App Review More Fun with Ransomware Part 2

It is advised to take all reviews with a grain of salt. In extreme cases some reviews use dramatization for entertainment purposes.
D

Deleted member 2913

cruelsister,

On Wilders you mentioned, CIS on autosandbox keyloggers automatically blocks keyloggers connection. Is it something new? Never heard or read this about CIS.
 
  • Like
Reactions: Der.Reisende

cruelsister

Level 42
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 13, 2013
3,143
No- that was about CCAV where the default level of the sandbox is elevated above the default level seen in CIS and CF (partially Limited). With CF (or CIS) a person would need the Firewall tweak (stop SB's apps from connecting out- similar to the Sandboxie tweak) or else just increase the SB level to untrusted to stop it cold (like what an anti-exe will do for you).
 
  • Like
Reactions: Der.Reisende
D

Deleted member 2913

So you mean CCAV automatically blocks connection for autosandboxed keyloggers?

Would love to see a test on this by you.
 
Last edited by a moderator:
  • Like
Reactions: Der.Reisende

Tony Cole

Level 27
Verified
May 11, 2014
1,639
Thanks cruelsister for bringing this up/attention. Do you think all typical AV's 'need' to up their ante in order to stop true zero-day malware i.e., employ virtualization? I think the issue is usability, i.e., how many home users just install an AV and scan. When something happens they don't have a clue, that's why Kaspersky leave trust digitally signed applications checked.
 
  • Like
Reactions: Der.Reisende

thehunter

New Member
Jan 25, 2016
2
Thanks a lot cruelsister for the sample. On top of the ransomware activity there is network activity to us.clevermining.com and also traffic to ad networks which indicates it is also a bitcoin miner and clickfraud bot.
 
  • Like
Reactions: Der.Reisende

Dirk41

Level 17
Verified
Top Poster
Well-known
Mar 17, 2016
797
Guys , may I ask a question? Since tesla is a .js file ( I think ) , if I uninstalled Java, it can't run right ? And not do damage , right ? Thank you
 
  • Like
Reactions: Der.Reisende

cruelsister

Level 42
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 13, 2013
3,143
Dirk- Although Tesla may be carried by a Java script (as in an exploit) the malware itself is just a regular exe without needing any scripting engine to work. So if you run Tesla on a system without Java you will still be screwed.
 

XhenEd

Level 28
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Mar 1, 2014
1,708
Lock-Down Mode - block execution of any ransomware

Protected (Medium) Mode - block execution of all unsigned ransomware; digitally signed ransomware will execute and encrypt C:\ProgramData and C:\Users\User directories. Ransom file can perform other actions in those directories dependent upon what is was coded to do.

I am still searching for digitally signed ransomware to verify.
Bumping this thread! :D

Basing on BRN's whitepaper, Medium Mode (earlier version of AppGuard 4) would still not allow ransomware (or CryptoLocker in the whitepaper) to encrypt any files because AppGuard would prevent its operation in the registry and other areas.

I tried looking for the link of this whitepaper, but I cannot find it anymore. Fortunately, I saved a copy of it. :)

"Figure 2 below shows AppGuard allowing CryptoLocker to run in a simulated digital signature-stolen scenario.
Even though CryptoLocker is running, AppGuard contains it so that it cannot make changes to harm the system.
AppGuard’s containment prevents CryptoLocker and other malware from harming the system no matter what
privileges the user has on the computer. Since AppGuard contains and isolates CryptoLocker in runtime, it
cannot continue to operate; it is crippled, and no longer will be an effective threat to the computer." - AppGuard® From Blue Ridge® Stops CryptoLocker
 
  • Like
Reactions: Der.Reisende
H

hjlbx

Bumping this thread! :D

Basing on BRN's whitepaper, Medium Mode (earlier version of AppGuard 4) would still not allow ransomware (or CryptoLocker in the whitepaper) to encrypt any files because AppGuard would prevent its operation in the registry and other areas.

I tried looking for the link of this whitepaper, but I cannot find it anymore. Fortunately, I saved a copy of it. :)

"Figure 2 below shows AppGuard allowing CryptoLocker to run in a simulated digital signature-stolen scenario.
Even though CryptoLocker is running, AppGuard contains it so that it cannot make changes to harm the system.
AppGuard’s containment prevents CryptoLocker and other malware from harming the system no matter what
privileges the user has on the computer. Since AppGuard contains and isolates CryptoLocker in runtime, it
cannot continue to operate; it is crippled, and no longer will be an effective threat to the computer." - AppGuard® From Blue Ridge® Stops CryptoLocker

Yes. You are correct. I will delete my post because of incorrect infos.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top