Ransom.Win32.NOKO.THDABBC
Ransom:Win32/Nokonoko.PB!MTB (MICROSOFT); Win32:Nokoyawa-A [Trj] (AVAST)
Windows
恶意软件类型:
Ransomware
有破坏性?:
没有
加密?:
没有
In the Wild:
是的
概要
它以文件的形式出现在系统中,可能是其他恶意软件投放的,或者是用户在访问恶意网站时无意中下载的。
技术详细信息
???????
It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
??
???????:
- if --safe-mode commandline parameter is used:
- "%System%\bcdedit.exe" /set {default} safeboot network
- "%System%\shutdown.exe" -r
(??: %System% ? Windows ? system ???,???? C:\Windows\System (Windows 98 ? ME)?C:\WINNT\System32 (Windows NT ? 2000) ? C:\WINDOWS\system32 (Windows 2000(32-bit)?XP?Server 2003(32-bit)?Vista?7?8?8.1?2008(64-bit),2012(64bit) ? 10(64-bit))?)
?????
???????????,???????,??????????????:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Control\SafeBoot\Network\
nokonoko ? if --safe-mode commandline parameter is used.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\nokonoko ? if --safe-mode commandline parameter is used.
??????
?????????:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Control\SafeBoot\Network\
nokonoko ? if --safe-mode commandline parameter is used.
(Default) = Service
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Control ? if --safe-mode commandline parameter is used.
ServicesPipeTimeout = 86400000
??????
?????????:
- It encrypts files found in the following drives:
- Fixed Drives
- Removable Drives
- Remote (Network) Drives
- The following can be changed in the runtime configuration:
- Directories to avoid
- File extensions to avoid
- Ransom note content
- Ransom note filename
- Appended extension of encrypted files
- Encryption of network shares
- Delete shadow copies
- Loading of hidden drives
- It shows the following message box when the --config argument is improperly encoded:
- It adds the following service if --safe-mode commandline parameter is used:
- Service Name: nokonoko
Display Name: shmokoshmoko
Path to exectuable: {Malware File Path}\{Malware File Name}.exe --config {Base64 encoded config}
Start Type: Auto start
解决方案
Step 2
??Windows ME?XP??,????,????????????,??????????
Step 3
注意:在此恶意软件/间谍软件/灰色软件执行期间,并非所有文件、文件夹和注册表键值和项都会安装到您的计算机上。这可能是由于不完整的安装或其他操作系统条件所致。如果您没有找到相同的文件/文件夹/注册表信息,请继续进行下一步操作。
Step 4
????????
Step 5
??????????
????:????Windows???????????????????????????????????????????,????Microsoft??,????????????
- In HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Network\nokonoko
- (Default) = Service
- (Default) = Service
- In HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control
- ServicesPipeTimeout = 86400000
- ServicesPipeTimeout = 86400000
Step 6
????????
????:????Windows???????????????????????????????????????????,????Microsoft??,????????????
- In HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Network\nokonoko
- In HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\nokonoko
Step 7
?????????
- {Encrypted Directory}\NOKONOKO-readme.txt
- {Encrypted Directory}\NOKONOKO-readme.txt
Step 8
????????,?????????????,??Ransom.Win32.NOKO.THDABBC?? ????????????????????????,????????????????????????????????????????
Step 9
从备份中恢复加密文件。