Ransom.Win64.RECRANS.THEOHBC
Win64:RansomX-gen [Ransom] (AVAST)
Windows
恶意软件类型:
Ransomware
有破坏性?:
没有
加密?:
In the Wild:
是的
概要
它以文件的形式出现在系统中,可能是其他恶意软件投放的,或者是用户在访问恶意网站时无意中下载的。
技术详细信息
???????
It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
??
???????:
- %Public%\2134A99F204DAB9E5574EE51B87C57DCF7483B6F
- %Public%\noise.bmp
???????:
- reg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" /va /f
- reg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers" /f
- reg add "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers"
- cd %userprofile%\documents\
- attrib Default.rdp -s -h
- del Default.rdp
- for /F "tokens=*" %1 in ('wevtutil.exe el') DO wevtutil.exe cl "%1"
- /c del {Malware File Path} > nul
??????
???????????,??????:
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Policies\
System
Wallpaper = %Public%\noise.bmp
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Policies\
System
WallpaperStyle = 4
(Note: The default value data of the said registry entry is 0.)
????????????????:
- %Public%\noise.bmp
??????
?????????:
- It encrypts files found in the following drives:
- Unkown Drive
- No Root Directory Drive
- Removable Drive
- Fixed Drive
- Remote Drive
- It shows its logs within the command prompt.
- It deletes itself after execution.
解决方案
Step 2
??Windows ME?XP??,????,????????????,??????????
Step 3
注意:在此恶意软件/间谍软件/灰色软件执行期间,并非所有文件、文件夹和注册表键值和项都会安装到您的计算机上。这可能是由于不完整的安装或其他操作系统条件所致。如果您没有找到相同的文件/文件夹/注册表信息,请继续进行下一步操作。
Step 4
??????????
????:????Windows???????????????????????????????????????????,????Microsoft??,????????????
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
- Wallpaper = %Public%\noise.bmp
- Wallpaper = %Public%\noise.bmp
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
- WallpaperStyle = 4
- WallpaperStyle = 4
Step 5
????????
- %Public%\2134A99F204DAB9E5574EE51B87C57DCF7483B6F
- %Public%\noise.bmp
- {Encrypted Directory}/HOW_TO_RECOVERY_FILES.txt
Step 6
?????????????,???????Ransom.Win64.RECRANS.THEOHBC?? ????????????????????????,????????????????????????????????????????
Step 7
从备份中恢复加密文件。