CnTechPost CnTechPost
  • News
    • Tech Industry
    • Gadgets
    • Software
    • Stocks
    • Crypto
    • Cars
    • Software
    • 5G
    • How To
  • Contact
  • About
  • CnEVPost

Home ยป Tech Industry

Ransomware attacks Chinese internet users just to show off

By Phate Zhang
Apr 24, 2020 at 8:28 PM UTC
0
0

According to China-based Huorong security team, a number of users have recently reported experiencing a ransomware attack, where the attacker planted the ransomware via a backdoor virus.

A review and analysis of the samples shows that the ransomware is written in the Chinese programming language called EPL and encrypts the file with the character "_HD".

Unlike common ransomware, the ransomware does not leave any contact or ransom information but contains a reversible decryption algorithm and a provocative "I am ransomware, ask for reversible algorithm" message, and leaves some decryption clues.

Eventually, Huorong engineers succeeded in cracking the ransomware based on the decryption algorithm and clues therein.

While engineers perform traceability analysis of backdoor viruses, they also upgrade products to add defense rules and block the virus' transmission channels.

While analyzing and successfully decrypting the ransomware, the corresponding decryption tools were introduced

(https://down5.huorong.cn/ransom/HDLockerDecryptor.exe).

Huorong software (personal, enterprise) can now block and kill the above backdoor and ransomware viruses.

Decryption Tool Diagram

In addition, users also said that the virus author had even contacted him using QQ and directed him to send the extortion virus to Huorong forums for help.

Based on features such as Chinese chat logs, pop-up messages and EPL-compiled viruses, it's basically certain that it was done by the Chinese, and the purpose was not to obtain a decryption ransom, but to show off the technology and provoke users and security vendors.

In addition, it is not excluded that the author of the virus has followed the lead of the ransomware virus "WannaRen", also written by EPL, which broke out in early April.

In fact, since EPL is relatively easy to learn and fits into the Chinese language environment, it has been widely disseminated in China and is widely used.

At the same time, this has led to the gradual growth of some cases of using EPL to write ransomware and attack users, and even the "just for show, not for money" cases of ransom as described in this article.

Huorong will continue to monitor such ransomware and related cases, and will improve its defense rules to protect its users.

Once again, users are reminded that for most ransomware viruses, it is still impossible to decrypt unless the author provides a private decryption key (e.g. "WannaRen" ransomware).

In order to avoid losses caused by ransomware encryption, we should make frequent backups of important data, maintain good Internet habits, do not arbitrarily install and use unofficial software, do not click on unfamiliar emails, attachments and links, timely repair system vulnerabilities, and install qualified security software.

Annex: [Analytical report]

A detailed analysis

We've talked about hackers dropping blackmail viruses through backdoor viruses that encrypt user data files. Even more bizarrely, the author of the virus left a string of "I'm blackmailing for a reverse algorithm".

And in the process of trying to decrypt, we found that of the 8 bytes of random data used to decrypt, the virus author deliberately recorded only 4 of them in the file where the private key is located, the remaining 4 bytes need to be obtained by violent cracking.

The relevant data are shown in the following figure.

Ransomware attacks Chinese internet users just to show off-CnTechPost

Relevant data

The ransomware virus is released to a file called TRAE.exe in the directory where the backdoor virus is located. After execution, the ransomware virus encrypts the data file using the DES algorithm and stores the randomly generated DES key in the encrypted file using ECC (Elliptic Curve Cryptography).

The directory of encrypted data files is shown in the following figure.

Ransomware attacks Chinese internet users just to show off-CnTechPost

Directory of encrypted files

Ransomware attacks Chinese internet users just to show off-CnTechPost

Explanatory paper on extortion

Unlike previous ransomware viruses, the ransomware virus encrypts user files and leaves no payment address for the ransom payment. In cases where the user does not have security software installed, the virus author offers to let the user find a security vendor to decrypt it.

