Hi deamonslay, I have asked before and now I have a case where this uncertainty about who did what.
Different ransom notes different content. some copy cats other the original encryptor.
Maybe this belong in ID-ransomware topic or in PM
- Nov 2015: .ccc _how_recover_ivu.HTML (confirmed by me) Unknown by ID ransomware
- Late Feb 2016 - Late March and also some in April _RECOVERY_+dlllx.html (those 5 random characters)
- _RECOVERY_+nhpmw.html (content about AES not RSA 4096)
I thought Tesla claimed RSA and not AES
- Early April 2016 {RecOveR}-xrarh__.Txt (content RSA 4096) could be Tesla or something else Also 5 random but a .Txt and .Png shares the same random characters
Also not the cases of the extension
- Early April de_crypt_readme.txt (confirmed it was encrypted with Tesla v4) but the text content is again mentioning RSA4096 so it looks one Tesla v3-4.1 targeted the file
and used this help file (ransom note)
- Early april. how_recover+ock.txt.crypt A ransom note from .ccc attack in Nov encrypted with .crypt. (Confirmed the Cryptxxx)
- Early april.howto_recover_file_pgrrx.txt.crypt (probably the same as above)
Anyway I have all the files where I refer to the cases above.
I think the service ID-ransomware has to many false positives (hard to do it different) I know, but maybe those above mentioned files can be ompened and the content examined
I can therefore send you the samples if you like.
My question my case.
Are you able to mention all notes names, recovery nems for
.ccc encryptions
Tesla v3 - Tesla v4.1 including the v4a
and the original Cryptxxx
Based on time stamps I think I identified in the case I'm working on the following.
Nov .ccc
Feb Tesla v3late or v4 early
March Tesla v3late or v4 early
Late March v4 later
April .crypt (Cryptxxx)
For the user it is hard to find the key to the .crypt files since apparently no before and after files exists.
unless I can find one file that only .crypt targeted and that the user had a copy of from before the April attack.
All others are decryptable when the "currently" decryptable .crypt is decrypted. For any other cases this would be easy, but not when multi encryptin has happened
and no valid samples are found (as of yet)
Any advices, you can use PM if you like and maybe the ID-service can be improved even more.
I have 13 MB samples and 75 files, ransom notes howtos etc with different names and content...
I cannot confirm all, since it is a mixture on this case, however I was able to conclude to some extent.
See above my "claims"
Link is here to my analysis: https://www.sendspace.com/filegroup/X373y8ZdZZ4gnxhsuwLMOAR
Regards, and keep up the great work you do.