TeslaCrypt Ransomware
Posted: February 27, 2015
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 2,180 |
First Seen: | February 27, 2015 |
---|---|
Last Seen: | April 16, 2023 |
OS(es) Affected: | Windows |
TeslaCrypt is a file encryptor Trojan that targets data related to video gaming applications and modifies the files to be unusable. After its attack, TeslaCrypt generates multiple decryption instructions, which TeslaCrypt uses to force its victims to pay a fee for the restoration of all affected data. In spite of the unusual choice of targets, TeslaCrypt can be hindered by all the usual security procedures malware experts encourage against all file encryptors. Naturally, removing TeslaCrypt infections from any PC can (and should) use industry-standardized anti-malware solutions.
When a Trojan Shoves Your Gaming Life into a Crypt
TeslaCrypt, a suspected upgrade or spinoff of the CryptoWall Ransomware, is a Trojan that generates profit from modifying prominent types of files with an AES encryption function. This feature prevents them from being opened until the process can be reversed (or 'decrypted'). Although this attack is a standard Trojan payload, TeslaCrypt has quickly gained some minor notoriety from specializing in files related to various gaming programs. Games targeted by TeslaCrypt may include ones as massive as World of Warcraft or Call of Duty, down to relatively niche titles, such as RPG Maker or DayZ.
Malware experts also see potential in TeslaCrypt for encrypting files unrelated to games, such as JPG images or Notepad TXT files. However, specialized formats specific to gaming programs, such as DayZ's profiles, also may be included. Unusually, many of the games in TeslaCrypt's list are non-local in terms of data storage, meaning that is no permanent harm to your game account. However, TeslaCrypt also implements a simple form of Windows lockdown during its encryption and corresponding ransom attempt.
TeslaCrypt deletes Shadow Volume Copies and other data used to revert the state of your PC in the event of your invoking a System Restore Point. TeslaCrypt also generates a pop-up window, a desktop wallpaper and an additional, redundant text file, all of which contain instructions on how to recover your encrypted files.
TeslaCrypt's instructions request a surprisingly large payment (between five hundred or one thousand USD, depending on whether the victim uses BitCoin or PayPal) fee in return for its decrypting of your data. TeslaCrypt also provides a well-supported interface for instant messaging its creators and, like some versions of Cryptowall, a 'sample' decryption service that works for a single file.
Breathing TeslaCrypt's Files Back to Life
TeslaCrypt may make the unusual concession of proving that TeslaCrypt can decrypt the above files, but malware researchers would advise you to take advantage of cheaper methods of restoring your files than paying the people behind TeslaCrypt. Remote backups can store your information out of reach of any file-encrypting attacks TeslaCrypt is capable of implementing, and you can reinstall non-local games (such as MMORPGs) once you've uninstalled TeslaCrypt. Deleting TeslaCrypt should be straightforward with standard anti-malware tools, although restarting your PC via additional security steps is expected to be mandatory for disabling TeslaCrypt first.
