Home Malware Programs Ransomware LLTP Ransomware

LLTP Ransomware

Posted: March 22, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 171
First Seen: March 22, 2017
Last Seen: May 2, 2022
OS(es) Affected: Windows

The LLTP Ransomware is a modified version of the VenusLocker Ransomware with a partially rewritten code, although it continues encrypting files and extorting ransom money. Spanish and English speakers should watch for the usual infection vectors, such as e-mail attachments especially, and consider backing up their drives. When backups for restoration aren't available, preventing this threat's attacks by having anti-malware solutions able to delete the LLTP Ransomware is your best protection.

Venus Returns with an Unwanted Affection for Your Files

A new version of an old name in file-encrypting threat is starting to become known to PC users in both Spanish and English-speaking regions of the world. More than a low-effort clone or copy-paste project, the LLTP Ransomware is an update to the old VenusLocker Ransomware that includes a partial rewrite of its internal code, as well as an updated message for persuading its victims to pay the ransom. Its infection methods are, unfortunately, still in analysis.

The LLTP Ransomware encrypts your files using a two-part list of formats to attack with the AES-256, similarly to the VenusLocker Ransomware. The LLTP Ransomware also takes a new, and arguably unnecessary step: storing the now-indecipherable content in a password-protected RAR archive. The Trojan includes the WinRAR executable in its installation so that the victim's system doesn't need to have it installed for the encryption routine to complete itself.

Additionally, malware experts found that the LLTP Ransomware uses a thorough set of networking features that create contact with a C&C server for passing information back and forth. The LLTP Ransomware includes default configuration options for disconnected PCs so that disabling your Internet connectivity can't stop its file-encoding attacks.

Different variants of the LLTP Ransomware use different languages for communicating their ransom demands, as well as slightly different formats for renaming any of the data that they encrypt.

Converting Your Files Back to Agnosticism

For all of its interesting quirks that set it apart from the older VenusLocker Ransomware, the LLTP Ransomware remains a highly focused threat that, still, wants nothing more than Bitcoin payments. It conveys its demands through wallpaper images, Notepad text messages, and an additional pop-up that it inserts into the Windows startup routine. After the restart, PC users can view a depiction of the Anonymous mascot and requests for 200 USD in Bitcoins to restore your files.

One of the Trojan's components, the 'tlltpl.tlltpl' file stores the RSA password that its default configuration uses for decoding the AES-encrypted content. Users only should delete it if they're sure that they don't need it to try and recover any of their enciphered data. The Trojan overwrites the original filenames with a Base64 code, but you also can identify your files with one of the LLTP Ransomware's two extensions ('.ENCRYPTED_BY_LLTP ' and '.ENCRYPTED_BY_LLTPp').

Whether the VenusLocker Ransomware's authors are starting a new campaign or other threat actors are taking advantage of the past project is not yet determinable. Regardless, backing up your data every once in a while and installing anti-malware protection able to delete the LLTP Ransomware before it starts a scan are your most certain defenses against cyber ransoming attacks.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



file.exe File name: file.exe
Size: 961.53 KB (961536 bytes)
MD5: 4eaac55ddd279d402d0aba8707b9ca5b
Detection count: 39
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 22, 2017

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\..\..{RegistryKeys}Software\Microsoft\Windows\CurrentVersion\Run\LLTP
Loading...