{"id":8936,"date":"2015-01-10T09:22:31","date_gmt":"2015-01-10T14:22:31","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=8936"},"modified":"2015-01-10T09:36:42","modified_gmt":"2015-01-10T14:36:42","slug":"a-new-ransomware-program-called-pclock-a-heads-up","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/a-new-ransomware-program-called-pclock-a-heads-up\/","title":{"rendered":"A New Ransomware Program Called PClock &#8211; A Heads Up"},"content":{"rendered":"<header>\n<div id=\"attachment_7066\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"http:\/\/thundercloud.net\/infoave\/new\/a-new-ransomware-program-called-pclock-a-heads-up\/\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-7066\" class=\"wp-image-7066 size-medium\" src=\"http:\/\/thundercloud.net\/infoave\/new\/wp-content\/uploads\/2014\/02\/Grim-Reaper-300x300.jpg\" alt=\"Grim-Reaper\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.thundercloud.net\/infoave\/new\/wp-content\/uploads\/2014\/02\/Grim-Reaper-300x300.jpg 300w, https:\/\/www.thundercloud.net\/infoave\/new\/wp-content\/uploads\/2014\/02\/Grim-Reaper-150x150.jpg 150w, https:\/\/www.thundercloud.net\/infoave\/new\/wp-content\/uploads\/2014\/02\/Grim-Reaper-660x660.jpg 660w, https:\/\/www.thundercloud.net\/infoave\/new\/wp-content\/uploads\/2014\/02\/Grim-Reaper.jpg 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-7066\" class=\"wp-caption-text\">PClock &#8211; Ramsomware that can lock your files<\/p><\/div>\n<p class=\"entry-title\">Our friends at Emsisoft are on the ball and are on top of a new ransomware called PClock which copies CryptoLocker. If a computer is infected with PClock the user will be asked to pay a $300 ransom to unlock their files. In other words, if you don&#8217;t pay the ransom you&#8217;ll not be able to open many files including pictures stored on your computer, Office documents like Word and Excel, and many other files too. Essentially you are locked out of opening a lot of files on your computer until you pay the ransom&#8230;or so the malware miscreants would like you to believe.<\/p>\n<p class=\"entry-title\">We&#8217;ve been recommending Emsisoft for two years now and with every passing day our choice of Emsisoft as our number one anti-malware and anti-virus choice looks better and better. Emsisoft and Cloudeight share the same respect for our customers and our mutual customers &#8211; and both of us don&#8217;t believe everything should be done for profit.<\/p>\n<p class=\"entry-title\">The information below comes from Emsisoft and is published here with permission. If you know of anyone whose computer has been locked by PClock, please share this information &#8211; it may save them $300 because Emsisoft provides the fix for all versions of PClock free of charge. It might be a good idea for you to bookmark this post in case you fall victim to PClock too. You can share this article via Facebook or Twitter by clicking the appropriate icon at the top right corner of this page.<\/p>\n<p class=\"entry-title\">We are proud of our relationship with Emsisoft and we&#8217;re proud to recommend and <span style=\"text-decoration: underline;\">s<a href=\"http:\/\/thundercloud.net\/emsisoft\/\">ell Emsisoft Anti-Malware<\/a><\/span>. It&#8217;s the security software everyone can trust.<\/p>\n<p class=\"entry-title\">Here is the article from Emsisoft explaining PClock; it contains links to the free PClock decryptor tool that can reverse the damaged done by PClock as well as unlocked the files PClock has encrypted and locked.<\/p>\n<blockquote>\n<h1 class=\"entry-title\">New Ransomware Alert: CryptoLocker copycat PClock discovered<\/h1>\n<\/blockquote>\n<\/header>\n<section>\n<div class=\"entry-content\">\n<div>\n<div id=\"content\">\n<blockquote><p>Ransomware CryptoLocker was\u00a0one of the most <strong>infamous malware families<\/strong> of the years 2013 and 2014 and although the operation behind the original CryptoLocker malware family has been dismantled in 2014, it\u2019s still a name that frightens a lot of users and system administrators alike. It is therefore\u00a0not surprising that other malware authors try to capitalize\u00a0on\u00a0CryptoLocker\u2019s reputation by releasing copycats. One of the most recent copycats that we became aware of is a ransomware named PClock that showed up just a day ago. Unlike CryptoLocker though, which was a somewhat complex and sophisticated piece of malware, PClock is quite primitive by nature.