Gaming assaults aside, TeslaCrypt also is the advent of PayPal-related support for the file encryption 'marketplace.' As one of the few Trojans to support Paypal 'My Cash' cards, TeslaCrypt may mark the onset of future ransomware encroachment into regions less likely to support Ukash and other, previously favored transaction methods.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%APPDATA%\Microsoft\Crypto\syscop.exe
File name: syscop.exeSize: 250.96 KB (250961 bytes)
MD5: 112a0c0def505c451ae38d3bfdf1bd4e
Detection count: 197
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\Microsoft\Crypto
Group: Malware file
Last Updated: May 8, 2020
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\setap_c.exe
File name: setap_c.exeSize: 254.46 KB (254464 bytes)
MD5: 5b3eb320b4bb42be530df72efe5cb8c1
Detection count: 124
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: June 14, 2016
%SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\safe00.exe
File name: safe00.exeSize: 251.18 KB (251182 bytes)
MD5: 4f14e9c72c1593a178d8a5d3e36ad334
Detection count: 119
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: June 14, 2016
10_ae9b21c99e2fe6de0b887fa770e3a8a9c97dd606b806e4034581ac9d49a20a39.exe
File name: 10_ae9b21c99e2fe6de0b887fa770e3a8a9c97dd606b806e4034581ac9d49a20a39.exeSize: 372.73 KB (372736 bytes)
MD5: 4b09737d16730f04f2b69a63b01a5c13
Detection count: 96
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 23, 2016
10_702a052b82756bcc7fb65feb9cb2a09dd355435bec8e4693552f757e28295a43.exe
File name: 10_702a052b82756bcc7fb65feb9cb2a09dd355435bec8e4693552f757e28295a43.exeSize: 414.62 KB (414628 bytes)
MD5: 408a8ff4b1c450a821b92fb6b0a82c5c
Detection count: 95
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 23, 2016
%WINDIR%\System32\setap00.exe
File name: setap00.exeSize: 251.69 KB (251692 bytes)
MD5: eb60d7e742bdfe33d758279086706091
Detection count: 59
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\System32
Group: Malware file
Last Updated: June 14, 2016
%APPDATA%\Payload22.exe
File name: Payload22.exeSize: 355.32 KB (355328 bytes)
MD5: 7018ffe0b27a6ef44b117d4af65131bd
Detection count: 44
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: July 15, 2016
Payload.exe
File name: Payload.exeSize: 293.35 KB (293354 bytes)
MD5: 87a34f1943a70279f4340ea5817993ad
Detection count: 35
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: July 15, 2016
%SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\setap_c.exe
File name: setap_c.exeSize: 266.03 KB (266031 bytes)
MD5: c5614b16ba6d272f6b4afe6aec9f35b1
Detection count: 33
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: June 14, 2016
%SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\setap02.exe
File name: setap02.exeSize: 251.18 KB (251186 bytes)
MD5: 53949ebc5fb47c3935b10cec7af22686
Detection count: 33
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: June 14, 2016
%SystemDrive%\Users\<username>\AppData\Local\Siddhi.exe
File name: Siddhi.exeSize: 178.17 KB (178176 bytes)
MD5: 61e49800de3309c4868e6769412e6356
Detection count: 21
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\<username>\AppData\Local
Group: Malware file
Last Updated: April 30, 2016
%SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Payload.exe
File name: Payload.exeSize: 292.83 KB (292834 bytes)
MD5: 325b40360e734dd1a6107c8237ebfb64
Detection count: 21
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: June 22, 2016
%SystemDrive%\Users\<username>\AppData\Roaming\Payload_c.exe
File name: Payload_c.exeSize: 263.47 KB (263471 bytes)
MD5: c05d574ca856193fa56db0d8df0d0413
Detection count: 19
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\<username>\AppData\Roaming
Group: Malware file
Last Updated: July 15, 2016
f4a39edc395821d77d0eaeb950b8f61512f2be336f8781b90e747980039a9a09.exe
File name: f4a39edc395821d77d0eaeb950b8f61512f2be336f8781b90e747980039a9a09.exeSize: 400.03 KB (400036 bytes)
MD5: 769aa748f2d45d8d634158d69a8b4ba1
Detection count: 16
