

Rewterz Threat Alert – Lucifer New Cryptojacking and DDoS Hybrid Malware
June 25, 2020
Rewterz Threat Alert – Covid-19 Themed Malicious URLs
June 25, 2020
Rewterz Threat Alert – Lucifer New Cryptojacking and DDoS Hybrid Malware
June 25, 2020
Rewterz Threat Alert – Covid-19 Themed Malicious URLs
June 25, 2020Severity
Medium
Analysis Summary
New ransomware CryCryptor has been targeting Android users in Canada, distributed via two websites under the guise of an official COVID-19 tracing app. Researchers analyzed the ransomware and created a decryption tool for the victims. Once the user falls victim to CryCryptor, the ransomware encrypts the files on the device – all the most common types of files – but instead of locking the device, it leaves a “readme” file with the attacker’s email in every directory with encrypted files. After launch, the ransomware requests to access files on the device. After obtaining that permission, it encrypts files on external media with certain extensions.

Selected files are encrypted using AES with a randomly generated 16-character key. After CryCryptor encrypts a file, three new files are created, and the original file is removed. The encrypted file has the file extension “.enc” appended, and the algorithm generates a salt unique for every encrypted file, stored with the extension “.enc.salt”; and an initialization vector, “.enc.iv”.

Impact
File encryption
Indicators of Compromise
MD5
381134ea0f0be535b9d2ce8a94093576
SHA-256
faa0efaad40e78bf27ca529171aaf0551db998a276d4ff501209d1f5ef830dfb
SHA1
322aab72228b1a9c179696e600c1af335b376655
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your existing environment.
- Always install recommended/ legitimate applications from the playstore.