Installation
This ransomware is distributed through an infected Microsoft Word file which might have gotten into your PC through an email spam.
It also downloads a password-protected .rar file containing an executable file from hxxp://ripola.net/cont/prolab.rar.
It also drops Danilova.pdf (08ba440a2c8b54feb5c314e79d908582f97f0626) and displays it on your the screen.
Payload
Encrypts files
This ransomware encrypts files with the following extensions:
| .323 |
.cxx |
.hxx |
.mp3 |
.pdf |
.rt |
.swf |
.wma |
| .aab |
.dbf |
.ico |
.mp4 |
.pfr |
.rtsp |
.sxc |
.wmd |
| .aam |
.dcr |
.iii |
.mpa |
.pgm |
.rtx |
.sxg |
.wml |
| .aas |
.deb |
.ims |
.mpe |
.pict |
.rv |
.sxi |
.wmlc |
| .abw |
.dir |
.ins |
.mpeg |
.pkg |
.scd |
.sxm |
.wmls |
| .ai |
.dist |
.iso |
.mpg |
.pko |
.scm |
.sxw |
.wmlsc |
| .aiff |
.distz |
.ivf |
.mpkg |
.pl |
.sda |
.t |
.wmp |
| .arj |
.dll |
.jar |
.mpp |
.png |
.sdc |
.tar |
.wms |
| .art |
.dmg |
.java |
.ms |
.pnm |
.sdd |
.targa |
.wmv |
| .asf |
.doc |
.jpe |
.msi |
.pnq |
.sdp |
.tcl |
.wmx |
| .asx |
.dot |
.jpeg |
.mvb |
.pntg |
.ser |
.tex |
.wmz |
| .au |
.dvi |
.jpg |
.nix |
.pot |
.setpay |
.texi |
.wp5 |
| .avi |
.dxr |
.js |
.nml |
.ppm |
.setreg |
.texinfo |
.wpd |
| .bat |
.ebk |
.karbon |
.o |
.pps |
.sgi |
.tgz |
.wpl |
| .bcpio |
.eps |
.kfo |
.oda |
.ppt |
.sgm |
.tif |
.wps |
| .bmp |
.evy |
.kon |
.odb |
.ppz |
.sgml |
.torrent |
.wri |
| .bz2 |
.exe |
.kpr |
.odc |
.ps |
.sh |
.tr |
.wsc |
| .c++ |
.fdf |
.kpt |
.odf |
.psd |
.shar |
.trm |
.wvx |
| .c |
.fif |
.kwd |
.odg |
.pub |
.shtml |
.troff |
.xbm |
| .cab |
.flc |
.kwt |
.odi |
.qcp |
.shw |
.tsp |
.xbm |
| .cat |
.flm |
.latex |
.odm |
.qpw |
.sit |
.ttz |
.xfdf |
| .cc |
.fml |
.lcc |
.odp |
.qtif |
.skd |
.txt |
.xlb |
| .ccn |
.gif |
.lha |
.ods |
.qtl |
.skm |
.uin |
.xls |
| .cco |
.gnumeric |
.lrm |
.odt |
.ra |
.skp |
.uls |
.xml |
| .cdf |
.gsm |
.ls |
.ogg |
.ram |
.skt |
.urls |
.xpi |
| .cer |
.gtar |
.lzh |
.otg |
.rar |
.smf |
.ustar |
.xpm |
| .chm |
.gz |
.m13 |
.oth |
.rdf |
.smi |
.vcd |
.xps |
| .chrt |
.h++ |
.m14 |
.otp |
.rf |
.smil |
.vcf |
.xsd |
| .cil |
.h |
.m3u |
.ots |
.rgb |
.spl |
.vor |
.xul |
| .class |
.hdf |
.man |
.ott |
.rjs |
.ssm |
.vsl |
.xwd |
| .clp |
.hh |
.mdb |
.p10 |
.rm |
.sst |
.wav |
.z |
| .com |
.hlp |
.me |
.p12 |
.rmf |
.stc |
.wax |
.zip |
| .cpio |
.hpf |
.mid |
.p7b |
.rmp |
.std |
.wb1 |
.zoo |
| .cpp |
.hpp |
.mjf |
.p7m |
.rms |
.sti |
.wb2 |
|
| .cpt |
.hqx |
.mny |
.p7r |
.rmx |
.stl |
.wb3 |
|
| .cqk |
.hta |
.mocha |
.p7s |
.rnx |
.stw |
.wbmp |
|
| .crd |
.htc |
.mov |
.p |
.rp |
.sv4cpio |
.wcm |
|
| .crl |
.htm |
.movie |
.package |
.rpm |
.sv4crc |
.wdb |
|
| .csh |
.html |
.mp2 |
.pas |
.rsml |
.svg |
.wks |
|
| .css |
.htt |
.mp3 |
.pbm |
.rss |
.svi |
.wm |
|
Deletes files
When the downloaded binary runs, it searches all your disks for interesting file extensions (see the table above), sends it to sales@ ripola.net, and deletes it from system.
It also deletes known backup file extensions like .bak, .backup, .tib, .tbk, .bak, .bac, .abk, .as4, .asd, .ashbak, and so forth, to prevent you from backing your files up.
Installs certificates without your consent
This ransomware also installs a root certificate for code signing (2a56ea56487cd919e7ddee2ae212a9d8739f49d0) and the downloaded binary is signed with this certificate.
The intention might have been to look legitimate, avoid AV sample collection, detection, and so forth.
Note: This ransomware's modus operandi works in Windows XP but not in Windows 7 since it needs to query for administrator privilege, which it doesn't do, and that leads to certificate installation failure.
It also registers a fraud root certificate as Adobe.
Changes registry entries
This ransomware also checks and marks itself as installed in HKCU\Software\Adobe\Installed.
After it downloads a password-protected .rar file containing an executable file from hxxp://ripola.net/cont/prolab.rar. It unpacks it, and registers the downloaded file to HKCU\Software\Microsoft\Windows\RunOnce. It does not run it directly, though.
The following SHA1s were used in this analysis:
| Files |
SHA1s |
| .Doc or .docx |
|
| 485d7cbed93a9019d3c0622a243d0545af46193b |
| c71781c998f773feb08fc585bb8e8df3d7bf6344 |
| |
|
| .Exe |
|
| 1f2c387fb698fdd9c35ff85e4c96d8de27bfdf4e |
| 3d95d1e3ab3565c628f5333a51716f2f76cbf93a |
| c3c34f7a9aef2a5e063919597bc1095cf0699801 |
| 4a7f92e871ba0ce82b2bd57fd0eebb1de6fa7b60 |
| 9af017f13cc4cdf1c7590b64d30234b0ab52285f |
| a2f1c5b20c4c8991031f865f3ec0350c591b7d50 |
| b7b4982261e847e8ba64d42fc6845f3670d3b5ca |
| 5c21c249166ac7447474294cb467ace3b768b77e |
| b12e3514471758ad48b0c666fea26081bf8fbcef |
| 4056e30d9d42ed89a53e68be7df6c7ab2c9258ca |
| e0748aea6ec92515fe31b641623bc1bb672c1601 |
| ba1c5db5bf4445703603b2847bc52b89ad1f4383 |
| |
|
| Downloaded .exe |
|
| c957e05983073a88287b27ddd6fb859363022607 |
Analysis by Marianne Mallen