Home Malware Programs Ransomware Telecrypt Ransomware

Telecrypt Ransomware

Posted: November 10, 2016

Threat Metric

Threat Level: 10/10
Infected PCs: 5
First Seen: November 10, 2016
Last Seen: December 18, 2020
OS(es) Affected: Windows

The Telecrypt Ransomware is a Trojan that encrypts your files with the support of a Telegram-based C&C infrastructure, and then, loads a module that delivers a graphical ransom message demanding payment. These attacks are most preventable by PC users keeping backups and having anti-malware products able to block the threat's early infection vectors. PC users failing to prevent an infection should remove the Telecrypt Ransomware with a dedicated anti-malware program and employ alternatives to its ransom offer, such as seeking help from trustworthy malware researchers.

A Telegram from Russia No One Wants to Hear

The puzzle of building reliable network communications with a minimal symptomatic footprint, for as little work as possible, is one of the recurring problems threat authors face when designing new Trojans. At least one threat actor, most likely based in Russia, has chosen the inventive method of using the Telegram Messenger app for ferrying instructions and critical information. The Telecrypt Ransomware encrypts files via a simple algorithm and, then, loads decryption-selling messages to take money from the victim.

The Telecrypt Ransomware is a Delphi-based threat of only several megabytes in size. Once it compromises a PC with network access, the Trojan pings a Telegram-based bot and transfers information such as the encryption seed and a unique identification number. The Telecrypt Ransomware encrypts a handful of formats including Word documents, XLS spreadsheets, several formats of images (such as JPEG) and PDF documents.

The threat also places a text list of the affected content on the user's desktop. Since the Telecrypt Ransomware includes an option to refrain from modifying an encrypted file's name, that database can be the simplest way of identifying the encoded content. When it does change the name, the Telecrypt Ransomware appends the '.xcri' extension.

As its last action, the Telecrypt Ransomware loads an 'Informer' module that downloads and displays a graphical pop-up asking for ransom money.

Trimming Down the Cost of Keeping Your Files Safe

The Telecrypt Ransomware's module offers victims an easily-navigable interface for paying its five thousand rubles (equal to roughly eighty USD) fee for recovering content, but no special protection for the decryption service. The Trojan's encryption algorithm is a simple formula that adds each file byte to the bytes of the key and may be open to a third party's decoding efforts. When no other alternatives are available, malware experts recommend contacting security researchers or organizations historically willing to assist with Trojan decryption scenarios.

The Telecrypt Ransomware requires an Internet connection to access its Telegram Command & Control server. If you suspect the presence of a the Telecrypt Ransomware infection on your PC, disconnect your machine from the Internet and restart in Safe Mode. Running anti-malware solutions and removing the Telecrypt Ransomware immediately may counter it before it encrypts all vulnerable files. Worst cases may require backups or face the permanent loss of all encrypted data.

Since the authorities could, in theory, use Telegram to trace this campaign back to its administrator or close the affected servers, the Telecrypt Ransomware's innovation may be ill-chosen. However, for the moment, the Trojan's expensive messages represent a costly risk to any Russian-speaking PC users.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%SYSTEMDRIVE%\Users\<username>\Desktop\sssssssssssssssssssssssssssssssssssssssssssss\3d7dd597a465d5275ef31d9e4f9dd80ed4de6139a1b3707cb3b0ffa068595567 File name: 3d7dd597a465d5275ef31d9e4f9dd80ed4de6139a1b3707cb3b0ffa068595567
Size: 3.22 MB (3227136 bytes)
MD5: 3e24d064025ec20d6a8e8bae1d19ecdb
Detection count: 48
Path: %SYSTEMDRIVE%\Users\<username>\Desktop\sssssssssssssssssssssssssssssssssssssssssssss\3d7dd597a465d5275ef31d9e4f9dd80ed4de6139a1b3707cb3b0ffa068595567
Group: Malware file
Last Updated: December 18, 2020
Xhelp.exe File name: Xhelp.exe
Size: 7.57 MB (7576064 bytes)
MD5: 14d4bc13a12f8243383756de92529d6d
Detection count: 47
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: November 10, 2016
Loading...