{"id":1774,"date":"2016-05-25T18:39:49","date_gmt":"2016-05-25T23:39:49","guid":{"rendered":"http:\/\/swildow.darktech.org\/wp\/?p=1774"},"modified":"2016-05-25T18:42:42","modified_gmt":"2016-05-25T23:42:42","slug":"cryptolocker-canary-detect-it-early","status":"publish","type":"post","link":"http:\/\/www.wildow.com\/blog\/?p=1774","title":{"rendered":"Cryptolocker Canary &#8211; detect it early!"},"content":{"rendered":"<p><a href=\"https:\/\/community.spiceworks.com\/how_to\/100368-cryptolocker-canary-detect-it-early\" target=\"_blank\">Cryptolocker Canary &#8211; detect it early!<\/a><br \/>\nTHREAT WATCH &amp; VIRUS ALERTS ANTIVIRUS<br \/>\nby JustinCredible on Nov 21, 2014 at 11:32am<\/p>\n<p><a href=\"http:\/\/swildow.darktech.org\/wp\/wp-content\/uploads\/2016\/05\/Cryptolocker-Canary1.pdf\">Cryptolocker Canary<\/a><\/p>\n<p>I thought I&#8217;d share with you what steps I&#8217;ve taken to alert me to a likely Cryptolocker infection.<\/p>\n<p>Generally, if someone gets a virus on their computer it&#8217;s a pain in the ass but it&#8217;s not threatening to the company on the whole. The computer is isolated and reinstalled or otherwise cleaned up, and you&#8217;re off again.<\/p>\n<p>With Cryptolocker, 9 times out of 10 the person seems to also have a link to at least one network share. Because it&#8217;s encrypting everything it can (not -infecting- everything, just encrypting), it will go out to those shares and do it&#8217;s thing.<\/p>\n<p>Now, if you&#8217;re familiar with this, hopefully not first hand, you&#8217;ll know they drop two files in every folder with encrypted files &#8211; INSTALL_TOR.txt and DECRYPT_INSTRUCTION.txt. You can use this to your advantage as a sort of &#8216;early warning system&#8217;. This works on Server 2008+, don&#8217;t know what facilities exist for this for earlier or different OS&#8217;s.<\/p>\n<p>EDIT: I guess I should mention it&#8217;s a good way to quickly tell who the culprit is, if it&#8217;s useful for nothing other than that.<\/p>\n<p>DOUBLE EDIT: Updated Jan 7\/2015 with clearer instructions and screenshots<\/p>\n<p>EDIT AGAIN: Updated Jan 29\/2015 to add help_decrypt*.* to the file screen, thanks go to +blefler for that!<\/p>\n<p>C-C-C-C-C-COMBO EDIT: March 19\/2015 With the release of new cryptolocker-like variants, they&#8217;ve taken to dropping randomly named files into the encrypted folders, making this method useless against those variants. Just FYI!<\/p>\n<p>KEEP ON EDITING: August 19\/2015 Added additional filenames that a new variant is using (restore_Flies*.*, *djqfu*.*, *.aaa). Thanks to +Mconn for the heads up: http:\/\/community.spiceworks.com\/topic\/1135679-new-trojan-crypto-virus<\/p>\n<p>NEVER STOP EDITING: November 5, 2015 Added additional filenames that Cryptowall 4.0 uses (help_your_files*.*) Thanks to +Lawrence Abrams for the heads up: http:\/\/community.spiceworks.com\/topic\/1274312-cryptowall-v4-0-released-now-encrypts-the-file-names-as-well<\/p>\n<p>MORE EDIT!: February 16, 2016 Added additional filenames various crypto infections use. Credit goes to quietman7 at bleepingcomputer and Jaymesned at Reddit.