The ransomware CryptXXX was such a huge success for cyber criminals that others made a copycat version of it. The copycat is called CrypMIC, and it utilizes the same distribution method, while also using the same ransom note and payment sites. The biggest difference between them is that CrypMIC does not encrypt files with a specific extension and uses another encryption algorithm.
To see how to remove the ransomware virus and what you could apply to recover your files, you should read the article carefully.
|Short Description||A ransomware that imitates CryptXXX ransomware. Encrypts your files, but does not put any special extension to them compared to CryptXXX.|
|Symptoms||The ransomware encrypts files while it searches drives from D to Z along with any external or network drives. Uses the same ransom note and payment sites as CryptXXX.|
|Distribution Method||Malvertising, Compromised Websites, Exploit Kits|
|Detection Tool|| See If Your System Has Been Affected by CrypMIC |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss CrypMIC.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
CrypMIC Ransomware – Distribution
CrypMIC ransomware uses an exploit kit for its distribution. The ransomware uses the Neutrino exploit kit as its entry point – same as CryptXXX. Other exploit kits could be used for distribution in the future – with malware campaigns from compromised sites or hijacked sub-domains. For now Neutrino is one of the most effective exploit kits and TrendMicro labs reported that it spreads the following ransomware families as well:
TeslaCrypt was also being delivered by Neutrino earlier this year, but as its authors released the master decryption key, and thus the attention has shifted to CryptXXX.
The CrypMIC ransomware has its payload stored in a .DLL file with a random name. Beware that this makes it easy to spread and besides the exploit kit, spam emails, social media and file sharing networks might be used as a delivery way as well. Be very careful in opening files, links and emails of unknown origin or that seem suspicious.
CrypMIC Ransomware – Technical Description
The CrypMIC ransomware is a copycat of CryptXXX. However, it has quite a few differences. For instance, it does not apply a persistence mechanism such as an auto-start feature. Another interesting thing is that it does not feature a lockscreen. However, it does employ a check routine for the presence of any Virtual Machines being run and sends that data over its C&C (Command and Control) server.
CrypMIC encrypts files with a strong algorithm, but does not put any extension to the encrypted files. After encryption is complete the following files are created:
The files are almost 100% the same as those of CryptXXX, as names and content, and serve the same purpose. The .html file is made just after the file encryption is finished. The file launches a browser to display the .html code. This makes the links inside clickable. This file makes copies of itself in directories with encrypted files. The file also has a .TXT and a .BMP version. The latter of the two is a picture which is set as a desktop background, but the screen does not get locked.
You can see the .BMP file right here:
We removed the hyperlinks from the image for safety purposes but know that they lead to the same payment sites for decryption as the CryptXXX virus. The links may differ per infected users, but will lead to those domains hosted by the original ransomware owners.
The file displayed above reads the following:
NOT YOUR LANGUAGE? USE https://translate.google.com
What happened to your files ?
All of your files were protected by a strong encryption with RSA4096
More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem)
How did this happen ?
!!! Specially for your PC was generated personal RSA4096 Key , both public and private.
!!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet.
!!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server
What do I do ?
So , there are two ways you can choose: wait for a _miracle_ and get _your_ PRICE DOUBLED! Or start obtaining *BITCOIN NOW! , and restore _YOUR_ _DATA_ easy way
If You have really valuable _DATA_, you better _NOT_ _WASTE_ _YOUR_ _TIME_, because there is _NO_ other way to get your files, except make a payment
Your personal ID:
For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: [Link to a site page]
If for some reasons the addresses are not availablweropie, follow these steps:
1 – Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en
2 – Video instruction: [Link to a site page] 3 – After a successful installation, run the browser
4 – Type in the address bar: [Link to a site page] 5 – Follow the instructions on the site
Following any of the links provided in that note, and you will see how a page such as the following will load:
If you enter your ID number will get you inside the payment system for the decryption service. There, you will see the following instructions:
CrypMIC ransomware asks the price of 1.2 BitCoins, to be paid as ransom. That is nearly 800 US dollars, which is very high as an initial payment. You will be given a period of 4 days to make the payment. If you don’t pay in that time frame, the price doubles and becomes 2.4 Bitcoins. No threats are made that your files can get lost after time.
Do NOT pay these criminals. CrypMIC ransomware is a copycat so you don’t know what will happen with your money if you do. Paying the ransomware is not a good option because the decrypter might not work as in the original ransomware variant.
The ransomware locks over 900 different file types. Some of the files that CrypMIC ransomware seeks to encrypt have these extensions:
→.3dm, .aes, .ARC, .asc, .asf, .asm, .asp, .avi, .bak, .bat, .bmp, .brd, .cgm, .class, .cmd, .cpp, .crt, .csr, .CSV, .dbf, .dch, .dcu, .dif, .dip, .djv, .djvu, .doc, .DOC, .docb, .docm, .docx, .DOT, .dotm, .dotx, .eml, .fla, .flv, .frm, .gif, .gpg, .hwp, .ibd, .jar, .java, .jpeg, .jpg, .key, .lay, .lay6, .ldf, .max, .mdb, .mdf, .mid, .mkv, .mml, .mov, .mp3, .mp4, .mpeg, .mpg, .ms11, .MYD, .MYI, .NEF, .obj, .odb, .odg, .odp, .ods, .odt, .otg, .otp, .ots, .ott, .PAQ, .pas, .pdf, .pem, .php, .png, .pot, .potm, .potx, .ppam, .pps, .ppsm, .ppsx, .PPT, .pptm, .pptx, .psd, .qcow2, .rar, .raw, .RTF, .sch, .sldx, .slk, .sql, .SQLITE3, .SQLITEDB, .stc, .std, .sti, .stw, .svg, .swf, .sxc, .sxd, .sxi, .sxm, .sxw, .tar, .tar, .bz2, .tbk, .tgz, .tif, .tiff, .txt, .uop, .uot, .vbs, .vdi, .vmdk, .vmx, .vob, .wav, .wks, .wma, .wmv, .xlc, .xlm, .xls, .XLS, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .zip, .zipx
The encryption algorithm used here is AES 256-Bit, although the ransom note states it is RSA-4096. After the process, the virus sends information about the current state of the system and the result of encryption to its C&C server. It uses the TCP protocol on the 443 port. Over the C&C the ransomware can also do a check if a VM (Virtual Machine) is running and send that data back.
CrypMIC ransomware deletes Shadow Volume Copies with the Vssadmin in Windows.
To prevent ransomware (and other viruses) from infecting you again, you can refer to the ransomware prevention tips thread in our forums. Continue to read, to find out what you can try to do about a possible file decryption.
Remove CrypMIC Ransomware and Restore Encrypted Files
If your computer got infected with CrypMIC, you should have some experience in malware removal. You should get rid of CrypMIC ransomware as soon as you can because it will keep encrypting files found not only on your computer but the network your PC is connected to, as well. The recommended action to do is to remove this virus and follow the step-by-step instructions manual provided down here.