Teslacrypt Analysis

Great Essays
Teslacrypt (a.k.a. EccKrypt ) is a malicious program that encrypts users ' files without the knowledge or consent of the user. It falls into the sub-category of ransomware, a type of malware that encrypts the user 's files using AES encryption and forces them to pay a certain amount of money to decrypt the user 's information, essentially holding a person 's data as hostage. It first emerged around February 2015 along with its counterpart, Alphacrypt, which was released in April 2015, and it has proven capable of infecting most versions of Windows including Windows XP, Windows Vista, Windows 7 and Windows 8.

It can infect multiple types of files, but among the most infected are video game files, including, but not limited
…show more content…
The Teslacrypt binary itself is compiled with Visual C++. When it is created, this executable will launch and begin scanning the user 's drives for data it can encrypt. Once a file is targeted, Teslacrypt will encrypt it via an AES cipher, store sha-256 of different keys in key.dat and create a new file extension. File extensions vary depending on the version of Teslacrypt the computer is infected with. Currently, the known file extensions are: ecc, .ezz, .exx, .xyz, .zzz, .aaa, .abc, .ccc. One version of Teslacrypt didn 't even change the file extensions. The supported data flies that Teslacrypt can encrypt are: .7z, .rar, .m4a, .wma, .avi, .wmv, .csv, .d3dbsp, .sc2save, .sie, .sum, .ibank, .t13, .t12, .qdf, .gdb, .tax, .pkpass, .bc6, .bc7, .bkp, .qic, .bkf, .sidn, .sidd, .mddata, .itl, .itdb, .icxs, .hvpl, .hplg, .hkdb, .mdbackup, .syncdb, .gho, .cas, .svg, .map, .wmo, .itm, .sb, .fos, .mcgame, .vdf, .ztmp, .sis, .sid, .ncf, .menu, .layout, .dmp, .blob, .esm, .001, .vtf, .dazip, .fpk, .mlx, .kf, .iwd, .vpk, .tor, .psk, .rim, .w3x, .fsh, .ntl, .arch00, .lvl, .snx, .cfr, .ff, .vpp_pc, .lrf, .m2, .mcmeta, .vfs0, .mpqge, .kdb, .db0, .DayZProfile, .rofl, .hkx, .bar, .upk, .das, …show more content…
The malware will scan all of your drive letters. Once it finishes the encryption, it will delete all Shadow Volume copies on the computer, making restoring information from a previous backup very difficult. After it encrypts a specific list of files, it will connect to the command server via TOR network (a free software for anonymous communication) using TOR proxies. After the encryption is complete, the application will be displayed, essentially functioning as a ransom note. A text file denoting the encryption and ransom details will be created in every folder containing an encrypted file as well as on the desktop. The ransomware will also change your desktop wallpaper to a BMP file located on the desktop. This ransom note contains information on how to access the payment site and how to get your personal information decrypted. It also allows for a single file to be decrypted as proof that the user will be able to get all of their files back. The malware gave the user an option to pay using BitCoin, PaySafeCard, PayPal, or Ukash. The PayPal option was removed later, however. Once infected, the user 's only hope was to either pay the ransom or restore from a backup. However, because Teslacrypt deletes

Related Documents

  • Improved Essays

    The hacker can also gain access to the files saved on the hard drive and share them with others in…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Also its fight against a huge group of spyware programs and stop its work, such as those that operate to capture images of the surface of your desk or use…

    • 253 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    It updates daily and informs the main user of who is on this site, who is watching this video, or who is online shopping. Spyware has become a parent’s new best friend because it helps them protect their child…

    • 166 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Later at the facility, Mae shows Jack footage of Julia and Ricky infecting Charley with the nanoparticles. They find a virus that kills the bacteria that help form the nanoparticles, and hope to give the virus to those infected with the micro particles to kill the micro particles. They planned to release the virus from the sprinklers and/or make the infected drink the virus. After a long fight, Jack finally tricked Ricky into turning the safety systems back on, turning on the sprinklers and releasing the virus. The facility fills with methane gas, blowing up as Mae and Jack escape by…

    • 518 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The bubonic plague is the most common form of the disease, refers to telltale buboes which appear around the neck, groin or armpit. The septicemic plague comes via fleas or from contact with body infected by plague and spreads through the blood stream Pneumonic plague is the most infectious type; it is when the disease passes from person to another through airborne droplets coughed from the lungs. It kills about 50 percent of those it infects.…

