DETAILS
FidRW.exe begins by logging in to the following FTP server:IP: 69.89.20.50
URL: ftp.lassatt.com
USERNAME: [email protected]
PASSWORD: Z^?m6K!uh^rh
Upon successful authentication, there are 7 files listed in the server’s directory. FindRW.exe first requests exfiltrator.pdf which is actually an EXE. The file is downloaded as notepadd.exe and launched.
This second stage executable mimics the first and again logs into the FTP server but this time downloads persist.bat. This file is still under development as indicated by its contents. This will most likely be filled with persistence mechanisms to maintain the infection on the box.
The Demo_Ransomware.exe application collects the following system survey information and passes it back to the server.
After this, the application drops “Ransom Note.txt” to the public users directory and it reads:
Alas, we have been swindled by a ransomware application intended for demonstration/awareness purposes. Drats. No threat here.