Potato 发表于 2021-3-2 19:17

CoronaLocker勒索病毒家族详情

【家族名】
Win32/Ransom.CotonaLocker

[平台]   /   [主类型].[家族名]
平台类型 :Win32 Win64
威胁类型 : Ransom

【是否支持解密】
360解密大师:暂不支持
在线解密:暂不支持

【被加密文件】
被加密文件后缀格式: 修改文件后缀为.system32x


【勒索提示信息】:
文件名:@_FILES_WERE_ENCRYPTED_@.TXT、@_HOW_TO_DECRYPT_FILES_@.TXT、@_HOW_TO_PAY_THE_RANSOM_@.TXT
文件内容 :
-------------------------------------------------------------------------------
#################> CORONA LOCKER <#################
SORRY! Your files are encrypted.
File contents are encrypted with random key.
Random key is encrypted with RSA public key (2048 bit).
We STRONGLY RECOMMEND you NOT to use any "decryption tools".
These tools can damage your data, making recover IMPOSSIBLE.
Also we recommend you not to contact data recovery companies.
They will just contact us, buy the key and sell it to you at a higher price.
If you want to decrypt your files, you have to get RSA private key.
In order to get private key, write here:
===========
!ATTENTION!
Attach file is SYSTEMS32X.KEY from ..\AppData\Roaming to message,
without it we will not be able to decrypt your files
===========
And pay $80 on BTC-wallet:
>> 1P9RWUQPJ2sSGszTqvi7cxzLWkUecAchgs <<
If someone else offers you files restoring, ask him for test decryption.
Only we can successfully decrypt your files; knowing this can protect you from fraud.
You will receive instructions of what to do next.
#################> CORONA LOCKER <#################
-------------------------------------------------------------------------------
【防护建议】
1.多台机器,不要使用相同的账号和口令
2.登录口令要有足够的长度和复杂性,并定期更换登录口令
3.重要资料的共享文件夹应设置访问权限控制,并进行定期备份
4.定期检测系统和软件中的安全漏洞,及时打上补丁。
5.定期到服务器检查是否存在异常。查看范围包括:
a)是否有新增账户
b) Guest是否被启用
c) Windows系统日志是否存在异常
d)杀毒软件是否存在异常拦截情况
6.安装安全防护软件,并确保其正常运行。
7.从正规渠道下载安装软件。
8.对不熟悉的软件,如果已经被杀毒软件拦截查杀,不要添加信任继续运行。

页: [1]
查看完整版本: CoronaLocker勒索病毒家族详情