MSIL/BlackRuby.CC3E!tr.ransom

description-logoAnalysis



MSIL/BlackRuby.CC3E!tr.ransom is a detection for a Black Ruby Ransomware trojan.
Below are some of its observed characteristics/behaviours:

  • This malware may drop any of the following file(s):
    • HOW-TO-DECRYPT-FILES.txt: This file is a txt file and will serve as ransom notes. It will be dropped in every affected folder.

  • Affected files of this Ransomware will use the prepending filenaming format as Encrypted_{Random}.BlackRubyLight.

  • This malware was also observed to affect/encrypt files located on shared drive within the same subnet.

  • After executing this malware, it may delete itself.

  • The malware will try to download strings from the following url, but this url has already been removed.

    • hxxp://geoip.nek{Removed}.com/api

  • Below is a sample illustration of the Ransom notes:

    • Figure 1: Ransom notes.



recommended-action-logoRecommended Action

  • Make sure that your FortiGate/FortiClient system is using the latest AV database.
  • Quarantine/delete files that are detected and replace infected files with clean backup copies.

Telemetry logoTelemetry

Detection Availability

FortiGate
Extended
FortiClient
Extreme
FortiAPS
FortiAPU
FortiMail
Extreme
FortiSandbox
Extreme
FortiWeb
Extreme
Web Application Firewall
Extreme
FortiIsolator
Extreme
FortiDeceptor
Extreme
FortiEDR

Version Updates

Date Version Detail
2019-01-08 65.49200 Sig Updated
2019-01-04 65.39600 Sig Updated