<\/p>\n<p>Steps (8 total)<br \/>\n1Open FSRM<br \/>\nExpand<br \/>\nOpen up File Server Resource Manager. (or Win key + R\u001b, fsrm.msc)<\/p>\n<p>2Create File Group<\/p>\n<p>Right click on File Groups under File Screening Management on the left and choose &#8220;Create File Group&#8230;&#8221;<\/p>\n<p>3Create File Group&#8230;<br \/>\nExpand<br \/>\nCall it &#8220;Cryptolocker Canary&#8221;<br \/>\nUnder files to include:<br \/>\n*.ecc<br \/>\n*.ezz<br \/>\n*.exx<br \/>\n*.zzz<br \/>\n*.xyz<br \/>\n*.aaa<br \/>\n*.abc<br \/>\n*.ccc<br \/>\n*.vvv<br \/>\n*.xxx<br \/>\n*.ttt<br \/>\n*.micro<br \/>\n*.encrypted<br \/>\n*.locked<br \/>\n*.crypto<br \/>\n_crypt<br \/>\n*.crinf<br \/>\n*.r5a<br \/>\n*.XRNT<br \/>\n*.XTBL<br \/>\n*.crypt<br \/>\n*.R16M01D05<br \/>\n*.pzdc<br \/>\n*.good<br \/>\n*.LOL!<br \/>\n*.OMG!<br \/>\n*.RDM<br \/>\n*.RRK<br \/>\n*.encryptedRSA<br \/>\n*.crjoker<br \/>\n*.EnCiPhErEd<br \/>\n*.LeChiffre<br \/>\n*.keybtc@inbox_com<br \/>\n*.0x0<br \/>\n*.bleep<br \/>\n*.1999<br \/>\n*.vault<br \/>\n*.HA3<br \/>\n*.toxcrypt<br \/>\n*.magic<br \/>\n*.SUPERCRYPT<br \/>\n*.CTBL<br \/>\n*.CTB2<br \/>\n*.locky<br \/>\nHELPDECRYPT.TXT<br \/>\nHELP_YOUR_FILES.TXT<br \/>\nHELP_TO_DECRYPT_YOUR_FILES.txt<br \/>\nRECOVERY_KEY.txt<br \/>\nHELP_RESTORE_FILES.txt<br \/>\nHELP_RECOVER_FILES.txt<br \/>\nHELP_TO_SAVE_FILES.txt<br \/>\nDecryptAllFiles.txt<br \/>\nDECRYPT_INSTRUCTIONS.TXT<br \/>\nINSTRUCCIONES_DESCIFRADO.TXT<br \/>\nHow_To_Recover_Files.txt<br \/>\nYOUR_FILES.HTML<br \/>\nYOUR_FILES.url<br \/>\nencryptor_raas_readme_liesmich.txt<br \/>\nHelp_Decrypt.txt<br \/>\nDECRYPT_INSTRUCTION.TXT<br \/>\nHOW_TO_DECRYPT_FILES.TXT<br \/>\nReadDecryptFilesHere.txt<br \/>\nCoin.Locker.txt<br \/>\n_secret_code.txt<br \/>\nAbout_Files.txt<br \/>\nRead.txt<br \/>\nReadMe.txt<br \/>\nDECRYPT_ReadMe.TXT<br \/>\nDecryptAllFiles.txt<br \/>\nFILESAREGONE.TXT<br \/>\nIAMREADYTOPAY.TXT<br \/>\nHELLOTHERE.TXT<br \/>\nREADTHISNOW!!!.TXT<br \/>\nSECRETIDHERE.KEY<br \/>\nIHAVEYOURSECRET.KEY<br \/>\nSECRET.KEY<br \/>\nHELPDECYPRT_YOUR_FILES.HTML<br \/>\nhelp_decrypt_your_files.html<br \/>\nHELP_TO_SAVE_FILES.txt<br \/>\nRECOVERY_FILES.txt<br \/>\nRECOVERY_FILE.TXT<br \/>\nRECOVERY_FILE*.txt<br \/>\nHowtoRESTORE_FILES.txt<br \/>\nHowtoRestore_FILES.txt<br \/>\nhowto_recover_file.txt<br \/>\nrestorefiles.txt<br \/>\nhowrecover+*.txt<br \/>\n_how_recover.txt<br \/>\nrecoveryfile*.txt<br \/>\nrecoverfile*.txt<br \/>\nrecoveryfile*.txt<br \/>\nHowto_Restore_FILES.TXT<br \/>\nhelp_recover_instructions+*.txt<br \/>\n_Locky_recover_instructions.txt<\/p>\n<p>click OK<\/p>\n<p>4Create File Screen Template<\/p>\n<p>Right click on File Screen Templates on the left and choose &#8220;Create File Screen Template&#8230;&#8221;<\/p>\n<p>5Create File Screen Template&#8230;<br \/>\nExpand<br \/>\nCall it &#8220;Cryptolocker Canary&#8221;<\/p>\n<p>Set it up as PASSIVE screening. You want the file to be saved &#8211; it&#8217;s a harmless txt file, and it allows you to search for all instances of it and know which folders have been affected.<\/p>\n<p>Under File groups, choose Cryptolocker Canary.<\/p>\n<p>Under the E-mail Message tab, check the option to send a message and enter your email. Also check the option to send an email to the user who generated the violation.<\/p>\n<p>For my Subject, I wrote: &#8220;POSSIBLE VIRUS INFECTION DETECTED&#8221;<br \/>\nFor the body I wrote:<\/p>\n<p>&#8220;User [Source Io Owner] attempted to save [Source File Path] to [File Screen Path] on the [Server] server.