qkG Filecoder: Self-Replicating, Document-Encrypting Ransomware

  • 22 November 2017
  • 1 reply
  • 161 views

Userlevel 7
Badge +54
22nd November 2017 By Jaromir Horejsi (Threat Researcher)
 
 http://blog.trendmicro.com/trendlabs-security-intelligence/files/2016/05/Ransomeware04-200x200.jpg
 
We encountered a few interesting samples of a file-encoding ransomware variant implemented entirely in VBA macros called qkG (detected by Trend Micro as RANSOM_CRYPTOQKG.A). It’s a classic macro malware infecting Microsoft Word’s Normal template (normal.dot template) upon which all new, blank Word documents are based.
 
Further scrutiny into qkG also shows it to be more of an experimental project or a proof of concept (PoC) rather than a malware actively used in the wild. This, however, doesn’t make qkG less of a threat. As the qkG samples demonstrated, its behaviors and techniques can be fine-tuned by its developer or other threat actors. When we first saw samples of it in VirusTotal last November 12, for instance, it didn’t have a Bitcoin address yet. It had one only two days later, along with a routine that encrypts a document on a specific day and time. The next day, we saw a qkG sample with a different behavior (viz., not encrypting documents with a specific file name format).
 
Full Article.

1 reply

Userlevel 7
It appears there is always something new being developed by these hackers. Its a constant battle and a uphill climb.

Reply