
The Dell Sonicwall Threats Research team have observed yet another ransomware in the wild called DMA Locker. Ransomware remains a very lucrative business for its operators. The only way of recovering files is to pay the ransom assuming no backup is available. With this ransomware we can measure some level of success by observing the bitcoin transactions associated with the given address:
Infection Cycle:
The Trojan uses the following PDF icon:

The Trojan drops the following files to the filesystem:
The Trojan adds the following keys to the registry:
The Trojan can be seen running in the process list:

The Trojan exhibited 4 "action" commands which are used when communicating with the C&C server:
The Trojan obtains a unique bot ID from a remote C&C server ("action=0"):

It then uses this bot ID to request an RSA public key from the server ("action=1"):

The bot ID and RSA Public Key are stored in the registry:
The Trojan requests the ransom information that is to be displayed to the user ("action=3"):

The following ransom information is displayed on the screen of the infected machine:

A quick lookup of the bitcoin address using the blockchain.info website shows that the same bitcoin address is being used for multiple infections. The campaign has been successful and 6.0001 BTC (totaling $3,150 USD at the time of writing this alert) has been paid by victims so far:

SonicWALL Gateway AntiVirus provides protection against this threat via the following signature:
Share This Article

An Article By
An Article By
Security News
Security News