<\/p>\n<p>This file indicates that the file server is in the process of being encrypted by a virus. If you are [Source Io Owner] please shut down any computers you are using IMMEDIATELY and notify IT at 123-456-7890 or helpdesk@domain.com&#8221;<\/p>\n<p>6Create File Screen<\/p>\n<p>Right click on File Screens on the left and choose &#8220;Create File Screen&#8230;&#8221;<\/p>\n<p>7Create File Screen&#8230;<br \/>\nExpand<br \/>\nChoose the path you want to &#8216;protect&#8217;, and choose &#8220;Derive properties from this file screen template&#8221; and select your Cryptolocker Canary template from the list and click Create.<\/p>\n<p>8Remediation<br \/>\nOnce their system is offline it can&#8217;t harm anything and it&#8217;s time for remediation.<\/p>\n<p>Wipe the infected machines and reinstall. No two ways about it. You don&#8217;t want Cryptolocker lingering at all.<\/p>\n<p>To figure out what&#8217;s encrypted, do a search of your file server for the files and extensions mentioned in Step 3, make note of the resulting folders. You&#8217;ll want to restore those.<\/p>\n<p>If you have Shadow Copies turned on for your file server (I highly recommend it), it can make restoring your data that much faster &#8211; choose the latest point and click Restore.<\/p>\n<p>I should note, we were able to identify the user that was infected because their personal network share was encrypted &#8211; nobody else&#8217;s. That&#8217;s a dead giveaway.<\/p>\n<p>If you don&#8217;t have Shadow Copies set up, then it&#8217;s off to your backups &#8211; you do have those, right?<\/p>\n<p>Conclusion<\/p>\n<p>In the end, it&#8217;s not going to stop the infection, but it will warn you hopefully early enough that you have to restore very little data to your network shares. The infected machine is most likely completely encrypted at this point, but it&#8217;s a great way to &#8220;protect the herd&#8221; from one bad apple.<\/p>\n<p>Thanks Ian S for the link to configuring Exchange<br \/>\nThanks to +Mconn for the heads up on the latest variant at http:\/\/community.spiceworks.com\/topic\/1135679-new-trojan-crypto-virus<\/p>\n<p>Big thanks to Jaymesned over at reddit for his compilation https:\/\/www.reddit.com\/r\/sysadmin\/comments\/46361k\/list_of_ransomware_extensions_and_known_ransom\/ which was copied from quietman7 at bleepingcomputer http:\/\/www.bleepingcomputer.com\/forums\/t\/605116\/im-hit-with-a-cryptolocker-virus\/<\/p>\n<p>References<br \/>\nReddit<br \/>\nBleeping Computer<br \/>\nNew Trojan Crypto Virus<br \/>\nConfigure E-Mail Notifications for FSRM<br \/>\nConfiguring Exchange to accept FSRM E-Mails<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptolocker Canary &#8211; detect it early! THREAT WATCH &amp; VIRUS ALERTS ANTIVIRUS by JustinCredible on Nov 21, 2014 at 11:32am Cryptolocker Canary I thought I&#8217;d share with you what steps I&#8217;ve taken to alert me to a likely Cryptolocker infection. &#8230; <a class=\"more-link\" href=\"http:\/\/www.wildow.com\/blog\/?p=1774\">Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1774"}],"collection":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1774"}],"version-history":[{"count":3,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1774\/revisions"}],"predecessor-version":[{"id":1780,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1774\/revisions\/1780"}],"wp:attachment":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1774"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}