Threat Database Ransomware PyCL Ransomware

PyCL Ransomware

By GoldSparrow in Ransomware

Computer users have reported their files becoming inaccessible, and a suspicious message being displayed on their computers. This message reads as follows:

'Your Personal Files Are Encrypted
Your documents, photos, databases and other important files have been encrypted with strongest encryption and unique key, generated for this computer. Private decryption key is stored on a secret Internet server and nobody can decrypt your files until you pay and obtain the private key.
1. Pay amount BTC (about of USD) to address:
2. Transaction will take about 15-30 minutes to confirm.
Decryption will start automatically. Do not: power off computer, run antivirus program, disable internet connection. Failures during key recovery and file decryption may lead to accidental damage on files.
Your files will be lost without payment through:'

This message and the inability to access the files on the infected computer indicate that the PyCL Ransomware has entered the victim's computer. The PyCL Ransomware is being distributed using the RIG Exploit Kit. This recent PyCL Ransomware attack may not be a full-fledged threat campaign, but it may just have been designed to test how to distribute this threat to potential victims. Factors that indicate this include the fact that the threat is not being deployed in its full version, and in the manner in which it is being distributed.

The PyCL Ransomware may be Delivered to Your PC by an EK

PC security researchers are referring to the PyCL Ransomware using this name because the PyCL Ransomware is programmed using Python and is delivered in a script with the file name 'cl.py' to the victims' computers. EITest seems to be used to deliver the PyCL Ransomware to victims through the use of exploits associated with the RIG Exploit Kit. Apparently, con artists have hacked into these websites to redirect computer users to ransomware infections. The PyCL Ransomware was being distributed along with another known ransomware Trojan, named Cerber. However, the PyCL Ransomware distribution was only carried out for one day, indicating that this may be part of a test run. Like other ransomware Trojans, the PyCL Ransomware is designed to encrypt the victims' files and then asks for the payment of a ransom from the victim.

How the PyCL Ransomware Carries out Its Attack

One of the files used in the PyCL Ransomware attack is named 'user.txt,' including the string 'xkwctmmh.' The string is included in every request to the PyCL Ransomware's Command and Control server. It seems likely that the PyCL Ransomware is part of the testing for a RaaS (Ransomware as a Service) platform that is not fully finished yet. These are services that allow con artists to lease the use of a ransomware Trojan, handling all distribution aspects of the infection. It seems that this user name, the string identified in the attack, is meant as the placeholder for the affiliate using the PyCL Ransomware. The PyCL Ransomware is distributed as an NSIS installer that includes the PyCL Ransomware files and a tutorial explaining how to pay the ransom to recover the affected files. The PyCL Ransomware connects to its Command and Control server constantly, providing status and debugging information, which also is an indicator of a ransomware Trojan in development. The PyCL Ransomware uses a strong encryption engine to make the victim's files completely inaccessible, but the current state of the attack seems to vary, as it is apparent that the PyCL Ransomware has not been released in its full form.

The PyCL Ransomware Attack in Its Current State

The PyCL Ransomware displays a four-day timer and the ransom note. The PyCL Ransomware displays a ransom note from its Command and Control server and decrypts the victim's files automatically if a ransom payment is carried out. However, the PyCL Ransomware in its current state does not delete the original files after the encryption, meaning that victims of the PyCL Ransomware attack do not need to fear that they will lose their data currently.

SpyHunter Detects & Remove PyCL Ransomware

File System Details

PyCL Ransomware may create the following file(s):
# File Name MD5 Detections
1. 1a83c155c8adfebc874a197bfb52d78f6aa367095b03409b228bce91e9d344da.exe 01cc60cef0b287d5ae2a2f0b7719a14a 0
2. 1ec7fba26788b5af4d3666ea041c3aec40d0794708d1824e01da84e0b46c6bf7.exe 8b8fcd6595eff3b6f135775dc3b06331 0
3. 3d81af5d87685ccb061f12fee72ddaef6c09f4c65fd45023e5a94c3b06423c25.exe cc3f19a561c66f9fc85700de69f7d084 0
4. 5809efb0d04a736ea6243ff7fbde9bda9fd45f9bbabfedaf471e275f8e4d1cc3.exe 13ad144fe1b79bd3d87f5baa3e016ec5 0
5. 654e7aad3fff9000d96f5eba702ca02e900f80038316326dc6e18d2e04cb04da.exe c2a4224455de94a9e90966d8725fdf61 0
6. 6cd37a120fbb8c675853f2d2ea7a905883e30a3b1185d5ce86af8b0a0e4d5cac.exe 9970db10dfd35bf4df2e999d5d63a4c7 0
7. 7b38e33eb641a40aaa33a5a195547c45b76569c2730f84a8c96ac03e11bee500.exe d79b9f680c9ac58c7bc2e821048ac632 0
8. 7d73a025b377e1e4cecd5af82c51e7540685a3d6766de0af92de0f624d743b1c.exe 8e82cfea40df9deb97b9a001f75244bf 0
9. 80d402f38ff9849ea5e9f8a126e00f423ca1b4f1121c8059aebed8336bfc6f30.exe 0b71016ac598c45e8a2a219eba903ec8 0
10. a0b1f5ab11a8250d7102bcab07f6dc770c0ca7cea9730028028dba0fbfad1210.exe 2509eae5750dbdec6430aafb651d0c68 0
11. b461fcc111346b09393bb7605d55ce93a45aa1b42277e16f12b600e235cd8162.exe 73acf2f69d68b4be4baffa33b70ef62d 0
12. b66d636e3261a39642938ea13babb248116a9b909eb4855be5a1c805a45d3bf3.exe 846eb8b919bfbd89274141dbc5c8cbd9 0
13. d58eb7b4b78db2d11f2a4288245a448a923ce30ebb5894f63cce2743e865bc49.exe 4e3aa8a35f0027bbecf6eb8f5f161b26 0
14. e38098502de083f7a5dbb7aefdc5732259f7718e69c03f52a5e968bc29fbb73e.exe 074b1d5e99a6873102aefac4e434ace5 0
15. f241f35bb0f53a1baf0e5da26ef7bb86f3de83e94f3ccab04086b26f2f95dde5.exe 2f03bf90f0b0ffbe9240782090aa9038 0
16. f28abe9533f44db0487e79d78eb67ed70b1a62c8ddb6444567eff40abf83577a.exe e4ce87a7829d11dc397d797fa675996c 0
17. f89cd790ea52c857918dde0fa634a8e1b780f28b381325174e2a9c2d64194892.exe d911b8312d5d2eaf86c03856c7b657d7 0

Related Posts

Trending

Most Viewed

Loading...