Got this from Susan Bradley on the secshare list. Possible new Cryptolocker not 
seen by the AV vendors.

https://malwr.com/analysis/YjFhYWQyZTc5MDE5NGM4Y2I4ODZiYzNkYTZiYTNlMzM/


Signatures
<https://malwr.com/analysis/YjFhYWQyZTc5MDE5NGM4Y2I4ODZiYzNkYTZiYTNlMzM/#signature_network_bind>
Starts servers listening on 0.0.0.0:0, 0.0.0.0:8601, 
0.0.0.0:7185<https://malwr.com/analysis/YjFhYWQyZTc5MDE5NGM4Y2I4ODZiYzNkYTZiYTNlMzM/#signature_network_bind>
<https://malwr.com/analysis/YjFhYWQyZTc5MDE5NGM4Y2I4ODZiYzNkYTZiYTNlMzM/#signature_antivirus_virustotal>
File has been identified by at least one AntiVirus on VirusTotal as 
malicious<https://malwr.com/analysis/YjFhYWQyZTc5MDE5NGM4Y2I4ODZiYzNkYTZiYTNlMzM/#signature_antivirus_virustotal>
<https://malwr.com/analysis/YjFhYWQyZTc5MDE5NGM4Y2I4ODZiYzNkYTZiYTNlMzM/#signature_network_http>
Performs some HTTP 
requests<https://malwr.com/analysis/YjFhYWQyZTc5MDE5NGM4Y2I4ODZiYzNkYTZiYTNlMzM/#signature_network_http>
<https://malwr.com/analysis/YjFhYWQyZTc5MDE5NGM4Y2I4ODZiYzNkYTZiYTNlMzM/#signature_recon_fingerprint>
Collects information to fingerprint the system (MachineGuid, DigitalProductId, 
SystemBiosDate)<https://malwr.com/analysis/YjFhYWQyZTc5MDE5NGM4Y2I4ODZiYzNkYTZiYTNlMzM/#signature_recon_fingerprint>
<https://malwr.com/analysis/YjFhYWQyZTc5MDE5NGM4Y2I4ODZiYzNkYTZiYTNlMzM/#signature_bypass_firewall>
Operates on local firewall's policies and 
settings<https://malwr.com/analysis/YjFhYWQyZTc5MDE5NGM4Y2I4ODZiYzNkYTZiYTNlMzM/#signature_bypass_firewall>
<https://malwr.com/analysis/YjFhYWQyZTc5MDE5NGM4Y2I4ODZiYzNkYTZiYTNlMzM/#signature_infostealer_browser>
Steals private information from local Internet 
browsers<https://malwr.com/analysis/YjFhYWQyZTc5MDE5NGM4Y2I4ODZiYzNkYTZiYTNlMzM/#signature_infostealer_browser>
<https://malwr.com/analysis/YjFhYWQyZTc5MDE5NGM4Y2I4ODZiYzNkYTZiYTNlMzM/#signature_persistence_autorun>
Installs itself for autorun at Windows 
startup<https://malwr.com/analysis/YjFhYWQyZTc5MDE5NGM4Y2I4ODZiYzNkYTZiYTNlMzM/#signature_persistence_autorun>

I would look at the network communications outbound and see if this matches any 
traffic patterns you see on your network.

Z

Edward E. Ziots, CISSP, CISA, CRISC, Security +, Network +
Security Engineer
Lifespan Organization
[email protected]<mailto:[email protected]>
Work:401-255-2497


This electronic message and any attachments may be privileged and confidential 
and protected from disclosure. If you are reading this message, but are not the 
intended recipient, nor an employee or agent responsible for delivering this 
message to the intended recipient, you are hereby notified that you are 
strictly prohibited from copying, printing, forwarding or otherwise 
disseminating this communication. If you have received this communication in 
error, please immediately notify the sender by replying to the message. Then, 
delete the message from your computer. Thank you.
[cid:[email protected]]


<<inline: image001.png>>

Reply via email to