<\/p>\n<h3>72-hour countdown timer to pay USD$300 ransom<\/h3>\n<p>Like all file encrypting ransomware (also known as crypto malware) PClock\u2019s main goal is to encrypt important files on the victim\u2019s system in order to compel them to <strong>pay a ransom<\/strong> in return for their files. Like CryptoLocker it gives the user a 72-hour ultimatum to pay the ransom of 1 bitcoin (approximately USD $300). Otherwise it claims to destroy the keys required to decrypt the user\u2019s files:<\/p>\n<p><a href=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2015\/01\/%5EF484B8B773DF2857BE46FFE49E9230AB939DBE26ADBFCE98A7%5Epimgpsh_fullsize_distr.png\"><img decoding=\"async\" class=\"aligncenter wp-image-11699  img-large\" src=\"https:\/\/secure-assets.readability.com\/01b95c0cbc7a6e20226fafc7f29f1f97d214fccf\/687474703a2f2f626c6f672e656d7369736f66742e636f6d2f77702d636f6e74656e742f75706c6f6164732f323031352f30312f253545463438344238423737334446323835374245343646464534394539323330414239333944424532364144424643453938413725354570696d677073685f66756c6c73697a655f64697374722d333030783232342e706e67\" alt=\"^F484B8B773DF2857BE46FFE49E9230AB939DBE26ADBFCE98A7^pimgpsh_fullsize_distr\" width=\"343\" \/><\/a><\/p>\n<p>If a user does\u00a0not pay the ransom within the allotted time, it will display a <strong><span class=\"skimlinks-unlinked\">last_chance.txt<\/span><\/strong> file that tells the user\u00a0to download the malware again, which supposedly gives you another 3 days to make the payment. In reality though PClock does not destroy any keys, so the countdown is pretty much meaningless.<\/p>\n<h3>How PClock infects a new system<\/h3>\n<p>At this point it is not entirely clear how PClock, which is written in Visual Basic 6, enters a user\u2019s system. Once it manages to to execute on the victim\u2019s system however, it will copy itself to the current user\u2019s application data folder using the sub-folder \u201cWinCL\u201d and the file name \u201cWinCL.exe\u201d. It then establishes persistence by creating a new registry value within the HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run key named \u201cwincl\u201d pointing towards the newly created WinCL.exe executable. The malware then tries to encrypt the victims\u2019s files. It specifically targets files with one of the following extensions:<\/p>\n<p>*.3fr, *.accdb, *.ai, *.arw, *.bay, *.cdr, *.cer, *.cr2, *.crt, *.crw, *.h, *.dbf, *.dcr, *.der, *.dng, *.doc, *.docm, *.docx, *.dwg, *.dxf, *.dxg, *.eps, *.erf, *.indd, *.jpe, *.jpg, *.kdc, *.mdb, *.mdf, *.mef, *.mrw, *.nef, *.nrw, *.odb, *.odm, *.odp, *.ods, *.odt, *.orf, *.p12, *.p7b, *.p7c, *.pdd, *.pef, *.pem, *.pfx, *.ppt, *.pptm, *.pptx, *.psd, *.pst, *.ptx, *.r3d, *.raf, *.raw, *.rtf, *.rw2, *.rwl, *.srf, *.srw, *.wb2, *.wpd, *.wps, *.xlk, *.xls, *.xlsb, *.xlsm, *.xlsx<\/p>\n<p>Every files the malware tries to encrypt is recorded within a file named \u201cenc_files.txt\u201d located in the victim\u2019s profile folder. After the encryption has finished the malware will try to delete and disable all shadow copies. <strong>Shadow copies<\/strong>\u00a0is the technology that powers the Windows\u2019 \u201cPrevious Version\u201d feature that allows a user to restore previous versions of a file. This feature is often used by ransomware victims to recover their files so a lot of ransomware families started to destroy any previous versions created by the shadow copy\u00a0service. Last but not least the malware will create a shortcut to itself on the victims\u2019s desktop and change the victims\u2019s desktop wallpapter to the following picture:<\/p>\n<p><a href=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2015\/01\/wallpaper.png\"><img decoding=\"async\" class=\"aligncenter size-medium wp-image-11721 