{"id":17502,"date":"2015-05-04T09:37:31","date_gmt":"2015-05-04T15:37:31","guid":{"rendered":"https://www.webroot.com/blog/?p=17502"},"modified":"2018-01-30T11:01:20","modified_gmt":"2018-01-30T18:01:20","slug":"alphacrypt","status":"publish","type":"post","link":"https://www.webroot.com/blog/2015\/05\/04\/alphacrypt\/","title":{"rendered":"AlphaCrypt"},"content":{"rendered":"<p>We&#8217;ve encountered yet another encrypting ransomware variant and\u00a0at this point it&#8217;s expected since the scam has exploaded in popularity since it&#8217;s inception in late 2013. This one has a GUI that is almost identical to <a href=\"https://www.webroot.com/blog/2015\/03\/12\/teslacrypt-encrypting-ransomware-that-now-grabs-your-games\/\">TeslaCrypt<\/a>.<\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/GUI.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-17503\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/GUI-300x300.png\" alt=\"GUI\" width=\"300\" height=\"300\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/GUI-300x300.png 300w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/GUI-150x150.png 150w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/GUI-1024x1024.png 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>While this may look identical to TeslaCrypt it does have some improvements like deleting the VSS to make sure you aren&#8217;t saved by your shadow volume. Take a look at the below strings from an unpacked memory dump.<\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/alpha1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-17506\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/alpha1-300x300.png\" alt=\"VSS delete\" width=\"300\" height=\"300\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/alpha1-300x300.png 300w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/alpha1-150x150.png 150w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/alpha1-1024x1024.png 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>We can very clearly see that it opens up a command prompt and runs the command &#8220;vssadmin.exe delete shadows \/all \/Quiet&#8221; This will ensure that all shadow copies are deleted and the \/Quiet will make sure that the command does not display messages to the user while its running.<\/p>\n<p>Payment is similar to recent variants &#8211; bitcoin through layered tor browsing. Not using a money mule like ukash or moneypak allows the authors to maximize thier earning power and anonymity. They can just take the full ransom amount and put through a bitcoin mixer that will use sophisticated algorithms to scramble it through millions of addresses and completely &#8220;clean&#8221; the money.<\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/bitcoin.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-17511\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/bitcoin-300x300.png\" alt=\"bitcoin launder\" width=\"300\" height=\"300\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/bitcoin-300x300.png 300w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/bitcoin-150x150.png 150w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/bitcoin-1024x1024.png 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>A more convenient feature this variant of encrypting ransomware\u00a0has is that you are not immediately forced to use install the tor browser and will instead try and use URLs that use public gates to the secret server through your current installed browser. However, these don&#8217;t always work so the backup option is to install Tor like we&#8217;ve seen previously. See the entire ransom notice below.<\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/alpha2.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-17508\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/alpha2-300x300.png\" alt=\"Ransom notice\" width=\"300\" height=\"300\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/alpha2-300x300.png 300w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/alpha2-150x150.png 150w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/alpha2-1024x1024.png 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>The volatitlity of this variant is quite high since it creates new instances of common windows processes to do the encryption routine to try and be as covert as possible and is extremely similar to how Cryptowall 3.0 opertates. Below\u00a0is the final bit of unpacking, where it sets the child process context and resumes the thread.<\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/alpha3_unpackingroutine.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-17513\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/alpha3_unpackingroutine-300x300.png\" alt=\"unpacking routine\" width=\"300\" height=\"300\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/alpha3_unpackingroutine-300x300.png 300w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/alpha3_unpackingroutine-150x150.png 150w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/05\/alpha3_unpackingroutine-1024x1024.png 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>MD5 analysed: 1C71D29BEDE55F34C9B17E24BD6A2A31<br \/>\nAditional MD5 seen: 6B19E4AE0FA5B90C7F0620219131A12D<\/p>\n<p>Webroot will catch this specific variant in real time and heuristically before any encryption takes place. We\u2019re always on the look out for more, but just in case of new zero day variants, remember that with encrypting ransomware the best protection is going to be a good backup solution. This can be either through the cloud or offline external storage. Keeping it up to date is key so as not to lose productivity. Webroot has backup features built into our consumer product that allow you to have directories constantly synced to the cloud. If you were to get infected by a zero day variant of encrypting ransomware you can just restore your files back as we save a snapshot history for each of your files up to ten previous copies. Please see our <a href=\"https:\/\/community.webroot.com\/t5\/Webroot-Education\/Best-practices-for-securing-your-environment-against\/ta-p\/191172\">community post <\/a>on best practices for securing your environment against encrypting ransomware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;ve encountered yet another encrypting ransomware variant and\u00a0at this point it&#8217;s expected since the scam has exploaded in popularity since it&#8217;s inception in late 2013. This one has a GUI that is almost identical to TeslaCrypt. While this may look identical to TeslaCrypt it does have some improvements like deleting the VSS to make sure [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":17503,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[5451,15941,5443,5435,15393,18593,4197,4487,3937,8015,18597,5205,15739,3471,5439,18595,18591,4201,4161,3525],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/17502"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=17502"}],"version-history":[{"count":9,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/17502\/revisions"}],"predecessor-version":[{"id":17591,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/17502\/revisions\/17591"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17503"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=17502"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=17502"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=17502"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=17502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}