- Jul 22, 2014
- 2,525
A new ransomware was discovered today by MalwareHunterTeam called Spectre. This ransomware is currently in testing mode by the developer, but due to the time and effort that has been put into it's creation, I would not be surprised to see this go into distribution soon. With this in mind, I decided to play with the sample a bit and create a quick writeup on the Spectre ransomware from my own analysis.
For those who may become infected with this ransomware in the future, you can ask for help in our dedicated Spectre Ransomware Support & Help Topic.
Spectre is Currently in Testing Mode
When Spectre is installed, it will connect to the Command & Control server at the a0142503.xsph.ru/testing.php?mode=a1 URL. The C2 server will then respond with a unique victim ID, bitcoin address, and public key that should be used to encrypt the victims files.
The ransomware will then delete the shadow volume copies and begin to scan the computer for certain file types to encrypt.
....
Thanks to @Der.Reisende sample is already being tested in the Hub.
For those who may become infected with this ransomware in the future, you can ask for help in our dedicated Spectre Ransomware Support & Help Topic.
Spectre is Currently in Testing Mode
When Spectre is installed, it will connect to the Command & Control server at the a0142503.xsph.ru/testing.php?mode=a1 URL. The C2 server will then respond with a unique victim ID, bitcoin address, and public key that should be used to encrypt the victims files.
The ransomware will then delete the shadow volume copies and begin to scan the computer for certain file types to encrypt.
....
Thanks to @Der.Reisende sample is already being tested in the Hub.