Sunday, September 8, 2024
HomeMalwareNew KeyPass Ransomware Actively Attacking Around the World To Encrypt the Victim...

New KeyPass Ransomware Actively Attacking Around the World To Encrypt the Victim Files

Published on

Newly emerging KeyPass ransomware actively spreading around the world to encrypt the targetted system files and demand the ransom to the victims.

When compared to last year, currently ransomware outbreaks are very less, however, new ransomware attacks are kept increasing and the malware authors always trying to find the new method into infiltrate system to make a huge profit.

Main Payload dropped via trojan that is written in C++ and compiled in MS Visual Studio and the compiled data has been discovered from PE header.

- Advertisement - EHA

Unlike other ransomware attacks, malware authors added new futures that give to take “manual control” by default.

                                           GUI of the trojan

This capacity may be a sign that the hackers behind the Trojan mean to utilize it in manual Attacks.

KeyPass Ransomware Infection Flaw

An initial stage of propagation starts from the fake installers that download the ransomware module.

once victim clicks the malicious files and open then the trojan copies its executable to %LocalAppData% and delete itself from the original location, also it skips of some of the directories.

According to Kaspersky Researchers,  The developers of this Trojan implemented a very simplistic scheme. The malware uses the symmetric algorithm AES-256 in CFB mode with zero IV and the same 32-byte key for all files. The Trojan encrypts a maximum of 0x500000 bytes (~5 MB) of data at the beginning of each file.

KeyPass connects to its command and control (C&C) to receive the encryption key and the data is transferred over plain HTTP.

After the complete execution, it encrypts all the disk files and adds the additional extension “.KEYPASS” including images, videos, doc etc.

Later it displays the ransom notes that contain the detailed description about the decryption process of the infection file

                                                           Ransomware notes

Attackers instruct victims to contact via particular email ID(keypass@bitmessage.ch) along with victims personal ID and they demand $300 for providing the decryption key.

IOC

901d893f665c6f9741aa940e5f275952 – Trojan-Ransom.Win32.Encoder.n
hxxp://cosonar[.]mcdir.ru/get[.]php
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Vulnerabilities in IBM Products Let Attackers Exploit & Launch DOS Attack

IBM has issued a security bulletin addressing critical vulnerabilities in its MQ Operator and...

BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions...

Predator Spyware Exploiting “one-click” & “zero-click” Flaws

Recent research indicates that the Predator spyware, once thought to be inactive due to...

Tropic Trooper Attacks Government Organizations to Steal Sensitive Data

Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group,...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

Predator Spyware Exploiting “one-click” & “zero-click” Flaws

Recent research indicates that the Predator spyware, once thought to be inactive due to...

Fog Ransomware Now Targeting the Financial Sector; Adlumin Thwarts Attack

The Fog Ransomware group, known for targeting education and recreation sectors, has expanded its...

Researchers Unpacked AvNeutralizer EDR Killer Used By FIN7 Group

FIN7 (aka Carbon Spider, ELBRUS, Sangria Tempest) is a Russian APT group that is...