Security researchers at Trend Micro have identified a new ransomware family that is being delivered as a fake Google Software Update application. Dubbed HavanaCrypt, the ransomware performs multiple anti-virtualization checks and uses a Microsoft web hosting service IP address for its command and control (C&C) server, which allows it to evade detection. During their analysis of HavanaCrypt, Trend Micro also discovered that it uses a namespace method function that queues a method for execution and that it employs the modules of an open-source password manager during encryption. Compiled in .NET and protected using the Obfuscar open-source obfuscator, HavanaCrypt hides its window after execution, then checks the AutoRun registry for a “GoogleUpdate” entry and continues with its routine if the registry is not found.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |