seankubin 0 Posted May 17, 2016 Report Share Posted May 17, 2016 Samples.zipHello, This Computer has been infected with the locky cryptolocker. I have exhausted google of decryption options and I am going to have to restore this system and the affected map drives from backup. Also, the .onion links all are blocked, they were blocked in under 1 hour from when the initial encryption occurred. Anyway, I am submitting some files for research. Attached should be a samples.zip file which contains the following. IG2ox.pdf is a pre-encrypted pdf document. 55F70BD69A793D92916AB87C4850D714.locky is the same pdf document- post encryption _HELP_instructions.html is the file that was put in the folder. ORDER-191-9999542-9432696.docm is the macro-enabled document that caused all this trouble. ***do not open ORDER-191-9999542-9432696.docm*** Link to post Share on other sites
seankubin 0 Posted May 17, 2016 Author Report Share Posted May 17, 2016 Obligatory scan logs. scan_160516-150902.txt scan_160516-154439.txt Addition_16-05-2016_15-19-36.txt FRST_16-05-2016_15-19-36.txt Link to post Share on other sites
Kevin Zoll 309 Posted May 17, 2016 Report Share Posted May 17, 2016 Do the following: Download AdwCleaner and save it on your desktop. Close all open programs and Internet browsers (you may want to print our or write down these instructions first). Double click on adwcleaner.exe to run the tool. Click on the Scan button. After the scan has finished, click on the Clean button. Confirm each time with OK. You will be prompted to restart your computer. A text file will open in Notepad after the restart (this is the log of what was removed), which you can save on your desktop. Attach that log file to your reply by clicking the More Reply Options button to the lower-right of where you type in your reply.NOTE: If you lose that log file for any reason, you can find it at C:\AdwCleaner on your computer. Download Junkware Removal Tool and save it on your desktop.Run the tool by double-clicking it. The tool will open and start scanning your system. Please be patient as this can take a while to complete depending on your system's specifications. On completion, a log is saved to your desktop and will automatically open. Attach the JRT log file to a reply by clicking the More Reply Options button to the lower-right of where you type in your reply. Copy the below code to Notepad; Save As fixlist.txt to your Desktop.SearchScopes: HKLM -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://astromenda.com/results.php?f=4&q={searchTerms}&a=ast_wnzp01_14_41_ie&cd=2XzuyEtN2Y1L1Qzu0FtDyE0D0AtB0E0D0ByB0B0Dzy0F0EyDtN0D0Tzu0StCtDtCtAtN1L2XzutAtFyDtFtCtFtBtN1L1CzutCyEtBzytDyD1V1TtN1L1G1B1V1N2Y1L1Qzu2SyCzztCyC0EzzyEzytG0DyDtCtDtGyD0FyB0CtGtAyCzzyBtGyBtB0EtCyCzz0FyByD0DtCzy2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0FyB0E0CyBtAyEtAtGyDtBtBzztGyE0B0FtDtG0B0B0FyDtG0CtDyDyEtA0E0E0CyD0DtCzy2Q&cr=1338080714&ir= SearchScopes: HKLM -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://astromenda.com/results.php?f=4&q={searchTerms}&a=ast_wnzp01_14_41_ie&cd=2XzuyEtN2Y1L1Qzu0FtDyE0D0AtB0E0D0ByB0B0Dzy0F0EyDtN0D0Tzu0StCtDtCtAtN1L2XzutAtFyDtFtCtFtBtN1L1CzutCyEtBzytDyD1V1TtN1L1G1B1V1N2Y1L1Qzu2SyCzztCyC0EzzyEzytG0DyDtCtDtGyD0FyB0CtGtAyCzzyBtGyBtB0EtCyCzz0FyByD0DtCzy2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0FyB0E0CyBtAyEtAtGyDtBtBzztGyE0B0FtDtG0B0B0FyDtG0CtDyDyEtA0E0E0CyD0DtCzy2Q&cr=1338080714&ir= SearchScopes: HKU\.DEFAULT -> {9BB47C17-9C68-4BB3-B188-DD9AF0FD2492} URL = SearchScopes: HKU\S-1-5-21-3509412218-1140489138-3030208024-1000 