,363 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:03:06 AM

Posted 03 February 2015 - 11:51 AM

That's alright. Thanks for the offer.

Have a ton of em :) I used one when I wrote this article :)

#49 White Hat Mike

White Hat Mike

  •  Avatar image
  • Members
  • 312 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:::1
  • Local time:04:06 AM

Posted 03 February 2015 - 11:53 AM

That's alright. Thanks for the offer.

Have a ton of em :) I used one when I wrote this article :)

 

Alright, no worries.  Wasn't sure if there were many 3.0 binaries submitted yet.

 

I posted a summary of analysis in the other thread.  Your articles, as always, are very helpful and in-depth, but I do think some stuff can be slightly tweaked and/or added...  but hey, let's just focus on developing new methods of prevention.   :thumbup2:


Edited by White Hat Mike, 03 February 2015 - 11:54 AM.

Information Security Engineer | Penetration Tester | Forensic Analyst

CipherTechs.com


#50 RobertHD

RobertHD

  •  Avatar image
  • Members
  • 348 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Somewhere in Oz
  • Local time:06:36 PM

Posted 13 February 2015 - 06:18 AM

Um i might know a website but i think it will be risky too risky i think last year i was at school trying to download samples of viruses to test what it did against my pc

the website is vx-archiv.at and i dont think it has cryptolocker on it ill try search on my main pc right now first i need the virus signature like example: Trojan.XXXXXX.XX

Would anyone help?


Robert James Crawley Klopp


#51 RobertHD

RobertHD

  •  Avatar image
  • Members
  • 348 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Somewhere in Oz
  • Local time:06:36 PM

Posted 14 February 2015 - 01:21 AM

AnyBody Got a Sample ive got an old one of my pc and i want to infect it and have a look at it


Robert James Crawley Klopp


#52 Alphafighter09

Alphafighter09

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:12:06 AM

Posted 18 February 2015 - 04:48 PM

So is there way now to fix the virus i got it sadly and it ecrptyed all my photo music and some word documents im really sad and scared i ran 2 scans on my anti virus malwarebytes and eset scan they took off the virus i think because they found alot of bad things in my appdata temp and i deleted them and i think its off my pc now but all my things are ecrypted is there a way to fix it now pls help im scared idk why



#53 White Hat Mike

White Hat Mike

  •  Avatar image
  • Members
  • 312 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:::1
  • Local time:04:06 AM

Posted 18 February 2015 - 04:51 PM

So is there way now to fix the virus i got it sadly and it ecrptyed all my photo music and some word documents im really sad and scared i ran 2 scans on my anti virus malwarebytes and eset scan they took off the virus i think because they found alot of bad things in my appdata temp and i deleted them and i think its off my pc now but all my things are ecrypted is there a way to fix it now pls help im scared idk why

 

As has been said numerous times throughout this and many other threads, there is no method of decryption available for this ransomware aside from paying the ransom and hoping to receive a working decryption utility (although this is not recommended).


Information Security Engineer | Penetration Tester | Forensic Analyst

CipherTechs.com


#54 raulman1

raulman1

  •  Avatar image
  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:12:06 AM

Posted 18 February 2015 - 05:01 PM

How do I turn off notifications of this topic that I posted to?


Nevermind, found the unfollow button.



#55 Alphafighter09

Alphafighter09

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:12:06 AM

Posted 18 February 2015 - 10:50 PM

When will the decrprtion come out im thinking of waiting or just restart my pc i barley got any photos and i barley have word documents like 5 or 10 and i have a back up photo but i dont want to restart because i play games and i have alot of games that i dont want to restart. idk what to do when can we expect a fix ty



#56 RobertHD

RobertHD

  •  Avatar image
  • Members
  • 348 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Somewhere in Oz
  • Local time:06:36 PM

Posted 19 February 2015 - 04:00 AM

No decrytor

Come on Nathan kick Butt!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!


Robert James Crawley Klopp


#57 noblefaction

noblefaction

  •  Avatar image
  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:02:06 AM

Posted 22 February 2015 - 06:36 AM

I got CryptoWall 3.0, and I've been on the phone with several tech support guys over the last few days, and there's no luck in finding any usable shadow copies or backups of my data as even my external hard drive backup was decrypted because I left it plugged into my PC. I decided to just keep my encrypted data on a storage drive software and wiped my machine.

 

I'm still holding onto hope that a fix may one day be possible. Is the same team of law enforcement that took down the Gameover ZeuS botnet and CryptoLocker during Operation Tovar currently tracking down the perpetrators behind CryptoWall?



#58 GargoyleEyes

GargoyleEyes

  •  Avatar image
  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:06 AM

Posted 28 February 2015 - 03:42 PM

Unfortunately I have found myself at this site because I have been hit with CryptoWall 3.0. It looks like my infection is a little different though. The malicious file seems to be a .ini and it appears that it may have coincided with a crash of Iexplore. Has anyone herd of that? I am trying to make sure everything is removed before I reboot the computer. Any additional information on this type of infection would be appreciated.

#59 RobertHD

RobertHD

  •  Avatar image
  • Members
  • 348 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Somewhere in Oz
  • Local time:06:36 PM

Posted 28 February 2015 - 10:11 PM

Srry Mate no decryptor yet


Edited by RobertHD, 28 February 2015 - 10:11 PM.

Robert James Crawley Klopp


#60 GargoyleEyes

GargoyleEyes

  •  Avatar image
  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:06 AM

Posted 01 March 2015 - 11:30 AM

Srry Mate no decryptor yet

Thanks, I am aware there is no decrypter available yet and may never be.
More intrested in providing files to those who may be able to use them to the good. I seem to have caught this trojan before it was finished and it seemed to have come through IE (possibly flash) rather than email. It looks like it was running from an .ini file, did not drop any startup links in 'run', 'runonce', nor 'startup' and the typical reg listing of the affected files seems to reside on the HDD. It seems like it hit Adobe and Silverlight before it started in on the encrypting files.




1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users