Threat Description

Trojan:​W32/DatCrypt

Details

Aliases: Trojan:W32/DatCrypt, Gen:Trojan.Heur.mqW@vrF6mAoix, Trojan.Win32.Pincav.nms, Trojan.Xrupter (Symantec) , Generic.dx!jkx trojan (McAfee)
Category: Malware
Type: Trojan
Platform: W32

Summary


Also known as a trojan horse program, this is a deceptive program that performs additional actions without the user's knowledge or permission. It does not replicate.



Removal


Automatic action

Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.

More

Detailed instructions for F-Secure security products are available in the documentation found in the Downloads section of our Home - Global site.

You may also refer to the Knowledge Base on the F-Secure Community site for further assistance.



Technical Details


Trojan:W32/DatCrypt drops a DLL file that encrypts files with specific extensions on the system. The DLL then informs the user that the affected files should be decrypted with a certain "utility program", which it also attempts to download and install on the system.A malware that engages in this type of behavior is known as Ransomware.

Execution

The DLL file is installed in the system32 folder with a random name. While active, the DLL searches the hard drive for files with the following extensions:

  • ppsm
  • ppsx
  • ppam
  • potm
  • potx
  • pptm
  • pptx
  • xlam
  • xlsb
  • xltm
  • xltx
  • xlsm
  • xlsx
  • dotm
  • dotx
  • docm
  • docx
  • ppt
  • xls
  • doc
  • pst
  • mdb
  • wma
  • mp3
  • png
  • jpeg
  • jpg
  • pdf

Many of these extensions are for Microsoft Office documents; the others are common media formats.Files found are encrypted. The program then displays a message when the user clicks the encrypted file, informing them the file is 'corrupted':

Download

The DLL will display a system notification message related to the supposed file corruption:

When clicked, the message initiates a download of a "utility program" for decrypting the affected files. The download is from

  • https://datahelpercorp.com/[...].exe

The downloaded utility program is detected as Rogue:W32/DatDoc.






SUBMIT A SAMPLE

Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More