Laboratório de vírus Avira

TR/Crypt.EPACK.24962

  • Nome
    TR/Crypt.EPACK.24962
  • Data em que surgiu
    25/02/2016
  • Tipo
    Malware
  • Impacto
    Médio 
  • Infecções relatadas
    Baixo 
  • Sistema operacional
    Windows
  • Versão do VDF
    7.11.98.122 (2013-08-27 21:08)

O termo 'TR' refere-se a um Cavalo de Troia que pode espionar dados, violar sua privacidade ou realizar modificações indesejadas no sistema.

O arquivo pode ser usado por usuários desonestos ou malware para diminuir as configurações de segurança.

Sistema operacional: Microsoft Windows.

  • VDF
    7.11.98.122 (2013-08-27 21:08)
  • Alias
    Avast: Win32:Malware-gen
    AVG: FileCryptor.HOO
    Dr. Web: Trojan.Encoder.3976
    Trend Micro: Ransom_LOCKY.E
    Microsoft: Ransom:Win32/Locky.A
    G Data: Trojan.GenericKD.3066022
    Kaspersky Lab: Trojan-Ransom.Win32.Locky.ba
    Bitdefender: Trojan.GenericKD.3066022
    ESET: Win32/Filecoder.Locky.A trojan
  • Arquivos
    Os seguintes arquivos foram renomeados:
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\excel4.xls
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\excel.xls
    • %USERPROFILE%\Templates\winword2.doc
    • %USERPROFILE%\Templates\powerpnt.ppt
    • %USERPROFILE%\Templates\excel4.xls
    • %USERPROFILE%\Templates\excel.xls
    • %USERPROFILE%\Templates\winword.doc
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\winword2.doc
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\winword.doc
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\powerpnt.ppt
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\eula.1040.rtf
    • %DISKDRIVE%\totalcmd\REGISTER.RTF
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\eula.1028.rtf
    • %USERPROFILE%\Templates\quattro.wb2
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\quattro.wb2
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\eula.1037.rtf
    • %DISKDRIVE%\AUTOEXEC.BAT
    • %temporary internet files%\Content.IE5\QH9ZEEV0\deliver[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\dapmsn[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\download[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\Q9HNXVQDZNM[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\select[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\sf.dwnld[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\3eh[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\script_300_250[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\adframe[2].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\4a0253de6eac448d8f2c39c53f8926[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\abg[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\render_ads[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\min[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\show_ads[2].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\A524879_300_250[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\jquery.outerhtml[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\modernizr.custom.90514[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\jquery-1.4.2.min[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\fZnvW9PtDSQ[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\dd_belatedpng[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\ec22e9952c2296e3b17de63cd1bea1f2[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\anatm[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\deliver[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\ga[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\beacon[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\8WhVgFJlDOQ[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\bootstrap[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\script_300_250[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\en[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\jquery-1.5.1[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\jquery[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\min[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\show_ads_impl[2].js
    • %USERPROFILE%\Cookies\biluta@www.msn[1].txt
    • %USERPROFILE%\Cookies\[email protected][2].txt
    Os seguintes arquivos foram alterados:
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\excel4.xls
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\excel.xls
    • %USERPROFILE%\Templates\winword2.doc
    • %USERPROFILE%\Templates\powerpnt.ppt
    • %USERPROFILE%\Templates\excel4.xls
    • %USERPROFILE%\Templates\excel.xls
    • %USERPROFILE%\Templates\winword.doc
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\winword2.doc
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\winword.doc
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\powerpnt.ppt
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\eula.1040.rtf
    • %DISKDRIVE%\totalcmd\REGISTER.RTF
    • %DISKDRIVE%\AUTOEXEC.BAT
    • %temporary internet files%\Content.IE5\QH9ZEEV0\deliver[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\dapmsn[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\download[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\Q9HNXVQDZNM[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\select[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\sf.dwnld[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\3eh[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\script_300_250[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\adframe[2].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\4a0253de6eac448d8f2c39c53f8926[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\abg[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\render_ads[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\min[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\show_ads[2].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\A524879_300_250[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\jquery.outerhtml[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\modernizr.custom.90514[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\jquery-1.4.2.min[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\fZnvW9PtDSQ[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\dd_belatedpng[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\ec22e9952c2296e3b17de63cd1bea1f2[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\anatm[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\deliver[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\ga[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\beacon[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\8WhVgFJlDOQ[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\bootstrap[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\script_300_250[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\en[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\jquery-1.5.1[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\jquery[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\min[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\show_ads_impl[2].js
    • %USERPROFILE%\Cookies\biluta@www.msn[1].txt
    • %USERPROFILE%\Cookies\[email protected][2].txt
    • %USERPROFILE%\Cookies\biluta@www.bing[1].txt
    • %USERPROFILE%\Cookies\[email protected][2].txt
    • %USERPROFILE%\Cookies\[email protected][1].txt
    • %USERPROFILE%\Cookies\[email protected][1].txt
    Os seguintes arquivos foram criados:
    • %DISKDRIVE%\totalcmd\_Locky_recover_instructions.txt
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\_Locky_recover_instructions.txt
    • %USERPROFILE%\Templates\_Locky_recover_instructions.txt
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\_Locky_recover_instructions.txt
    • %DISKDRIVE%\_Locky_recover_instructions.txt
    • %temporary internet files%\Content.IE5\QH9ZEEV0\_Locky_recover_instructions.txt
    • %temporary internet files%\Content.IE5\LV2JIAKP\_Locky_recover_instructions.txt
    • %temporary internet files%\Content.IE5\5KMEPSXE\_Locky_recover_instructions.txt
    • %temporary internet files%\Content.IE5\A9SFWXZG\_Locky_recover_instructions.txt
    • %USERPROFILE%\Cookies\_Locky_recover_instructions.txt
  • Registro
    São adicionadas as seguintes entidades de registro:
    • [HKEY_CURRENT_USER\Software\Locky] "id" = "74203292F1D3897A" "pubkey" = %hex values% "paytext" = %hex values%
  • Pedidos HTTP
    • 91.*****.97.170/main.php

Ajude a tornar a rede mais segura enviando-nos arquivos/URLs suspeitos para análise.

Envie o seu arquivo/URL Ou Acesse o Avira Answers

Porque enviar um arquivo suspeito?

Se você encontrou um arquivo ou um website suspeito que não está na nossa base de dados, nós analisaremos e determinaremos se ele é nocivo. As nossas descobertas são, então, enviadas aos nossos milhões de usuários através da próxima atualização da base de dados de vírus. Se você possui o Avira, você obterá essa atualização também. Não possui o Avira? Obtenha-o através do nossa página inicial.

O que é o Avira Answers?

Esta é a nossa próspera comunidade de profissionais técnicos e especialistas a meio período, trabalhando em conjunto para ajudar a resolver os problemas da tecnologia. É o lugar perfeito onde fazer as suas perguntas, em uma comunidade de colegas usuários do Avira.