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://astromenda.com/results.php?f=4&q={searchTerms}&a=ast_wnzp01_14_41_ie&cd=2XzuyEtN2Y1L1Qzu0FtDyE0D0AtB0E0D0ByB0B0Dzy0F0EyDtN0D0Tzu0StCtDtCtAtN1L2XzutAtFyDtFtCtFtBtN1L1CzutCyEtBzytDyD1V1TtN1L1G1B1V1N2Y1L1Qzu2SyCzztCyC0EzzyEzytG0DyDtCtDtGyD0FyB0CtGtAyCzzyBtGyBtB0EtCyCzz0FyByD0DtCzy2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0FyB0E0CyBtAyEtAtGyDtBtBzztGyE0B0FtDtG0B0B0FyDtG0CtDyDyEtA0E0E0CyD0DtCzy2Q&cr=1338080714&ir= SearchScopes: HKU\S-1-5-21-3509412218-1140489138-3030208024-1000 -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://astromenda.com/results.php?f=4&q={searchTerms}&a=ast_wnzp01_14_41_ie&cd=2XzuyEtN2Y1L1Qzu0FtDyE0D0AtB0E0D0ByB0B0Dzy0F0EyDtN0D0Tzu0StCtDtCtAtN1L2XzutAtFyDtFtCtFtBtN1L1CzutCyEtBzytDyD1V1TtN1L1G1B1V1N2Y1L1Qzu2SyCzztCyC0EzzyEzytG0DyDtCtDtGyD0FyB0CtGtAyCzzyBtGyBtB0EtCyCzz0FyByD0DtCzy2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0FyB0E0CyBtAyEtAtGyDtBtBzztGyE0B0FtDtG0B0B0FyDtG0CtDyDyEtA0E0E0CyD0DtCzy2Q&cr=1338080714&ir= SearchScopes: HKU\S-1-5-21-3509412218-1140489138-3030208024-1000 -> {6A1806CD-94D4-4689-BA73-E35EA1EA9990} URL = SearchScopes: HKU\S-1-5-21-3509412218-1140489138-3030208024-1001 -> DefaultScope {6A1806CD-94D4-4689-BA73-E35EA1EA9990} URL = SearchScopes: HKU\S-1-5-21-3509412218-1140489138-3030208024-1001 -> {6A1806CD-94D4-4689-BA73-E35EA1EA9990} URL = DPF: HKLM-x32 {5554DCB0-700B-498D-9B58-4E40E5814405} hxxps://dealer.wgo.net/Reserved.ReportViewerWebControl.axd?ReportSession=wljomebbf3dm4ui21zglds45&Culture=1033&CultureOverrides=True&UICulture=1033&UICultureOverrides=True&ReportStack=1&ControlID=4c6f46108f5d40d997765d6779128a28&OpType=PrintCab&Arch=X86 FF Plugin: @microsoft.com/GENUINE -> disabled [No File] FF Plugin-x32: @microsoft.com/GENUINE -> disabled [No File] CHR HKLM\...\Chrome\Extension: [Äÿ] - <no Path/update_url> CHR HKU\S-1-5-21-3509412218-1140489138-3030208024-1000\SOFTWARE\Google\Chrome\Extensions\...\Chrome\Extension: [Äÿ] - <no Path/update_url> CHR HKLM-x32\...\Chrome\Extension: [pfkfdlcdbajamklbneflfbcmfgddmpae] - hxxps://clients2.google.com/service/update2/crx CHR HKLM-x32\...\Chrome\Extension: [Äÿ] - <no Path/update_url> C:\ProgramData\fontcacheev1.dat C:\Users\Mandy\g2ax_customer_downloadhelper_win32_x86.exe C:\Users\Mandy\AppData\Local\Temp\bomgar-scc-w0yc30jxxd5h7dejw718f8f51iw1y7iwhdewddc40jc90.exe C:\Users\Mandy\AppData\Local\Temp\CloudBackup3822.exe C:\Users\Mandy\AppData\Local\Temp\converter.exe C:\Users\Mandy\AppData\Local\Temp\FP_AX_MSI_INSTALLER.exe C:\Users\Mandy\AppData\Local\Temp\hendibe.exe C:\Users\Mandy\AppData\Local\Temp\ochelper.exe C:\Users\Mandy\AppData\Local\Temp\ose00000.exe C:\Users\Mandy\AppData\Local\Temp\Quarantine.exe C:\Users\Mandy\AppData\Local\Temp\vcredist_x64.exe Task: {07A029FB-D4E4-49F5-8525-B41B17EF1EF9} - System32\Tasks\LaunchSignup => C:\Program Files (x86)\MyPC Backup\Signup Wizard.exe <==== ATTENTION C:\Users\Mandy\AppData\Local\dsisetup11121806892.exe C:\Users\Mandy\AppData\Local\dsisetup5062968142.exe C:\Users\Mandy\AppData\Local\dsisetup2481797122.exe C:\Users\Mandy\AppData\Roaming\WSE_Astromenda\UpdateProc\bkup.datClose Notepad.NOTE: It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work. NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system Run FRST64 and press the Fix button just once and wait. If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart. The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply. Note: If the tool warns you about an outdated version please download and run the updated version. Link to post Share on other sites
Kevin Zoll 309 Posted May 20, 2016 Report Share Posted May 20, 2016 Thread Closed Reason: Lack of Response PM either Kevin, Elise, or Arthur to have this thread reopened. All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE if you don't we are just going to send you back to this thread. Link to post Share on other sites
Recommended Posts