How to analyze XiaoBa ransomware variants
Overview
XiaoBa ransomware is a new type of computer virus. It is a highly domestically produced ransomware virus. It is mainly spread through emails, program Trojans, and web page hanging horses. . This virus uses various encryption algorithms to encrypt files, making it difficult for the infected to decrypt them. Only by obtaining the decrypted private key can the virus be successfully cracked. If the ransom is not paid within 200 seconds, all encrypted files will be destroyed.
The above description is taken from Baidu Encyclopedia, but the XiaoBa variant I analyzed does not have the above behavioral characteristics, but it has strong concealment and infectivity, and has file encryption, file deletion and mining. Three main functions.
Sample Analysis
This sample has been analyzed by Weibu Cloud Sandbox (see "Reference Links" for related links) and confirmed to be a malicious sample
Behaviour diagram
Permission adjustment
After running the sample, first adjust the process permissions to ensure that you have sufficient permissions for subsequent operations Operation
This path Judgment: The sample will determine whether the current execution path is%systemroot%\ 360 \ 360safe \ deepscan directory. directory and execute. If you are in this path, you will first perform some operations related to modifying system settings:
Modify file attributes
To set the file attributes to protected system files, you need to enter the "folder and Uncheck the "Hide protected operating system files (recommended)" option in Search Options" to see
Disable UAC
Set up auto-start, create Shortcut
Disable registry
Do not show hidden files
Disable folder and search options
Create a self-boot
Remove SafeBoot option
Disk traversal
Traverse the disk, create the autorun.inf file in the root directory of the disk, write the following data, try to infect the U disk, and inevitably This file is set to be hidden
Create the folder RECYCLER\S-5-4-62-7581032776-5377505530-562822366-6588, and copy its own file in to rewrite the hosts file and redirect the security manufacturer's website
The main topic
Finally create a thread. In the thread function, XiaoBa will traverse all files and look for extensions of .exe, .com, .scr, .pif, .html, .htm, .gho , .iso files, perform different operations for different extensions. .exe, .com, .scr, .pif
rewrite these files and write their own files to the beginning of these files. If you later If you run these files, ZhuDongFangYu.exe
.html, .htm
will be run. Add the mining script
# at the end of these files. ##.gho, .isoFor these files, delete them directlyThe above is the detailed content of How to analyze XiaoBa ransomware variants. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

