2064
Detailed Technical Analysis of RotorCrypt Ransomware Attack Detailed Technical Analysis of RotorCrypt Ransomware Attack
Ransomware,Malware Analysis | 06/12/2018

Detailed Technical Analysis of RotorCrypt Ransomware Attack


In this technical analysis of the RotorCrypt Ransomware attack, our (HTRI TEAM) security experts review the details of the ransomware campaign and steps to take to protect against such RotorCrypt ransomware attacks.

RotorCrypt Ransomware Overview

RotorCrypt is a part of the ransomware family. This is a new variant of RotorCrypt ransomware, recently found by the security researcher (Michael Gillespie). This ransomware deletes the backup option from the system so that the user can’t go back to the restore point option.

In previous variant of rotorcrypt ransomware was using  ________INKOGNITO8000@TUTAMAIL.COM_________.SPG file extension in the last but this time it appends the filename of the affected file by adding !@#$%______PANAMA1@TUTAMAIL.com_____%$#@.mail in the last.

This ransomware doesn’t contain any ransom information nor it drops any ransom note.

Flowchart

Flow Chart

Get peace of mind! Get rid of malicious programs instantly

Free Malware Scan Compatible with Win 10,8.1,8 & 7

Technical Analysis of RotorCrypt Ransomware

File Name: RotorCrypt.exe

MD5: E120C26A601EE0ECEB84068728910E89

SHA1: 2e074045c334a5e59a536b1397d6a4d63437c10b

SHA256: 3637c9f27d8599d1c79a1de6f4eb2bf2795f831d43d9d4b0c821e73bdbebafcf

File Type: .EXE

Spread Via:  Email

 

Detail Description of RotorCrypt Ransomware with Screenshots

On execution of this ransomware its executed following subprocesses

Process Tree

Figure 1 Process Tree

As shown above this ransomware deletes the volume shadow copy and disable recovery mode by initiating following commands

C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet

C:\Windows\System32\bcdedit.exe" /set {current} bootstatuspolicy ignoreallfailures

"C:\Windows\System32\bcdedit.exe" /set {current} recoveryenabled no

"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures

Thereupon this ransomware copy itself into at following location:

C:\Users\admin\AppData\Local\Apps\MBmTUVeT.exe

 

Thereafter, it creates the Autorun entry in the registry so, that at each boot time it gets self-started.

 

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run          DcNGTEFm= C:\Users\admin\AppData\Local\Apps\MBmTUVeT.exe       

 

 Persistent Mechanism

Figure 2 Persistent Mechanism

 

This ransomware takes advantage of following Microsoft Cryptographic API’s to encrypt the files:

CryptGetUserKey

CryptGenRandom

CryptGenKey

CryptDestroyKey

 

It also searches for some processes with the help of CreateToolhelp32Snapshot, Process32First & Process32Next.

 

It contains some interesting API’s (Anti-Debugging API’s) that checks whether the malware is running under any debugger or not, below are some of them:

Isdebuggerpresent

GetSystemTime

GetTickCount

 

As shown below, this ransomware appends the affected filename by adding !@#$%______PANAMA1@TUTAMAIL.com_____%$#@.mail in the last.

Encrypted File Extension

Figure 3 Extension

It doesn’t drop any ransom note nor it contains any ransom amount information.

This ransomware also doesn’t contain any network activities.

 

IOC’s

Associated File Names & Hashes:

File Name

Hash

Sample.exe

E120C26A601EE0ECEB84068728910E89

Associated File Paths:

C:\Users\admin\AppData\Local\Apps\MBmTUVeT.exe

Associated Registry:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run          DcNGTEFm= C:\Users\admin\AppData\Local\Apps\MBmTUVeT.exe

Are you worried about your PC health?

Check your PC Health for Free!

Powered By:howtoremoveit.info Run Free Scan

[tips_prevents]

Newsletter

×
×
#include file="../statichtml/static_notification.html"

1

ITLSecureVPN_setup.exe
2

3

1

2

3

1

2

3