And over a period of time, we have received multiple user questions related to this ransomware in a row. The screenshots related to the user feedback situation are shown below.

The blackmail virus will randomly generate the ECC private key and public key, then the virus code will be ECC private key and ECC private key CRC32 splicing, and then after mixed sequence (mixed sequence based on 8 bytes of random data MD5 value) and different or (different or key random) encryption will finally be written to the "ECC encryption.log" file. The user file data is encrypted by DES algorithm, the DES key used for encryption is random and each file corresponds to a different DES key, and the DES key is stored in the encrypted file by ECC public key. The blackmail encryption process is shown in the following figure.

File encryption is complete, the virus program will marker, the ECC encrypted DES private key information, and the encrypted file information stitched together to form an encrypted file, the relevant file content information as follows.

The MD5 used for mixing is generated from 8 bytes of random data to generate the MD5-related code used for mixing, as shown in the following figure.

Ransomware attacks Chinese internet users just to show off-CnTechPost

Generation of MD5 for sequencing

After obtaining the required MD5 value, the virus will mix the previously obtained private key with the private key CRC32 value spliced behind the private key. The relevant codes are shown in the following figure.

Ransomware attacks Chinese internet users just to show off-CnTechPost

Mixed-order private key related code

The private key data will be spliced with the 3 bytes of random data from the mixed MD5 data generated in the previous paper, and then one of the bytes will be used as a foreign or key to encrypt the private key data.

Finally, the hetero or key is spliced over the encrypted data and written to the ransom note file.

Once the ECC private key is encrypted, the virus begins to encrypt the file.

Virus program will first determine the file information, when the file suffix "exe", "dll", "sys", "_HD" format or file size greater than 0x2DC6C0 bytes, skip this file, not encrypted.

Otherwise, the content of the file is compressed by Zlib algorithm and then encrypted by DES.

II. Appendix

Sample hash

Ransomware attacks Chinese internet users just to show off-CnTechPost

Source

More on Tech Industry

Ransomware attacks Chinese internet users just to show off-CnTechPost
Chinese video platform iQIYI reportedly to lay off 20-40% of its workforce
Ransomware attacks Chinese internet users just to show off-CnTechPost
Xiaomi's MIUI surpasses 500 million monthly active users worldwide
Ransomware attacks Chinese internet users just to show off-CnTechPost
Huawei posts sales revenue of about $71.3 billion in first 3 quarters
Ransomware attacks Chinese internet users just to show off-CnTechPost
Luckin Coffee posts H1 net revenue of $492.9 million, up 106% year-on-year
Ransomware attacks Chinese internet users just to show off-CnTechPost
Alibaba unveils ARM server chip Yitian 710, boasting strongest performance in the industry
Ransomware attacks Chinese internet users just to show off-CnTechPost
Alibaba reportedly to release Arm server chip
Ransomware attacks Chinese internet users just to show off-CnTechPost
Appliance giant Midea unveils OpenHarmony 2.0-based IoT system
Ransomware attacks Chinese internet users just to show off-CnTechPost
Honor resumes ties with Google, Honor 50 series to carry GMS
RansomwareSecuritySecurity AlertWannaRenWeb Security

Recent Posts

  • DeepSeek makes minor upgrades to its R1 reasoning model May 29, 2025
  • Chinese video platform iQIYI reportedly to lay off 20-40% of its workforce Dec 1, 2021
  • Xiaomi's MIUI surpasses 500 million monthly active users worldwide Nov 24, 2021
  • Education stocks soar with reports that China will resume after-school tutoring Nov 8, 2021
  • Huawei posts sales revenue of about $71.3 billion in first 3 quarters Oct 29, 2021
CnTechPost CnTechPost
CnTechPost.com
  • Home
  • Tech
  • Gadgets
  • Software
Subscribe
  • RSS Feed
About
  • About Us
  • Contact Us
  • Privacy Policy
Copyright ยฉ 2025 CnTechPost.