.KRAB Files Virus (GANDCRAB V4.4) - Como remover + Restaurar dados
REMOÇÃO DE AMEAÇAS

.KRAB Files Virus (GANDCRAB V4.4) - Como remover + Restaurar dados

O vírus GANDCRAB V4.4 é a mais recente iteração do GandCrab família ransomware de ameaças. Ele usa a mesma extensão .KRAB a dados e extorque as vítimas do usuário-alvo criptografar um pagamento ransomware. The new iteration can be customized further by the hacker operators, its modules can be set up according to the ongoing attack campaign. It is expected that several attacks will follow in the coming weeks.

Resumo ameaça

NomeGANDCRAB V4.4 Virus
Tiporansomware, Cryptovirus
Pequena descriçãoThe ransomware encrypts sensitive information on your computer system with the .KRAB extensions and demands a ransom to be paid to allegedly recover them.
Os sintomasO ransomware irá criptografar seus arquivos com um algoritmo de criptografia forte.
distribuição MétodoOs e-mails de spam, Anexos de e-mail
Ferramenta de detecção See If Your System Has Been Affected by GANDCRAB V4.4 Virus

Baixar

Remoção de Malware Ferramenta

Experiência de usuárioParticipe do nosso Fórum to Discuss GANDCRAB V4.4 Virus.
Ferramenta de recuperação de dadosWindows Data Recovery por Stellar Phoenix Aviso prévio! Este produto verifica seus setores de unidade para recuperar arquivos perdidos e não pode recuperar 100% dos arquivos criptografados, mas apenas alguns deles, dependendo da situação e se você tem ou não reformatado a unidade.

GANDCRAB V4.4 Virus – Distribution Ways

The main delivery method associated with the GANDCRAB V4.4 Virus is the coordination of a SPAM email campaign. A popular tool to fuel the infections is the RIG Exploit Kit used to send out many messages to targets on a global scale. The criminal operators program templates that contain various graphics, text and design layouts that are hijacked from legitimate companies. Upon receiving the messages the users may notice the same notifications and messages as the ones that are typically sent by an Internet site or service that they use. In many cases familiar sounding domain names are used and even security certificates. The scope of messages that are being sent by the hackers can range from password reminders, update notifications, advertising materials and etc.

Many of the messages contain the GANDCRAB V4.4 virus under various forms:

  • Adobe Flash Exploit — The victim users are sent malicious Adobe Flash interactive elements that take advantage of vulnerabilities identified in the client software. Adobe Flash remains as one of the most common applications that are targeted by computer hackers.
  • Anexos de arquivo — The dangerous files can be attached directly to the messages. The body contents will contain instructions that coerce the victims into executing them.
  • Infected Payload Carriers — Some hackers can embed the GANDCRAB V4.4 virus in payload carriers that be software installers, updates or pop-ups. They are made by taking the legitimate files from the official vendors and bundling them with the virus code. Whenever they are installed the GANDCRAB V4.4 virus infection will be started.
  • Documentos infectados-macro — The hackers can embed scripts in popular document types: documentos de texto rico, Planilhas, bases de dados e apresentações. Whenever they are opened by the victim users a notification prompt will be spawned requesting them to run the built-in code. Se isso for feito a infecção pelo vírus começará.

The hackers can also construct sites falsos de download that imitate the legitimate download pages or well-known Internet portals. To help spread them the criminals can utilize various Scripts tais como pop-ups, banners, in-line hyperlinks and etc.

The virus executable files, payloads and payload carriers can also be spread in arquivo, even password-protected ones. In a situation where a string is required in order to unlock the files the hackers can place them in messages, notification boxes and other contents.

GANDCRAB V4.4 virus can also be spread via malicious browser extensions, também chamado sequestradores. They are created for the most popular web browsers and are spread on the official repositories with fake user reviews and developer credentials. The associated descriptions coerce the victims into installing them — the description promises to add new features or enhance already existing ones. Once they are installed the built-in code will start to modify the application settings to redirect the users to hacker-controlled page. Following this the GANDCRAB V4.4 virus infection will start.

GANDCRAB V4.4 Virus – In-Depth Analysis

Following the infiltration of the malware threat on the victim hosts several security checks are performed in order to bypass processes that may interfere with its correct execution. A modular framework is used which allows the main infection engine to access and manipulate different system settings.

One of the first actions that are executed by the malicious code is the recolha de informações 1. There are two main types of data that are commonly hijacked:

  • dados privados — The collected information can be used to expose the identity of the victims. The engine will automatically hijack personal data such as strings related to their name, endereço, número de telefone, localização, interesses e as credenciais da conta.
  • campanha Metrics — Other information that can be used to optimize the attacks can include a report on the installed hardware components, configurações do usuário e variáveis ​​do sistema operacional.

The collected information can then be processed by another component called proteção discrição. It is used to scan for applications and services that can interrupt the GANDCRAB V4.4 virus execution. The list of target programs includes: produtos anti-vírus, ambientes de sandbox e hosts de máquinas virtuais. The identified processes will be stopped and the applications themselves can be removed from the systems. This allows the virus to be able to take full control of the devices — the GANDCRAB V4.4 virus can create its own processes, hook up to existing ones and spawn multiple threads.

