Ransomware: GPCode strikes back

Jack

Administrator
Thread author
Verified
Staff Member
Well-known
Jan 24, 2011
9,378
Kaspersky lab discovered a new variant of GPCode Ransomware today, in the form of an obfuscated executable.
The threat was detected automatically thanks to the Kaspersky Security Network as UDS:DangerousObject.Multi.Generic.

Specific detection has been added and the threat is now detected as Trojan-Ransom.Win32.Gpcode.bn

The infection occurs when a malicious website is visited. (drive by download)

Upon execution, the GPCode Ransomware will generate an AES 256 bit key (Using the Windows Crypto API), and use the criminal’s public RSA 1024 key to encrypt it. The encrypted result will then be dropped on the Desktop of the infected computer, inside of the ransom text file:
6166.png

It’s important to notice that, unlike the sample from last November, they are asking for payment through Ukash pre-paid cards. On a side note, the Ransomware we discovered yesterday, that was disguising as a notice from the federal German police was also asking for Ukash coupons.

It seems the criminals are moving away from the old money transfer, and preferring the pre paid cards instead. the price increased from 120 to 125 dollars.

At the very same time, the Desktop background is changed to tell the user they have been infected, and that a ransom should be paid:
6167.png



At this point, the hard drives are being scanned for files to encrypt. The file extensions used to determine whether a file is to be encrypted or not are provided inside of an encrypted configuration file. It means the GPCode Ransomware can be easily updated with a new configuration file. It also includes the ransom letter as well as the public RSA 1024 key from the criminals.

More details - link
 

Valentin N

Level 2
Feb 25, 2011
1,314
in such moment rollback software such as Comodo time machine could be useful

Look here to see. the user easily save himself by going to a state when the computer was clean
 

Jack

Administrator
Thread author
Verified
Staff Member
Well-known
Jan 24, 2011
9,378
COMODO Defense+/Sandboxon on deafult settings can't prevent Ransomware: GPCode ?
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Well its supposed that it must be popup as buffer overflow attacked.
 

Valentin N

Level 2
Feb 25, 2011
1,314
RE: RansomwaGPCode strikes back

Jack said:
COMODO Defense+/Sandboxon on deafult settings can't prevent Ransomware: GPCode ?

no it won't but if you but it on untrusted/restricted you will be protected. Not even limited will protect. Comodo is detecting it as a virus so no need to worry.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top