    • 424 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    They can be spread from person to person, animal to person, and mother to unborn child. In other words direct contact. Also can be caused by indirect contact, this is when you get something from and object such as a laptop, doorknob or faucet handle. You can also get it from an insect bite. This is from when a mosquito bites you and you get malaria, or from a tick bite that can cause six disease—three of which are Lyme disease, Rocky mountain fever, and…

    • 86 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    A Trojan horse is a type of malware that is often disguised as appropriate software. Trojans can be applied by cyber criminals and hackers trying to gain access to user’s systems (Fritsch et al, 2015). Users are normally tricked by some form of social engineering into loading and executing Trojans on their systems. When activated, Trojans can enable cyber-criminals to spy on an individual, steal sensitive data, and gain backdoor access to the system.…

    • 1458 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Magnets Research Paper

    • 1049 Words
    • 5 Pages

    Developer Total Monkery has released their new ID@Xbox title, MagNets: Fully Charged, which is an overhauled port of the original game that came out on Steam last year. I never got a chance to play the original myself, nor have I indulged in any arcade-style collectathon games in quite a long time, so I was hoping this would be an interesting change of pace for me. Sadly, this wouldn’t be all that interesting of an experience for me. MagNets is a pretty simple game in both its gameplay and story; you play as Faraday, a small android-like park ranger at Polarity Park who must fight against these block-shaped robots (aptly named Bloxbots) who’ve gone rogue and have captured the MagNetPets, robotic animals that are precious to Polarity City.…

    • 1049 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    People across the nation claim this virus is what many feared and thought would never happen... Zombies! Lock the door…

    • 959 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Essay On Croup

    • 630 Words
    • 3 Pages

    Croup is an acute infectious laryngotracheitis which occurs mostly in children less than six years of age(although the peak incidence is around two years). It is characterized by a barking cough, hoarse voice and respiratory difficulties, which are typically seen to occur at night. Symptoms of croup Croup usually begins as an ordinary cold with symptoms such as a runny nose, slight rise of temperature and a mild cough. Within a week, a child with croup develops a barking cough with noisy breathing.…

    • 630 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In The Kill Order, Earth has been hit by sun flares, which destroy vast amounts of land and creates intense radiation. The Earth’s population is cut in half, but resources are low, and the surviving population is large. Trying to prevent the rapid depletion of resources, the Population Control Committee (PCC) propose the release a deadly virus in an attempt to prevent extinction of the human race. VC321xb47 kills fast and efficiently, shutting down the brain, and causes severe hemorrhages, which spreads the disease. The original virus weakens itself with each new host, dieing out after a certain number.…

    • 442 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Ebola According to “Why it`s Not Enough to just Eradicate Ebola”, the United States plans to spend $6 billion fighting Ebola. Should other countries spend the same amount of money on preventing the spread of Ebola to other countries or should they leave it to Africa to handle the situation? Is it a good idea to spend all this money on something that could never happen in America again? Yes, the U.S. needs to take whatever steps necessary to stop the spread of Ebola.…

    • 1514 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Many people think of Influenza, also known as the flu, as a common cold or a stomach bug that will pass over in the matter of a day. Yet true influenza is a specific category of viruses that can be very dangerous and many people tend to underestimate it. When it comes to the flu there are many aspects surrounding it. This includes historical outbreaks of the virus, the causes of worldwide pandemics, and ways the virus may be prevented. There are three main types of this virus.…

    • 881 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Preventing Influenza, Youth Influenza, more commonly known as “the flu,” is a viral infection that mainly affects the respiratory tract. The respiratory tract includes organs that help you breathe, such as the lungs, nose, and throat. The flu causes many common cold symptoms, as well as a high fever and body aches. The flu spreads easily from person to person (is contagious).…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    The design of Tesla cars has attracted consumers once they heard that the car is powered by electricity. Consumers are interested in it as it is something new and unique in the market. Tesla cars are also beneficial for consumers as they save heavily from fuel. The annual fuel costs for average gasoline cars in USD is $1245 whereas annual running costs for Tesla is $423. The business has successfully gained a sustainable competitive advantage in the market due to their ability to differentiate their products from other businesses in the industry.…

    • 1833 Words
    • 8 Pages
    Superior Essays