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 23, 2016
d277693bfbb820a1e9d911d7798e9998ca7212653ece7006448a7daae9b4ad9a.exe
File name: d277693bfbb820a1e9d911d7798e9998ca7212653ece7006448a7daae9b4ad9a.exeSize: 407.42 KB (407428 bytes)
MD5: 462d38982d855cd8b5c870af7d88facb
Detection count: 15
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 23, 2016
c6797d3159336b1871daaa8d73ad6b4032eb90a7a9dd053f103c13808b73c830.exe
File name: c6797d3159336b1871daaa8d73ad6b4032eb90a7a9dd053f103c13808b73c830.exeSize: 414.62 KB (414628 bytes)
MD5: 00554b7653f4cbda353e0169b0e73c86
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 23, 2016
bfd9843f266e28caa90632742523045f59c21d100d582e89c0a2d402e30f4f10.exe
File name: bfd9843f266e28caa90632742523045f59c21d100d582e89c0a2d402e30f4f10.exeSize: 407.42 KB (407428 bytes)
MD5: 5d775cefc2e47a2f6516a9d33187d580
Detection count: 13
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 23, 2016
b90cd4196a296ea48d068260810b20cfd80c40b9f14f123f61629f360fad050a.exe
File name: b90cd4196a296ea48d068260810b20cfd80c40b9f14f123f61629f360fad050a.exeSize: 417.11 KB (417110 bytes)
MD5: aa603f7f880a1386a6e496a7c8aa927b
Detection count: 12
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 23, 2016
%SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Payload3.exe
File name: Payload3.exeSize: 271.36 KB (271360 bytes)
MD5: ab36cbde836d67c5a7e145ae80518b35
Detection count: 12
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: July 15, 2016
%SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Payload.exe
File name: Payload.exeSize: 292.82 KB (292824 bytes)
MD5: 2acc10b7916dba194aa3a19f548d10db
Detection count: 9
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: June 22, 2016
%SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\setap00.exe
File name: setap00.exeSize: 253.95 KB (253952 bytes)
MD5: f2aedf8b08ba3b2f3140cb0bc377ea00
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: June 14, 2016
2_0e3a91c7461752d0c495e11b5ffe512385263ed3bf28510aca5cb77cc1afa907.exe
File name: 2_0e3a91c7461752d0c495e11b5ffe512385263ed3bf28510aca5cb77cc1afa907.exeSize: 408.62 KB (408620 bytes)
MD5: 856e51733c368c88dc6dfd657ffd4a6b
Detection count: 1
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 23, 2016
%AppData%\key.dat
File name: %AppData%\key.datFile type: Data file
Mime Type: unknown/dat
Group: Malware file
%AppData%\log.html
File name: %AppData%\log.htmlMime Type: unknown/html
Group: Malware file
%Desktop%\CryptoLocker.lnk
File name: %Desktop%\CryptoLocker.lnkFile type: Shortcut
Mime Type: unknown/lnk
Group: Malware file
%Desktop%\HELP_TO_DECRYPT_YOUR_FILES.bmp
File name: %Desktop%\HELP_TO_DECRYPT_YOUR_FILES.bmpMime Type: unknown/bmp
Group: Malware file
%Desktop%\HELP_TO_DECRYPT_YOUR_FILES.txt
File name: %Desktop%\HELP_TO_DECRYPT_YOUR_FILES.txtMime Type: unknown/txt
Group: Malware file
1_4899dea44c874d4904b68df43980fed064437952dadc96168e8c97e3818d780d.exe
File name: 1_4899dea44c874d4904b68df43980fed064437952dadc96168e8c97e3818d780d.exeSize: 389.12 KB (389120 bytes)
MD5: 8f0ff55fc8c1ab906e112e746c8ffb85
Detection count: 0
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 23, 2016
More files
Registry Modifications
Regexp file mask%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Startup\how_recover+[RANDOM CHARACTERS].html%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Startup\how_recover+[RANDOM CHARACTERS].txt%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\how_recover+[RANDOM CHARACTERS].html%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\how_recover+[RANDOM CHARACTERS].txt%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\payload[RANDOM CHARACTERS].exe%APPDATA%\payload[RANDOM CHARACTERS].exe%USERPROFILE%\DESKTOP\CryptoLocker.lnk%USERPROFILE%\DESKTOP\HELP_TO_DECRYPT_YOUR_FILES.bmp%USERPROFILE%\DESKTOP\HELP_TO_DECRYPT_YOUR_FILES.txtHKEY..\..\..\..{Subkeys}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\crypto13
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.