Last week, Kafeine published a blog post about a ransomware being distributed by the Nuclear Pack exploit kit. This ransomware identify itself as “CryptoFortress”, but the ransom message and payment page both looks like an already known ransomware: TorrentLocker.
After further analysis, ESET researchers found out is the two threats are in fact very different. It appears the group behind CryptoFortress has stolen the HTML templates with its CSS. The malware code and the scheme are actually very different. Here is a table summering the similarities and differences:
|Hardcoded C&C server
|Ransom page location
|Fetched from C&C server
|Included in malware
|Payment page location
|Onion-routed (but same server as the hardcoded C&C)
|AES key encryption
|Encrypted portion of files
|2 Mb at beginning of file
|First 50% of the file, up to 5 Mb
|Bitcoin (variable amount)
Last Friday, Renaud Tabary from Lexsi published a complete analysis of the new ransomware. ESET researchers have independently analyzed the CryptoFortress samples before Lexsi released the details. The technical details described in the article matches our findings.
ESET Telemetry also shows TorrentLocker campaign is still propagating via spam messages. Both campaign are now running in parallel.
CryptoFortress: Teerac.A (aka TorrentLocker) got a new identity, http://malware.dontneedcoffee.com/2015/03/cryptofortress-teeraca-aka.html
|ESET Detection name
CryptoFortress public key
-----BEGIN PUBLIC KEY-----
-----END PUBLIC KEY-----