查看: 3936|回复: 13
收起左侧

[资讯] 勒索改玩dll, JS, 或断网

[复制链接]
jasonliul
头像被屏蔽
发表于 2016-8-29 14:26:29 | 显示全部楼层 |阅读模式
本帖最后由 jasonliul 于 2016-8-29 14:31 编辑


The criminal group behind the Locky ransomware has updated their malware, and newer versions of this threat are being installed disguised as DLL files, instead of the classic EXE binaries.

The Locky ransomware has morphed more than any other ransomware active today. The reason behind this is because the malware was created and developed by the same group that created the Dridex banking trojan, who also owns one of the most active botnets on the Internet.

As such, resources are never scarce with this group, who have both the money, time, and knowledge to evolve their ransomware with new techniques at regular intervals, in order to avoid security software and keep security researchers on their toes.
"Locky experiments with DLLs instead of EXEs"

The latest of this change is an update to how Locky reaches its victims and how the encryption process starts.

According to cyber-security vendor Cyren, recent Locky versions drop DLL files on infected computers, instead of EXE files. The rest of the infection chain remains as we know it. 改玩dll制式

Locky reaches victims via spam messages that have a ZIP file attached to the email body. Unzipping this ZIP drops a JavaScript file, which when executed downloads the DLL file (instead of the classic EXE).

This file is injected into a process, and its malicious code executed, which starts the file encryption operation. Another new feature is that this DLL file uses a custom packer to prevent anti-malware scanners to easily detect it.

This version locks files and appends the .zepto extension at the end, meaning this a version of the Zepto ransomware, another name for Locky, but still the Locky ransomware.
"Locky has suffered many changes"

In the past, Locky has suffered many other mutations. Some have lasted, some not.

For example, Locky spam using Office documents 使用官方文档制式  and WSF files instead of ZIP & JS files has gone up. Other versions have used websites with vulnerable PHP forms to send the email spam, instead of the classic botnets used by the Dridex gang.

Towards the end of July, Locky experimented with embedding the entire ransomware binary in the JS file and then reconstructing the EXE file when executing the JS file, instead of downloading it from an online server.

Another version also added support for working without an Internet connection, even if it featured a weaker encryption method.

It's these constant updates that have kept Locky one step ahead of security researchers, and that's why a decrypter has never been created for Locky until now.

来源
http://news.softpedia.com/news/n ... l-file-507646.shtml


其他详细信息 bleeping恶软社区

Locky / Zepto Ransomware
http://www.bleepingcomputer.com/ ... stalled-from-a-dll/


这玩意真是如火如荼~~~

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
驭龙
发表于 2016-8-29 15:12:17 | 显示全部楼层
蜘蛛的硬伤,不怎么监控Thread(指的是DPH),看来Ransomware攻破黑寡妇指日可待,哈哈
vm001
发表于 2016-8-29 16:36:59 | 显示全部楼层
dll形式的不是早就有了吗。。。莫家小子几个月前就发过好多啊。。。国内360也早就可以拦截这个行为了。。
jasonliul
头像被屏蔽
 楼主| 发表于 2016-8-29 17:32:31 | 显示全部楼层
驭龙 发表于 2016-8-29 15:12
蜘蛛的硬伤,不怎么监控Thread(指的是DPH),看来Ransomware攻破黑寡妇指日可待,哈哈

好像没有任何安软吹嘘对付勒索, 如何神勇..........

dsb2466
头像被屏蔽
发表于 2016-8-29 17:39:07 | 显示全部楼层
jasonliul 发表于 2016-8-29 17:32
好像没有任何安软吹嘘对付勒索, 如何神勇..........

你可以去看看这家:http://fuwu.360.cn/agreement.html
jasonliul
头像被屏蔽
 楼主| 发表于 2016-8-29 17:40:58 | 显示全部楼层
dsb2466 发表于 2016-8-29 17:39
你可以去看看这家:http://fuwu.360.cn/agreement.html



仆街~~~
驭龙
发表于 2016-8-29 17:57:46 | 显示全部楼层
jasonliul 发表于 2016-8-29 17:32
好像没有任何安软吹嘘对付勒索, 如何神勇..........

是的,只是蜘蛛相对的稍微好一点,但也并不是很强,只是相对的好一点而已
jasonliul
头像被屏蔽
 楼主| 发表于 2016-8-29 18:02:32 | 显示全部楼层
驭龙 发表于 2016-8-29 17:57
是的,只是蜘蛛相对的稍微好一点,但也并不是很强,只是相对的好一点而已

俄圈的测试, 目前防御模块做得最好是这个

AntiRansom 反勒索工具
http://www.winpatrol.com

所以破解也是特殊待遇, 限制级分享, 任何公开将不再提供破解.
也是给厂商尽量做得好一些.

驭龙
发表于 2016-8-29 18:05:20 | 显示全部楼层
jasonliul 发表于 2016-8-29 18:02
俄圈的测试, 目前防御模块做得最好是这个

AntiRansom 反勒索工具

没玩过,不过我还是继续蜘蛛吧,毕竟蜘蛛DLP功能对付Ransomware是最强手段,哈哈
jasonliul
头像被屏蔽
 楼主| 发表于 2016-8-29 18:07:10 | 显示全部楼层
驭龙 发表于 2016-8-29 18:05
没玩过,不过我还是继续蜘蛛吧,毕竟蜘蛛DLP功能对付Ransomware是最强手段,哈哈

Winpatrol之前的小白狗很鸡肋, 现在改成一条棕色狗.

俺也木有测试...
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-11-25 10:33 , Processed in 0.140624 second(s), 17 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表