
The SonicWall Capture Labs threat research team has observed reports of a variant from the Crysis/Dharma ransomware family called Lotus. The operators of this malware charge 1 BTC ($49K USD at the time of writing this alert) for file recovery. However, the price appears to be negotiable after a conversation with the malware operator.
Infection Cycle:
Upon infection, the malware can be seen using the built-in mshta program to display the ransom message:

Files on the system are encrypted and the following extension is appended to their file names:
.id-E625BDD2..LOTUS
The following ransom message is displayed on the desktop:

The following files are dropped on to the system:
MANUAL.txt contains the following text:

We reached out to the supplied emails and had the following conversation with the ransomware operator:

The operator asks how many pc's we would like to recover. This leads us to believe that the malware is aimed at large organizations:

We see if we can negotiate further if we have multiple infected PC's:

SonicWall Capture Labs provides protection against this threat via the following signature:
This threat is also detected by SonicWALL Capture ATP w/RTDMI and the Capture Client endpoint solutions.
Share This Article

An Article By
An Article By
Security News
Security News