TeslaCrypt 4.1A - interesting article by German Heise Security Magazine

Der.Reisende

Level 45
Thread author
Honorary Member
Top Poster
Content Creator
Malware Hunter
Dec 27, 2014
3,423
Krypto-Trojaner: TeslaCrypt 4.1A erschwert Desinfektion des Rechners, verschlüsselt weitere Formate

TeslaCrypt is one of the most successful crypto Trojans. And the developers are not tired to add new features to make life difficult for the victims. Version 4.1A encrypts even more formats more and makes it more difficult to disinfect the computer.

The developers of blackmail Trojan TeslaCrypt aren't tired yet of further optimizing their pest: Current version 4.1A has some new, nasty tricks on hand. According to an analysis of the security company Endgame, the new version now encrypts among others Bitcoin wallets and Scores. It also has an eye for files ending in .bak, being used by various programs for backups. Also, TeslaCrypt does not like being observed: Analysis tools such as Process Explorer from SysInternals or the Task Manager are being shut down by the malware.

TeslaCrypt hunts down specific file extensions, that might be of value for the user, but spares out system files. The recently added extensions denominated .bak .bsa, .litesql, .tiff and .wallet. The ending .bak is used by various programs for backups, .bsa is a file format by the {Video Game] Developer Bethesda (Fallout 3, The Elder Scrolls and more). In .litesql files to TeslaCrypt probably hopes that it concerns databases, .tiff is a common graphic format. Furthermore, it hunts for .wallet files the blackmailer: This ending is used for example by the widespread Bitcoin Wallet multi HD.

In addition, the ransomware developers incorporated measures that the analysis of the infected computer becomes more difficult: The pest kills among others the Task Manager. A user noticing unusual disk activity and wish to discover what process is responsible for it might be left out in the cold. Even the Process Explorer from SysInternals was shut down by the trojan. Disinfection of the infected computer is also difficult because TeslaCrypt also prevents the execution of the Registry Editor, the command prompt, and the configuration tool msconfig. With lastmentioned, you can quickly find out whether there are suspicious processes running at startup. The crypto Trojan moreover tries to hinder debugging.

According to the analysis, TeslaCrypt still is largely spread by mails with attachments . The annex contains a zip archive that contains a JavaScript file. It involves the Downloader Nemucod which recharges the actual threat and performs.

Users can quite easily protect themselves by the Windows Script Host being disabled, which is responsible for running scripts. As described in c't 7/16 on page 79, you put in an registry entry:
HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows Script Host \ Settings
a string called "Enabled" and sets its value to "0".

If this results in complications, because a programme does not run without an Host, set the value to "1" to activate the system component again. It is even easier to import we prepared registry files, we offer a free downloadable version.

ftp://ftp.heise.de/pub/ct/listings/1607-078.zip

BlogRansomware_logo_0-b141054d25962e26.png


Thank you for reading guys, I hope the translation isn't too bad :)
 

Der.Reisende

Level 45
Thread author
Honorary Member
Top Poster
Content Creator
Malware Hunter
Dec 27, 2014
3,423
great share broo,,
thanks,,, hmm i have a question,, ? sorry if OOT,, malware detect for linux??
sorry my bad english
Thank you, too :)
If I got you right, you're looking for an AV for Linux. I'm no specialist regarding that (cannot even tell you if you need one, but to not spread malware which can't harm Linux, but Windows users, I would install one, also, there are a few viruses for Linux), but I found a list of Linux AVs you might want to have a look into.
http://www.av-comparatives.org/wp-content/uploads/2015/05/avc_linux_2015_en.pdf
 
  • Like
Reactions: Logethica

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top