1892
Home Ransomware Detailed Technical Analysis of Black Heart Ransomware (SOLVED!)
Detailed Technical Analysis of Black Heart Ransomware (SOLVED!) Detailed Technical Analysis of Black Heart Ransomware (SOLVED!)
Ransomware | 05/14/2018

Detailed Technical Analysis of Black Heart Ransomware (SOLVED!)


In this technical analysis of the Black Heart Ransomware, our security experts review the details of the BlackHeart ransomware campaign and steps to take to protect against such attacks. This ransomware is bundled with the legitimate application ‘AnyDesk.’

BlackHeart Ransomware Overview

BlackHeart AKA BlackRouter is a part of the Ransomware Family. This ransomware is bundled with the legitimate application ‘AnyDesk.’

This is a new ransomware and it’s recently captured by the security researcher. How this ransomware enters into the system is still unknown but we are assuming that when you visit a malicious website.

This ransomware appends the filename by adding. pay2me extension in the last.

 

Flow Chart

Visiting Malicious Website

Bundled with Legitimate Application (AnyDesk)

 ↓

Drops 2 Files: AnyDesk.exe & BlackHeart.exe

 ↓

BlackHeart.exe encrypts the system and appends the filename by appending .pay2me extension at last.

Technical Analysis of Blackheart Ransomware

File Name: Blackheart.exe

MD5: 3E1F05B711BF194E17A5C55E6548D2C1

File Type: Executable

 

Detailed Analysis with Screenshot:

On execution of this ransomware, it initiates the encryption process by filtering its matching criteria of file extensions and folders that are going to be encrypted.

As shown below, this ransomware searches for these file extensions:

.txt .doc .docx .xls .xlsx .ppt .pptx .odt .jpg .png .csv .sql .mdb .sln .php .asp .aspx .html .xml .psd .rar .zip .mp3 .exe .PDF .rtf .CFU .mxl .epf .erf .vrp .grs .geo .elf .lgf .lgp .log .pff .mft .efd .ini .CFL .cer .backup .tiff .jpeg .accdb .sqlite .dbf .cdr .dwg .gif .mp4 .avi .mkv .wmv .webmp .bak

As shown below, this ransomware searches for these folders:

Program Data

Desktop

Download

Users

Documents

Pictures

Videos

Music

User Profile

All Users

Application Data

App Data

 

It also encrypts the data of other System Drives.

Once it is found and encrypts a file, it will append the .pay2me extension to the affected file.

Once it has accomplished the encryption process, then it deletes the Volume Shadow Copies from the system by initiating the CMD.exe that executes delete command (/c vssadmin.exe delete shadows /all /quiet)

black heart ransomware process 1

Figure 1 Process Tree

Deletion of Volume Shadow Copies

Figure 2 Deletion of Volume Shadow Copies

Once the encryption is accomplished along with the deletion process, then it drops 2 Ransom Notes on each drive of the system:

%Desktop%\ReadME-BLackHeart.txt

All Drives:\ ReadME-BLackHeart.txt

 

As shown below, the content of the ReadME-BLackHeart.txt:

black heart Ransom Note

Figure 3 Ransom Note

 

At last, it shows the Ransom Note Message on the Screen:

black heart ransomware ransom message

                                                 Figure 4 Ransom Message

As shown above, “Ransomware Author” demands for 200$ or 0.024 BTC (In Bitcoins) for decryption and send it to following Bitcoin Address “15q2hGyPZim4zdP96EYjU44nPtTagWyLfc”. It also warns the user if he tries to Shut down or Restart the System, Files will be Permanently Crypted.

Once the payment has been done than user has to send the Email at vahidkhaz123@gmail[.]com containing its Personal Key.


Tips to Prevent virus and malware from Infecting Your System:
  1. Enable your popup blocker: Pop-ups and ads on the websites are the most adoptable tactic used by cybercriminals or developers with the core intention to spread malicious programs.
    So, avoid clicking uncertain sites, software offers, pop-ups etc. and Install a powerful ad- blocker for ChromeMozilla, and IE
  2. Keep your Windows Updated: To avoid such infections, we recommend that you should always keep your system updated through automatic windows update.By doing this you can keep your device free from virus.According to the survey, outdated/older versions of Windows operating system are an easy target.
  3. Third-party installation: Try to avoid freeware download websites as they usually install bundled of software with any installer or stub file.
  4. Regular Backup: Regular and periodical backup helps you to keep your data safe in case the system is infected by any kind of virus or any other infection.Thus always backup important files regularly on a cloud drive or an external hard drive.
  5. Always have an Anti-Virus: Precaution is better than cure. We recommend that you install an antivirus like ITL Total Security or a good Malware Removal Tool like Download Virus RemovalTool

 

Newsletter

×
×
#include file="../statichtml/static_notification.html"

1

ITLSecureVPN_setup.exe
2

3

1

2

3

1

2

3