img-large\" src=\"https:\/\/secure-assets.readability.com\/5936d0b88710e90bda9b9880a26b99101d4410ac\/687474703a2f2f626c6f672e656d7369736f66742e636f6d2f77702d636f6e74656e742f75706c6f6164732f323031352f30312f77616c6c70617065722d333030783232332e706e67\" alt=\"wallpaper\" width=\"300\" \/><\/a><\/p>\n<p>During the infection and encryption process the malware will try to maintain a log on\u00a0the malware author\u2019s command and control server:<\/p>\n<p>P04552 8:08:02 AM Files encrypted<br \/>\nP04552 8:08:02 AM STATE: CRYPTED_OK<br \/>\nP04552 8:08:02 AM Delete shadows<br \/>\nP04552 8:08:04 AM Shadows: no ADMIN<br \/>\nP04552 8:11:06 AM Shadows deleted<br \/>\nP04552 8:11:06 AM STATE: SHADOWS_OK<br \/>\nP04552 8:11:06 AM Prepare<br \/>\nP04552 8:11:08 AM Saved BTC price \u2013 330<br \/>\nP04552 8:11:11 AM Shortcut created<br \/>\nP04552 8:11:12 AM STATE: PREPARE_OK<br \/>\nP04552 8:11:12 AM Change wallpaper<br \/>\nP04552 8:11:13 AM Wallpaper changed<\/p>\n<p>This excerpt shows an example of an infection taking place to give you an idea about what is being logged.<\/p>\n<h3>PClock: a lot of show but little substance<\/h3>\n<p>Similar to the countdown, the ransom note is far from the truth as well and even though the malware may look somewhat professional at first glance it becomes obvious\u00a0quickly that the people behind it are <strong>amateurs at best<\/strong>. The encryption algorithm used for example is just a simple XOR based obfuscation that uses a constant key on all systems. Due to that we are able to provide a<strong> decrypter<\/strong> that can be found further down this post. A more severe sign for the lack of professionalism is the fact that the malware contains <strong>several disastrous\u00a0bugs<\/strong> that may cause data loss on the victim\u2019s system. If the malware encounters a particularly large file for example that is too big to fit into\u00a0memory the malware\u00a0will end up truncating the existing file instead of encrypting it. The result is a 0-byte file that contains neither the original nor the encrypted file content. Once the malware messed up a file like that the last hope for the victim\u00a0are data recovery tools.<\/p>\n<h3>How to unlock\u00a0your encrypted files<\/h3>\n<p>As mentioned before the encryption used by PClock is extremely weak and can easily be reverted. To help and guide you in that process we developed a small decrypter utility. Our decrypter will enable\u00a0you to<strong> decrypt any PClock encrypted files that haven\u2019t been damaged<\/strong> beyond repair by the malware and clean up your computer without having to pay the ransom. You can download our decrypter here:\u00a0<a class=\"bbc_url\" title=\"External link\" href=\"http:\/\/emsi.at\/DecryptPClock\" rel=\"nofollow external\">http:\/\/emsi.at\/DecryptPClock<\/a><\/p>\n<p><a href=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2015\/01\/%5EF254945C1D47C5B6AD5EA4A9008FFD763FF5A536B9741BE0D4%5Epimgpsh_fullsize_distr.png\"><img decoding=\"async\" class=\"aligncenter wp-image-11692 size-medium img-large\" src=\"https:\/\/secure-assets.readability.com\/245d79dceed611ea60215e9a1d21fac1cebb5204\/687474703a2f2f626c6f672e656d7369736f66742e636f6d2f77702d636f6e74656e742f75706c6f6164732f323031352f30312f253545463235343934354331443437433542364144354541344139303038464644373633464635413533364239373431424530443425354570696d677073685f66756c6c73697a655f64697374722d333030783232322e706e67\" alt=\"^F254945C1D47C5B6AD5EA4A9008FFD763FF5A536B9741BE0D4^pimgpsh_fullsize_distr\" width=\"300\" \/><\/a><\/p>\n<p><a href=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2015\/01\/%5E3FACE4A13E8DAD75E8747860F17ACCFC831B6E2D922847791E%5Epimgpsh_fullsize_distr.png\"><img decoding=\"async\" class=\"aligncenter wp-image-11696 size-medium img-large\" src=\"https:\/\/secure-assets.readability.com\/356e59e3a4656116f2aaa3d39cba86c839fdfb5f\/687474703a2f2f626c6f672e656d7369736f66742e636f6d2f77702d636f6e74656e742f75706c6f6164732f323031352f30312f253545334641434534413133453844414437354538373437383630463137414343464338333142364532443932323834373739314525354570696d677073685f66756c6c73697a655f64697374722d333030783232322e706e67\" alt=\"^3FACE4A13E8DAD75E8747860F17ACCFC831B6E2D922847791E^pimgpsh_fullsize_distr\" width=\"300\" \/><\/a><\/p>\n<p>The