Used to Distribute Crypto Ransomware

Published: 2015-02-25
Last Updated: 2015-02-25 01:04:23 UTC
by Johannes Ullrich (Version: 1)
3 comment(s)

Thanks to Marco for sending us a sample of yet another piece of crypto-ransom malware. The file was retrieved after visiting a compromised site ( . Interestingly, the malware itself was stored on is a cloud based file sharing service targeting corporate users. It is run by Barracuda, a company also known for its e-mail and web filtering products that protect users from just such malware. To its credit, Barracuda removed the malware within minutes of Marco finding it.

At least right now, detection for this sample is not great. According to Virustotal, 8 out of 57 virus engines identify the file as malicious [1]. A URL blocklist approach may identify the original site as malicious, but is unlikely to be blocked. It has become very popular for miscreants to store malicious files on cloud services, in particular if they offer free trial accounts. Not all of them are as fast as Barracuda in removing these files.


Johannes B. Ullrich, Ph.D.

3 comment(s)


Corporate users typically have corporate administrators.

If the latter dont restrict the privileges of the former, especially their ability to execute random junk they might leech from all over the net, then these corporate administrators should be fired in the first place.

If but their managers/supervisors dont let them configure the users systems properly: fire the managers/supervisors!
is available in Windows for about 13.5 years now!
looks like companies are moving on this. maybe not as fast as they could be, but virus total already reports that 17/57 now detect
Just wondering if this still applies to MMC control for Network container control: "Currently, this applies only to Microsoft Windows Installer (*.MSI) packages. It does not apply to software downloaded in Microsoft Internet Explorer."

Diary Archives