Technology

DeathRansom Returns with a Vengeance to Permanently Encrypt All Your Files

DeathRansom was a little known ransomware that faked encrypting user files. Now, after an overhaul by its creator, this nefarious ransomware can permanently encrypt your files and extort your money.

A Slow Start Kept DeathRansom Under the Radar

DeathRansom showed up at the beginning of 2019. When the ransomware was first introduced and distributed, it would pretend to encrypt the files in a system. However, researchers and users alike discovered that they could easily get access to their files again by removing the .wctc extension. 

After several improvements by its creators, the malware is infecting victims’ machines again and holding their data at ransom. This time, unlike its first iteration, DeathRansom is fully capable of encrypting your files. 

The initial spike of users affected by DeathRansom began around November 20th. Yet, judging by the progressive growth of malware victims over the past 30 days, it is almost sure that a new distribution campaign is underway.

While there haven’t been as many infections as the earlier days, reports of DeathRansom attacks continue coming in. This means that there is likely still an active campaign distributing the ransomware.

The Revamped DeathRansom is Now a Serious Cyber Threat

Unlike with the non-encryption DeathRansom, the new working version doesn’t add an extension to the encrypted files. Instead, the data of the file is what is encrypted. Now, the only way to identify which files have been encrypted is by the ABEFCDAB file marker added to the encrypted data. 

The ransomware creates a ransom note in folders where encrypted files are. The ransom note, called read_me.txt contains a unique “LOCK-ID” and an email address. Victims are supposed to email the address and quote their unique LOCK-ID in order to get their files unencrypted. 

Figure 1.1 DeathRansom Ransom Note Version 1

Caption: DeathRansom’s ransom note demanding payment from affected users to decrypt their files. Source: https://twitter.com/GrujaRS

Figure 1.2 DeathRansom Ransom note Version 2

DeathRansom’s ransom note demanding payment from affected users to decrypt their files. Source: https://twitter.com/P3pperP0tts


    No Clear Consensus on How DeathRansom Spreads

    At this point, there is no information on how DeathRansom ransomware is being distributed. Some possible methods used to spread the malware are the traditional methods used by hackers such as phishing emails, drive-by-download, or Trojan payload droppers.

    One thing that has been noticed about the victims of DeathRansom is that they have also been hit by the STOP Ransomware. This was noticed in a Reddit post and with several submissions to ID-Ransomware with victims uploading their DeathRansom ransom note and a STOP Djvu encrypted file in the same submission.

    Given that STOP is distributed as part of adware bundles and cracked software and games, it’s possible that the two ransomware are connected and DeathRansom could be distributed in a similar way.

    Encryption Routine and Targeted Files

    Like most ransomware, DeathRansom attempts to clear shadow volume copies by running the following command: “vssadmin.exe delete shadows /all /quiet”. This command uses Windows’ vssadmin administrative tool that manages system backups and snapshots. After deleting the backups, the ransomware then encrypts files on a computer that contains specific strings of data and file extension names. 

    The files encrypted by the ransomware include users’ files, such as documents, photos, videos, audio files, etc. The only silver lining here, if you could call it that, is that the ransomware does not affect system files. 

    Files excluded from encryption:

    • Programdata
    • $recycle.bin
    • Program files
    • Windows
    • All users
    • Appdata
    • txt
    • bat
    • ini
    • inf
    • dat
    • db
    • bak
    • Boot,ini
    • dat.log
    • Db

    During a dynamic analysis of the newest sample of DeathRansom, security researchers noticed DNS requests and TCP traffic to a remote server. This probably why DeathRansom’s creator avoids encrypting system files in order to keep the system stable and track the malware’s infections.

    Figure 2 DeathRansom’s Network Activity

    The dynamic analysis shows DeathRansom monitoring infected systems. Source: https://dissectingmalwa.re/

      Is There a Way to Remove DeathRansom from Your Computer?

      Currently, there is no decryptor tool or information on how victims of DeathRansom ransomware can recover their files without paying the ransom. Malware victims should keep in mind that paying the ransom is no guarantee that their data will be decrypted. Thus, this option is not suggested. 

      There are multiple methods on how to remove the DeathRansom and restore the system files manually. However, none of these are guaranteed to remove the ransomware and decrypt the locked data.  Users who attempt the manual approach should take extreme caution due to the risk of permanently losing their files. 

      As always, the best way to protect yourself from ransomware attacks is to employ good cybersecurity practices. The first thing to do is to set up daily backups and store them in an isolated network. Other good cybersecurity practices include avoiding suspicious attachments on emails, visiting spammy websites, having good anti-malware software.

      Reactionary Times News Desk

      All breaking news stories that matter to America. The News Desk is covered by the sharpest eyes in news media, as they decipher fact from fiction.

      Previous/Next Posts

      Related Articles

      Leave a Reply

      Loading...
      Back to top button