decrypter will use a list of encrypted files the malware stores on the victim\u2019s system to determine which files are in need of decryption. This list is loaded automatically when you start the decrypter and in theory all you would have to do is load up the decrypter and hit the \u201cDecrypt\u201d button. In practice it isn\u2019t that simple though due to the fact that the malware does not provide enough information for the decrypter to be absolutely sure that the decrypted file is exactly like the original unencrypted one that the malware targetted. We therefore decided to play it safe and <strong>keep backups of all encrypted files<\/strong>. These backups will take a lot of disk space and essentially double the amount of space required on your hard disk to hold both the decrypted file as well as the encrypted backup. If you are running low on disk space you can disable the backups in the decrypter\u2019s option menu. This should be a last resort though and before you try to use the decrypter that way you should try the decrypter out on a small number of test files that you can verify manually to make sure the decrypter is operating correctly.<\/p>\n<p>If you don\u2019t feel comfortable performing the decryption process on your own, feel free to <a href=\"http:\/\/support.emsisoft.com\/forum\/6-help-my-pc-is-infected\/\" target=\"_blank\">create a support request in our support forum<\/a> or <a href=\"&#x6d;&#x61;&#x69;&#108;&#116;o:h&#x65;&#x6c;&#x70;&#x64;&#101;sk&#64;&#x65;&#x6d;&#x73;&#x69;&#115;oft&#x2e;&#x63;&#x6f;&#x6d;\">send us an email<\/a>.<\/p>\n<p><strong>UPDATE\u00a02015-01-06, 8PM UTC:<\/strong> An updated version of PClock was released where this decrypter does not work with yet. We\u2019re working on an update. Please return in a couple of hours if you are affected by the threat. Please also read <a href=\"http:\/\/www.bleepingcomputer.com\/forums\/t\/561970\/new-pclock-cryptolocker-ransomware-discovered\/page-3\" target=\"_blank\">this thread<\/a> at the Bleepingcomputer forum where this topic is discussed.<\/p>\n<p><strong>UPDATE 2015-01-09:<\/strong> the malware authors released\u00a0two more versions of PClock. The good news is that the Emsisoft decrypter is ready and works for both versions. You\u00a0can download the Emsisoft decrypter version 2\u00a0<a href=\"http:\/\/emsi.at\/DecryptPClock2%20\" target=\"_blank\">here<\/a>. Read the<a href=\"http:\/\/www.bleepingcomputer.com\/forums\/t\/561970\/new-pclock-cryptolocker-ransomware-discovered\/page-8\" target=\"_blank\">instructions <\/a>thoroughly first on page 8 in the Bleepingcomputer forum discussion.<\/p>\n<p>Emsisoft\u2019s Fabian develops the decrypters in his spare time for victims of ransomware. We\u2019d appreciate it if you\u00a0share this post\u00a0so that more victims of PClock can be helped&#8230;<\/p><\/blockquote>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Our friends at Emsisoft are on the ball and are on top of a new ransomware called PClock which copies CryptoLocker. If a computer is infected with PClock the user will be asked to pay a $300 ransom to unlock their files. In other words, if you don&#8217;t pay the ransom you&#8217;ll not be able to open many\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/a-new-ransomware-program-called-pclock-a-heads-up\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1655,1433,1669,1426,1670,1656,779],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/8936"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=8936"}],"version-history":[{"count":7,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/8936\/revisions"}],"predecessor-version":[{"id":8943,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/8936\/revisions\/8943"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=8936"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=8936"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=8936"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}