Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

Operation Global III ransomware not only encrypts, but infects your data as well


  • Please log in to reply
82 replies to this topic

#31 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  •  Avatar image
  • Admin
  • 45,113 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:09:21 AM

Posted 09 March 2015 - 09:40 AM

If anyone has a recent sample of this infection, I would like to see it please. You can submit it here:

http://www.bleepingcomputer.com/submit-malware.php?channel=3

BC AdBot (Login to Remove)

 


#32 duskshine

duskshine

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:01:21 AM

Posted 09 March 2015 - 05:47 PM

file submitted as requested - original file is a .png (fb logo) 11049 bytes long. let me know if you want me to submit the original as well.

 

regarding decrypt exes, here are some ideas for script writer(i had a thinned down version myself doing only a few of points listed below):

 

- search disk for exe modified at the day infected (possibly with certain time restriction as well);

- check the file name pattern; (all .???.exe are encrypted files)

- these would be non-exe, as all encrypted .exe simply remains ".exe" instead of ".exe.exe";

- for these files, invoke them from the script and terminate process after say 60seconds;

- for ".exe" files, check the icon with pattern recon looking for the small "lock";

- remember where those .exes are and write to output.

 

this should in theory decrypt all non-executables like jpg zip etc, and generate a list of .exe for you to manually run (some of which would be potentially damaging thus its better to leave this for hand)



#33 cabooltureadam

cabooltureadam

  •  Avatar image
  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:QLD Australia
  • Local time:11:21 PM

Posted 10 March 2015 - 01:02 AM

It's still continuing to infect files for me....even new files that I have created on the desktop since the patch?  How do I stop that?



#34 sjouk

sjouk

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:01:21 PM

Posted 13 March 2015 - 09:06 AM

Seem to have the same situation here. Jpgs copied to the laptop just a few minutes ago are encrypted already. Would be great to know how to stop this.

#35 sjouk

sjouk

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:01:21 PM

Posted 25 March 2015 - 04:15 AM

Hi,

 

Has anyone actually been able to remove this virus? I have applied the AUS fix and the 'lock out' is now removed. I can double click on most files and they will decrypt BUT the virus is still there, it is still encrypting files and there seems no way to stop it.

 

Any help is bery much appreciated.

 

Thanks

Steve


Edited by sjouk, 25 March 2015 - 04:20 AM.


#36 Nathan

Nathan

    DecrypterFixer


  •  Avatar image
  • Security Colleague
  • 1,617 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:09:21 AM

Posted 25 March 2015 - 11:55 AM

I dont have much time these days, or even now sadly. So its hard to test, but I'm quite positive that hit man pro alert will remove the remaining infection, and also remove the service that is encrypting new files (its a love os, google it for instructions). But you may want yo make sure u use my patcher to decrypt all files u need first because once the infection is gone, u cant use it.


Have you performed a routine backup today?

#37 sjouk

sjouk

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:01:21 PM

Posted 25 March 2015 - 11:58 AM

Thanks for the help. I  will give this a go but, as you say I need to decrypt all files first so it may be a while before I can report back.



#38 twh254

twh254

  •  Avatar image
  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:07:21 AM

Posted 01 April 2015 - 04:52 PM

Hey, looking for some help with an infected computer. Similar to another post, I have ran the patch, and get the message  "the infection exe could not be found".  The infection is a Canadian one; it is on a windows 7 64 machine.  The infection even comes up in safe mode.  I have a Linux and window 8 partition on the machine that are not affected, and can access all of the files on the infected partition; could this be any help?  Just looking to recover some of the encrypted files and wipe the machine; is there any good way to that with a decryption tool?



#39 Nathan

Nathan

    DecrypterFixer


  •  Avatar image
  • Security Colleague
  • 1,617 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:09:21 AM

Posted 01 April 2015 - 05:03 PM

upload a infected file and post the link. If it actually is a operation global variant then decryption may be possible.


Have you performed a routine backup today?

#40 twh254

twh254

  •  Avatar image
  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:07:21 AM

Posted 01 April 2015 - 06:51 PM

I am sorry i am new at this; i uploaded a file with the 'Submit a Malware Sample' but i don't know how to link it here.



#41 twh254

twh254

  •  Avatar image
  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:07:21 AM

Posted 07 April 2015 - 09:32 PM

Hi, just wondering if the file worked? Or if there was anything else needed.



#42 mrfssd

mrfssd

  •  Avatar image
  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:09:21 AM

Posted 10 April 2015 - 02:30 AM

Ok.. same as other are saying, one of my client got hit with the Canadian version of this crapware.. I manage to suppress the ransomware, so it won't start, but have not wipe it out either.  

 

But the decrypter saying the ransomware is not running. so I can't decrypte the file

 

I have upload a copy to the malware sample submission form.  Is there other thing I needed to do to send this file so I could get someone to help me with the decryption?

 

Name of the file is call VeMoMccQ.backup.exe (I have added the work backup to it so I could save a copy without wiping it)

 

Please help.. 


Edited by mrfssd, 10 April 2015 - 02:35 AM.


#43 bobsfriend

bobsfriend

  •  Avatar image
  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:21 AM

Posted 11 April 2015 - 06:52 PM

I just got this virus on one of my computers. I tried the patcher supplied in this thread, but it said it was unable to find the infection exe. I used the 'Submit Malware' page to upload a screen shot and an infected file sample. Hopefully someone is able to help me. I am ok with reinstalling my OS, I would just like to get some of the files back first. thanks in advance for any help.

 

EDIT: I have found the actual infection executables. Would it help if I uploaded them as well?


Edited by bobsfriend, 11 April 2015 - 08:50 PM.


#44 bobsfriend

bobsfriend

  •  Avatar image
  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:21 AM

Posted 18 April 2015 - 04:05 PM

Des anyone know if the source code for the operation global III patcher is available somewhere? If I can't get a modified patcher to fix the version of the virus that I have, thenI can try modifying it myself.



#45 Nathan

Nathan

    DecrypterFixer


  •  Avatar image
  • Security Colleague
  • 1,617 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:09:21 AM

Posted 18 April 2015 - 04:11 PM

can someone please upload a infected file and pm me the link again? Sorry its been so long, its been nuts. I'll try and get the patched out, and if not post the source


Have you performed a routine backup today?




1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users