New Ransomware Threat: Crysis Lays Claim to TeslaCrypt’s Former Turf

Next story

It has been two weeks since ESET found out that TeslaCrypt ransomware closed down its operations and created a free TeslaCrypt decryptor that allows ransomware’s victims to get their files back. Since then, over 32,000 users around the globe have already taken this opportunity and downloaded the tool.

But even with TeslaCrypt abandoning its territory, malware extortion families have lost none of their prominence among cybercriminals. With unceasing waves of JS/TrojanDownloader.Nemucod and JS/Danger.ScriptAttachment trying to download several variants of Locky, it would seem that this ransomware would be the one to lay claim to TeslaCrypt’s former turf.

But according to ESET LiveGrid® statistics, there is another player in the game, showing an even higher level of prevalence—namely, Win32/Filecoder.Crysis.

ESET’s analysis shows that this nasty ransomware is able to encrypt files on fixed, removable and network drives. It uses strong encryption algorithms and a scheme that makes it difficult to crack in reasonable time.

How is Crysis spread?

During our research, we saw different approaches to how the malware is spread. In most cases, Crysis ransomware files were distributed as attachments to spam e-mails, using double file extensions. Using this simple, yet effective technique, executable files appear as non-executable.

Another vector used by the attackers has been disguising malicious files as harmless looking installers for various legitimate applications that they have been distributing via various online locations and shared networks.

To become more persistent, Crysis ransomware also sets registry entries in order to get executed at every system start.

Upon execution, it encrypts all file types (including those with no extension), leaving only necessary operating system and malware files untouched. The trojan collects the computer’s name and a number of encrypted files by certain formats, finally sending them to a remote server controlled by the attacker. On some Windows versions, it also attempts to run itself with administrator privileges, thus extending the list of files to be encrypted.

After finishing its malicious intentions, a text file named How to decrypt your files.txt is dropped into the Desktop folder, in some cases accompanied by DECRYPT.jpg picture, displaying the ransom message as desktop wallpaper.

The initially provided information is limited to two contact email addresses of the extorters. After sending the email, the victim receives further instructions. Among other things, it includes the price of the decryptor (varying from approximately $450 to over $1,000). The victim is instructed to buy BitCoins and send them to the operators’ BitCoin wallet specified at the end of the message.

Protecting your data

Victims infected by older variants of Win32/Filecoder.Crysis have a decent chance of getting their files back without paying the attackers. Files encrypted by the older variants can be restored with the assistance of ESET technical support.

This article was originally published on the ESET blog WeLiveSecurity.