Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Trojan.Encoder.293

Added to the Dr.Web virus database: 2013-08-26

Virus description added:

An encryption ransomware written in Delphi. This Trojan is a later modification of Trojan.Encoder.102 and is similar to its predecessor in many ways. The Trojan performs two-tier file encryption. First, data blocks of 0x200 bytes are encrypted using the XOR algorithm (the block length and gamma can vary). Then files are encrypted with the RSA algorithm. The Trojan adds additional extensions to the names of the encrypted files.

  • Additional extensions *.HELP@AUSI.COM_XQxxx, *.HELP@AUSI.COM_XOxxx, contact email—HELP@AUSI.COM
  • Additional extension *.sos@ausi.com_ZQxxx, contact email—sos@ausi.com
  • Additional extension *.SAD@FIREMAN.NET_AMxxx, contact email—SAD@FIREMAN.NET
  • Additional extension *.COMODO@EXECS.COM_hexxxx, contact email—COMODO@EXECS.COM
  • Additional extension *.SOS@AUSI.COM_IDxxx, contact email—SOS@AUSI.COM
  • Additional extension *.ZANZIBAR@umpire.com_ZAxxx, contact email—ZANZIBAR@umpire.com
  • Additional extensions *.REDBULL@PRIEST.COM_RBxxx or *.REDBULL@PRIEST.COM_RExxx, contact email—REDBULL@PRIEST.COM
  • Additional extension *.Heinz@oaht.com_hxxx, contact email—Heinz@oath.com
  • Additional extension *.NUMBAZA@SEZNAM.CZ_Qxxx, contact email—NUMBAZA@SEZNAM.CZ
  • Additional extension *.backspace@riseup.net_xxx, contact email—backspace@riseup.net
  • Additional extension *.SOS@AUSI.COM_FGxxx
  • Additional extension *.numlock@riseup.net_*, contact email—numlock@riseup.net
  • Additional extension *.starpex@riseup.net_*, contact email—starpex@riseup.net
  • Additional extension *.HELP@AUSI.COM_XE, contact email—HELP@AUSI.COM
  • Additional extension *.numlock@2riseup.net_*
  • Additional extension *.HELP@AUSI.COM_DE*
  • Additional extension *.oduvansh@aol.com_*, contact email—oduvansh@aol.com
  • Additional extension *.evromaidan2014@aol.com_*, contact email—evromaidan2014@aol.com (not to be confused with the cases WITHOUT extensions!)
  • Additional extension *.byaki_buki@aol.com_*
  • Additional extension *.iizomer@aol.com_*
  • Additional extension *.Support@casinomtgox.com*, usually *.Support@casinomtgox.com_lot*
  • Additional extension *.kolobocheg@aol.com_*
  • Additional extension *.anna_stepanova@aol.com_*
  • Additional extensions *.two@AUSI.COM, *.ONE@AUSI.COM
  • Additional extension *.moshiax@aol.com_*
  • Additional extension *.contact@casinomtgox.com (Trojan modifications that use this extension were detected on July 15, 2014)

During the first step, the number of encrypted blocks depends on the original file size. Blocks are encrypted in threes in one cycle, then an offset of one block is performed and other 3 blocks are encrypted, etc. During the second step, a block of 0x31 is completed with space characters until it has the size of 0x62. Then the bytes in the even positions get values by the following formula:

 str[2 * i - 2] = str [ i - 1], i = n..1, 

where n indicates the string length (31 bytes). The read block is replaced with the sequence of ')' symbols (0x29). The block with the displaced bytes is converted into a hexadecimal string, which is encrypted using the RSA algorithm. Space characters are added to the encrypted string. The first bytes are moved to odd positions. Then the string is converted into a hexadecimal notation and added to the end of the file.

screen

Currently, Doctor Web possesses a technology that can help decrypt the data encrypted by this malicious program (if the Trojan itself is available). If the malware’s executable file is not available, it is possible to decrypt the information partially.

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android