<<<
NEWS FROM THE LAB - Friday, March 6, 2015
>>>
 

 
Ransomware Report: The Rise of BandarChor Posted by FSLabs @ 16:45 GMT

This week, we have received a number of reports on yet another ransomware, BandarChor.

This ransomware is not exactly fresh. The first infections that we've noticed related to this family came already last November.

November

We have had reports of BandarChor being spread via email and have seen indicators that it may have been distributed by exploit kits.

Upon execution, the malware drops a copy of itself in Startup directory as well as the ransom notification image.

filenames

Then it proceeds in its attempt to encrypt files with various file extensions such as: doc, xls, jpg and the like.

fileext

After encryption, the files will be renamed as [filename].id-[ID]_fud@india.com.

files

Then it reports the user's computer name and ID to a remote location via HTTP POST.

network

Here's what the ransom message looks like.

fud@india.com

Here's a list of other domains that we've seen related to this threat:

  •  martyanovdrweb.com
  •  www.fuck-isil.com
  •  www.ahalaymahalay.com
  •  kapustakapaet.com
  •  www.decryptindia.com
  •  www.enibeniraba.com
  •  www.netupite.com
  •  89025840.com
  •  xsmailsos.com
  •  sosxsmaillockedwriteonxsmailindia.com
  •  baitforany.com
  •  euvalues.com

We are detecting this threat as Trojan:W32/BandarChor.

Hashes:

  •  31aa8ec187e1241a94127336996f9cb38719eb9b
  •  4b356b88fb3a3dce1f009e4e92cd4a59383e0764
  •  5f71be645e8ac995555a891087b46ed357386dbe
  •  afd4216e93a82feebafd3a68e9308ca4b0b54372
  •  b4362fcd75fd071fc8237c543c56df5736b8e177
  •  ba8909eef5ee280ae43b935cf4ae38ccf21bde56
  •  de7ced27456a1e4581d6a4bf126f56061b7f9859