• Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg
  • Delicious

Anti-Malware Laboratory

Yet Another Malware Blog

About

An informal blog from your friendly neighborhood software security humans.

Blog Archive

  • ►  2015 (5)
    • ►  October (1)
    • ►  August (2)
    • ►  May (1)
    • ►  March (1)
  • ▼  2014 (8)
    • ►  October (1)
    • ►  July (1)
    • ▼  June (1)
      • Bitcrypt v2.0
    • ►  May (4)
    • ►  April (1)
  • ►  2013 (12)
    • ►  December (3)
    • ►  November (5)
    • ►  August (2)
    • ►  March (2)
  • ►  2012 (35)
    • ►  April (4)
    • ►  March (12)
    • ►  February (17)
    • ►  January (2)

Categories

adobe (1) android (10) android february (1) baksmali (1) Black Hole (2) crimepack (1) disassembler (1) exploit (3) Exploits (4) Fakeav Winrar sfx (1) Fishbowl (1) flash (1) gift certificates (1) Google Authenticator (1) google play (1) hcp (1) java (1) Malware (5) mdac (1) Mobile (24) NSA Mobility Program (1) obfuscated script (1) pdf (1) Reversing (2) rhino (1) skype (1) smali (1) spam (1) test (1) Unpacking (1) vouchers (1) vulnerability (3)

Popular Posts

  • Bank of America spam: An Analysis
    An email claiming to be from Bank of America lures users to open an attachment that shows how to open secure emails from the bank. The mess...
  • [BE CAUTIOUS] Dragon Ball Z: Resurrection of F MALWARE and SCAM
    Be wary of downloading movies in torrent sites.  Executables can also be executed with a file size as huge as a gigabyte...
  • Unpacking MFC Compiled CryptoWall Malware
    Unpacking MFC Compiled CryptoWall Malware Introduction First and foremost, this article does not intend to analyze what CryptoWall malw...

Visitors to this blog

Wednesday, June 18, 2014

Bitcrypt v2.0

Posted on Wednesday, June 18, 2014 by bernadette | No comments
Bitcrypt is a ransomware program where in it encrypts certain types of file in the system using RSA public-key cryptography. This malware will display a message offering the user to decrypt the data once the payment is made through Bitcoin.

Summary
  
Upon execution, it will create a thread that will periodically check and terminate running instance of taskmgr.exe and regedit.exe.
It will also check the existence of the following registry entry:
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\
    • Value Name: Bitcomint 
    • %APPDATA%\[RANDOM FILE NAME].exe
If the above registry entry doesn't exist it will create one and also create a copy of itself in %APPDATA%. After ensuring that the malware will start every time the Windows start, it will execute the following commands:
  • /K bcdedit /set {bootmgr} displaybootmenu no
  • /K bcdedit /set {default} bootstatuspolicy ignoreallfailures
It will set country or region location of windows through the following registry entry:
  • HKEY_CURRENT_USER\Control Panel\International\Geo
    • Value Name: Nation
    • Data : 244 (244 is the country code of US)
It will then check if the following files exists in %APPDATA%, if not it will create a copy of the following files and then execute a copy of itself in %APPDATA%, then terminate and delete the currently running file.
  • bitcrypt.ccw
    • This file contains base 64 strings, BitCrypt ID and status of encryption of files in the system
      • BitCrypt ID format
        • WIN -<region location of Windows>-<4 random numbers><index of base64 strings>
  • BitCrypt.txt 
    • This file contains information where to download the program decryptor. This note is in 10 different languages: English, French, German, Russian, Italian, Spanish, Portuguese, Japanese, Chinese and Arabic. In this note it also claims that files are encoded using RSA-1024 key. As of this moment, links given by this note is not accessible.

It will create del.bat to delete the currently running file and execute the copy of itself in %APPDATA%.


Extraction of base 64 strings

This malware creates jump table of the available random base 64 string arrays. Using Delphi generator it randomly chose an index of what set of strings to use at the time of infection.
Based from the image above, the string index is 1A2h, based on malware code it extracts the base 64 string using the following instruction:
  • MOV EDX,DWORD PTR DS:[ESI*4+47DE98]  ESI: = 0x1A2 (418)
    • ESI*4 = 1A2 * 4 = 688


Infection Routine

This malware will encrypt files with the following file extensions:
  • *.dbf
  • *.mdb
  • *.mde
  • *.xls
  • *.xlw
  • *.docx
  • *.doc
  • *.cer
  • *.key
  • *.rtf
  • *.xlsm
  • *.xlsx
  • *.txt
  • *.xlc
  • *.docm
  • *.xlk
  • *.text
  • *.ppt
  • *.djvu
  • *.pdf
  • *.lzo
  • *.djv
  • *.cdx
  • *.cdt
  • *.cdr
  • *.bpg
  • *.xfm
  • *.dfm
  • *.pas
  • *.dpk
  • *.dpr
  • *.frm
  • *.vbp
  • *.php
  • *.js
  • *.wri
  • *.css
  • *.asm
  • *.jpg
  • *.jpeg
  • *.dbx
  • *.dbt
  • *.odc
  • *.sql
  • *.abw
  • *.pab
  • *.vsd
  • *.xsf
  • *.xsn
  • *.pps
  • *.lzh
  • *.pgp
  • *.arj
  • *.gz
  • *.pst
  • *.xl
It will first search and list down all the files with the above file extensions.
It will encrypt the target file and write the encrypted data to a new file with ".bitcrypt2" extension then delete the original file. 

Encryption routine
Payload

After encryption of files, it will change the status of infection in bitcrypt.ccw file from false to EncryptComplete.

It will change the wall paper with BitCrypt.bmp to notify the user that the system has been infected by Bitcrypt v2.0.

And just to make sure that the user will be able to read Bitcrypt.txt, it will open this file through notepad.exe


Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)
volute-glacial
volute-glacial
volute-glacial
volute-glacial
Copyright © Anti-Malware Laboratory | Powered by Blogger
Design by Fabthemes | Blogger Template by NewBloggerThemes.com