Azer Ransomware
Posted: July 7, 2017
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 7 |
First Seen: | July 7, 2017 |
---|---|
OS(es) Affected: | Windows |
The Azer Ransomware is an update of the CryptoMix or CryptMix Ransomware family and retains the defining feature of using encryption to lock your files so that it can collect ransoms. Besides minor changes to how it formats symptoms such as its text messages, the Azer Ransomware also includes offline features that can damage your files without requiring Internet connectivity. Users should backup their content, when possible, and use anti-malware solutions for eliminating the Azer Ransomware at the earliest opportunity.
A Remix of Data-Locking Tactics
While clones and small revisions of large Trojan families like Hidden Tear are as commonplace as ever, what's easiest for threat actors often results in exploitable vulnerabilities for the anti-malware industry to convert into security and data retrieval solutions. The people maintaining the latest versions of the CryptMix Ransomware appear to be taking steps to counteract these defenses. The latest update, dubbed the Azer Ransomware, uses different keys for its encoding routine, as well as other changes both superficial and internal.
The Azer Ransomware's most important change is a departure from the Command & Control networking features found in the penultimate version of the family, the Mole02 Ransomwar. Rather than using C&C server communications, the Azer Ransomware locks the user's files by selecting one of an internal list of keys for encryption randomly. Consequently, even PCs offline completely are at risk from this threat's attacks, which render select files, by format and location, indecipherable until their owner can decrypt them.
On a more aesthetic level, the Azer Ransomware also creates slightly different text messages to ask for money for its threat actors' decryption help, with e-mail addresses that malware analysts note in previous attacks by related file-encrypting Trojans. The locked files also use new extensions that embed the e-mail address for negotiating, along with the '.AZER' string. Because the Azer Ransomware also encodes the rest of the filename, the user may find it difficult to identify the contents of any locked media.
Stopping Your Files from Getting Mixed Up with Threat Business
It's almost certainly no accident that the Azer Ransomware's release comes fast on the heels of the creation of a free decryption solution for the Mole02 Ransomware, which was the last version of this family to be used against the public. Although malware experts see no encryption obfuscation increased particularly from the Azer Ransomware, its slight differences in the encoding methodology will prevent old decryptor applications from being compatible with its output. For the immediate future, victims of the Azer Ransomware infections only may have backups to keep their files from being locked or be forced to pay the ransom.
Trojan campaigns specializing in data-based hostage-taking most often benefit from the help of e-mail messages, Web browser-based exploits, and con artists gaining access to a server's login credentials. Standard anti-malware products can block all but the latter technique by various means. An appropriate response to an attempted attack includes blocking and quarantining or deleting the Azer Ransomware with a security product that's effective against old versions of the Cryptmix Ransomware, which cuts off the encryption function before it starts.
The Azer Ransomware may be a signal of where threat actors are heading in the future: with less dependence on external resources to commit the same attacks as always. Whether or not its payload philosophy is an outlier, the Trojan can't escape the fact that the simplest way to keep yourself safe is to use a backup, combined with good security programs.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:file.exe
File name: file.exeSize: 219.13 KB (219136 bytes)
MD5: 70d5953b7cc23387ab23563220e83be4
Detection count: 73
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: July 9, 2017
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.