- Apr 13, 2013
- 3,225
As you may be aware, the makers of the previously wildly popular Tesla ransomware have abandoned that project and in all probability are behind the recent CryptXXX outbreak. Although decryptors were produced for the initial versions, a new build has been recently released that is a real pain and defeats the decryptors. Besides infecting network shares it also has a function to steal passwords of the originally infected system.
The real pain is that it seems to be totally VM/sandbox aware (probably due to a getsysinfo function- but I'm not 100% on this) so is an issue to analyze without a bunch of sacrificial machines which I no longer have. It's being currently pushed out on malicious webpages via the Neutrino EK. If you are running a sandbox (SBIE, CF, Shade) or in a VM you are safe as the malware will just shut down; without such defenses running into a zero day sample may be a severe issue.
(Just noticed it is connecting out to prtc.net in San Juan, which is the Puerto Rican Telephone Company. That's a first...).
The real pain is that it seems to be totally VM/sandbox aware (probably due to a getsysinfo function- but I'm not 100% on this) so is an issue to analyze without a bunch of sacrificial machines which I no longer have. It's being currently pushed out on malicious webpages via the Neutrino EK. If you are running a sandbox (SBIE, CF, Shade) or in a VM you are safe as the malware will just shut down; without such defenses running into a zero day sample may be a severe issue.
(Just noticed it is connecting out to prtc.net in San Juan, which is the Puerto Rican Telephone Company. That's a first...).