Home Malware Programs Ransomware Colecyrus@mail.com Ransomware

Colecyrus@mail.com Ransomware

Posted: October 26, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 32
First Seen: October 26, 2017
OS(es) Affected: Windows

The Colecyrus@mail.com Ransomware is a Trojan that locks your PC's media so that it can demand payments for restoring them with a custom decryption solution. Although having backups gives victims safe ways of recovering with minimal issues, users without that option may request help from experienced cyber security researchers on freeware decryption possibilities. Most brands of anti-malware programs include protection from threats of this type and may uninstall the Colecyrus@mail.com Ransomware to stop any further data loss.

Trojans Saying 'Boo!' to Your Files

Threat actors don't need many excuses to use seasonal themes for their craftsmanship, which can provide additional touches to help differentiate their Trojans from the competition or even manipulate the victims' psychologically. The Colecyrus@mail.com Ransomware is a subtle variant of the usual, Halloween-based format, but, unlike the partially-made, the Trick-Or-Treat Ransomware, has a working payload that damages the user's files. Since the Colecyrus@mail.com Ransomware doesn't appear to be using traditional, AES-based enciphering features, whether or not the locked data is recoverable is uncertain.

While malware experts have yet to verify live attacks deploying the Colecyrus@mail.com Ransomware, the Trojan's payload shows no signs of being incomplete and can both take media hostage and deliver ransom-based messages to profit from doing so. The defining features of this Trojan include:

  • The Colecyrus@mail.com Ransomware scans for and locks various formats of media on infected PCs using an enciphering method still in investigation. XOR and TEA are the two encoding algorithms malware experts are estimating as being most likely abused to lock files and keep them from opening.
  • The Colecyrus@mail.com Ransomware also creates a custom ID string corresponding to each infection or 'customer,' as it references in its ransom note (see below).
  • The Colecyrus@mail.com Ransomware adds both a '.b007' extension and an e-mail address to the ends of the names of all content that it blocks. Together with the ID, the address gives victims the necessary information for paying a ransom.
  • The Colecyrus@mail.com Ransomware's authors are using text messages that the Trojan may place on the desktop for delivering their ransom-paying demands, after which they may or may not opt to unlock your files. The Trojan doesn't provide details on how much it costs to purchase the decryptor within its three-day time restriction but does offer a 'free sample' to prove that the threat actors can decode your media.

Solving the Mystery of an October File-Locker's Attacks

Although its text messages resemble those of other Trojan campaigns strongly, particularly those of the Globe Ransomware, the Colecyrus@mail.com Ransomware may not be a clone of past threats and uses an unusual data-locking function that's likely of requiring a custom decryptor. Since decoding such enciphering attacks is often impractical, malware analysts suggest that all users save their media to backups for expedient restoration. PC security experts with experience analyzing file-locking Trojans also may provide further insight into decryption possibilities after acquiring samples of the Colecyrus@mail.com Ransomware.

Victims should assume that the Colecyrus@mail.com Ransomware will circulate through methods that disguise its intentions, such as spam e-mails pretending to be delivery notices, fake downloads for triple-A games, or drive-by-download scripts on corrupted websites. Anti-malware products can provide security against all of these infection methods and block the Colecyrus@mail.com Ransomware immediately. Since the Trojan's file-scanning feature may show no symptoms while occurring, users shouldn't depend on visual detection of this threat.

Trojans don't need 'military-grade,' secure encryption standards like AES-ECB and RSA to cause sufficient damage to insecure PCs. For the average victim, even the most basic attacks, like those embedded in the Colecyrus@mail.com Ransomware's payloads, are more than adequate hazards.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



file.exe File name: file.exe
Size: 395.77 KB (395776 bytes)
MD5: 95f769fb6170382e07ebd2ff21c17c6c
Detection count: 38
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 29, 2017
Loading...