Constant monitoring of the system is enforced — the analysis reveals that the infection engine can monitor for changes in both operating system settings, Valores do Registro do Windows, files and etc.

The analysis shows that the engine has the ability to interact with the system Volume manager. This means that the virus will have access to removable storage devices and available network shares. This means that a single infection can potentially trigger a whole network takeover.

Follow-up infection actions can modify the web browser settings and redirect the victim machines to a hacker-controlled page. This is particularly useful when instituting the threat with blackmail tactics. The ransomware can also modify the Registro do Windows. This means that it can access, modify and create new strings. When operating system ones affected then overall performance will suffer. Changes to individual applications can render certain services and functions non-working. In addition the malicious engine can create strings for itself and modify the boot settings thereby setting itself as a ameaça persistente. This means that it will start itself whenever the computer boots and disable access to the recovery boot menu.

Other malicious behavior includes the removal of Restaurar dados — Restore points and Shadow Volume Copies. To effectively restore them a professional software will need to be used, refer to our removal instructions.

The GANDCRAB V4.4 virus can be used to deliver infecções de Tróia. They create a secure connection to a hacker-controlled server. It allows the criminals to take over control of the infected machines, spy on the users and steal any file.

One of the key differences between this version and previous GandCrab ransomware threats is the fact that v4.4 creates a specific mutex value. It appears that under certain conditions this will block the operations of the virus. There are several explanations for this behavior:

  • Killswitch Variant — One of the proposed speculations is that by acquiring this version of the GandCrab the automatic activation of the mutex lock will disable the virus’s ransomware component.
  • Upgraded Weapon — The fact that the lock mutex is used probably means that the criminals behnd it are focusing on a stealth delivery. The ransomware component will be activated upon a command given by the operators.
  • New Ransomware — The new GandCrab v4.4 threat may be created as an independent threat without having a connection to previous attackers. The developers of the v4.4 version may have taken the source code of already existing threats done by other hackers and modified them to create their own custom version.

GANDCRAB V4.4 Virus – Encryption Process

Like previous GandCrab ransomware threats the v4.4 version uses a built-in list of target file type extensions. They will be processed by a strong cipher, the encrypted files will not be accessible to the user. Teh lists include the most popular user data including the following:

  • arquivo
  • backups
  • documentos
  • imagens
  • vídeos
  • Música

The same .KRAB extension will be applied to the victims files.

A ransomware note will be created in a file called KRAB-DECRYPT.txt. A typical message will read the following contents:

= GANDCRAB 4 =—

Atenção!
Todos os seus arquivos, documentos. fotos, databases and other important files are encrypted and have the
extensão: .CARANGUEJO
O único método de recuperação de arquivos é a compra de uma chave privada única. Only we can give you this key
and only we can recover your files.

O servidor com a chave está em uma rede fechada TOR. Você pode chegar lá pelas seguintes formas:

——————————————————————————–
|0. Baixe Tor Navegador – https://www.torproject.org/
|1. Instale o navegador Tor
|2. Abrir Tor Navegador
|3. Abrir link no navegador TOR: http://gandcrabmfe6mnef.onion/
|4. Siga as instruções nesta página
———————————————————————————

On our page you will see instructions on payment and have the opportunity to decryp 1 arquivo de graça.

ATENÇÃO!
Danosos, a fim de evitar que dados:

* Não modifique arquivos criptografados
* Não altere dados abaixo

—BEGIN GANDCRAB CHAVE—

—END KEY GANDCRAB—

—BEGIN PC DATA—

—END PC DATA—

The ransomware note contains several fields that are generated automatically by the engine. The first part is the extensão — while the generic .CRAB or .KRAB extension is used as one of the main identification signs for the ransomware family it can be customized by the hackers to something else. o GandCrab key is the unique identifier given to each individual infection. o PC DATA string is a type of uniquer user identifier — it is created by analyzing certain conditions and creating it based on the acquired data.

Remove GANDCRAB V4.4 Virus and Restore Encrypted Files

Se o seu sistema de computador foi infectado com o GANDCRAB V4.4 Vírus, você deve ter um pouco de experiência na remoção de malware. Você deve se livrar deste ransomware o mais rápido possível antes que ele possa ter a chance de se espalhar ainda mais e infectar outros computadores. Você deve remover o ransomware e siga o passo-a-passo guia de instruções fornecido abaixo.

Avatar

Martin Beltov

Martin formou-se na publicação da Universidade de Sofia. Como a segurança cibernética entusiasta ele gosta de escrever sobre as ameaças mais recentes e mecanismos de invasão.

mais Posts - Local na rede Internet

Me siga:
TwitterGoogle Plus

1 Comente

  1. Avatardipur

    We are waiting for Grandcrab 4 decryptor. This ransomware is really cruel.

    Tks

    Reply

Deixe um comentário

seu endereço de e-mail não será publicado. Campos obrigatórios são marcados *

limite de tempo está esgotado. Recarregue CAPTCHA.

Compartilhar no Facebook Compartilhar
Carregando...
Compartilhar no Twitter chilrear
Carregando...
Compartilhar no Google Plus Compartilhar
Carregando...
Partilhar no Linkedin Compartilhar
Carregando...
Compartilhar no Digg Compartilhar
Compartilhar no Reddit Compartilhar
Carregando...
Partilhar no StumbleUpon Compartilhar
Carregando...