LooCipher

A new ransomware called LooCipher has been discovered that is actively being used in the wild to infect users. While it is not known exactly how this ransomware is being distributed, based on some of the files that were found, we believe it is through a spam campaign.

LooCipher was first discovered by security researcher Petrovic and since then BleepingComputer and Michael Gillespie have observed multiple people being infected with this ransomware.

Distributed through malicious documents.

While we are not sure what kind of phishing campaign is spreading this ransomware, we do know that it is pushing a malicious Word document called Info_BSV_2019.docm.

When opened, this document will go through the standard tactic of asking you to enable macros in order to view the content as shown below.

Malicious Word Doc
Malicious Word Doc

If a user enables macros, the macros will connect to a Tor server through a gateway and download the http://hcwyo5rfapkytajg.onion.pet/3agpke31mk.exe file. This file will be renamed as LooCipher.exe and then executed as shown in the macro below.

Downloader Macro
Downloader Macro

The LooCipher Ransomware

When the ransomware is executed, LooCipher will create a file called c2056.ini on the Windows desktop where it will store the unique ID for the computer, a time limit when the key will allegedly expire, and a bitcoin address. This file states to not remove or alter it as it may interfere with the proper decryption of the ransomware.

LooCipher Configuration File
LooCipher Configuration File

The ransomware will then begin to encrypt the files on the computer. This routine is a bit buggy as instead of deleting the original unencrypted versions, it leaves them behind as 0 byte files.  Encrypted copies of the files will be created, though, that have the .lcphr extension appended to them.

LooCipher Encrypted Files
LooCipher Encrypted Files

Ransom notes will also be created called @Please_Read_Me.txt that contain a ransom amount in Euros, a bitcoin address to send payment to, and instructions on how to make a payment. The current ransom amount is €300 or approximately $330 USD. 

LooCipher Encrypted Files

LooCipher will also change the desktop wallpaper to another ransom note that contains similar information as the ransom note.

Desktop WallPaper
Desktop WallPaper

Finally, the LooCipher Decryptor window will be displayed. This program contains a countdown until your key will allegedly be deleted, as well as a button to check if a payment has been made. If a payment was made, the ransomware will download the key from the Tor servers and enable the Decrypt button so you can recover your files.  This has not been tested and it is not known if this process works.

LooCipher GUI
LooCipher GUI

If the LooCipher executable was removed, the ransom notes and desktop wallpaper both contain a mega.nz link that can be used to download the ransomware interface.

At this time, we are currently analyzing the ransomware and it is not known if it is decryptable. If anything further is discovered, we will update this article.

Protecting yourself from the LooCipher Ransomware

As ransomware is only damaging if you have no way of recovering your data, the most important thing is to always have a reliable backup of your files. These backups should be stored offline and not made accessible to ransomware, which have been known to target backups in the past.

As LooCipher is being spread by spam, it is important that all users be trained on how to properly identify malicious spam and to not open any attachments without first confirming who and why they were sent. Furthermore, if any attachments asks you to enable content or macros before viewing the content, immediately close the document and scan it with VirusTotal.

Finally, it also important to make sure that your network does not make Remote Desktop Services publicly accessible via the Internet. Instead, you should put it behind a firewall and make it only accessible through a VPN.

Related Articles:

Synlab Italia suspends operations following ransomware attack

Ransomware payments drop to record low of 28% in Q1 2024

HelloKitty ransomware rebrands, releases CD Projekt and Cisco data

The Week in Ransomware - April 19th 2024 - Attacks Ramp Up

United Nations agency investigates ransomware attack, data theft

IOCs

Hashes:

43cfb0a439705ab2bd7c46b39a7265ff0a14f7bd710b3e1432a9bdc4c1736c49

Associated Files:

@Please_Read_Me.txt
@LooCipher_wallpaper.bmp
LooCipher.exe
Info_BSV_2019.docm
c2056.ini

Text Ransom Note:

Q:  What happened to my files?
A:  All your important files (including those on the network disks, USBs, etc.) have been encrypted using a strong algorithm with a private and unique key generated for you.


Q:  Where is my key?
A:  Your key is stored in our TOR servers in order to preserve the anonymity.


Q:  What do I do?
A:  You need to make a Bitcoin payment for the decryption.
    Please send €300 (~$330) worth of Bitcoin to this address: 1Ps5Vd9dKWuy9FuMDkec9qquCyTLjc2Bxe


Q:  Can I recover my files by other means?
A:  No. There is not such a computing power nowadays to find this key within the time of a human could live. Even if you use Tianhe-2 (MilkyWay-2), currently the fastest supercomputer in the world, it will take millions of years. Neither NO ONE ANTIVIRUS CAN BRING YOUR FILES BACK, the only thing they could do is delete the decryptor software, but it's impossible they can recover your files, and if some of them is trying to sell you that, we invite you to purchase it and try.


Q:  How much time do I have?
A:  You have 5 days since your files were encrypted. Specifically until 2019/06/24 14:28. After this period your key will be automatically destroyed (except for the case of having made the transaction within the period but because of the transaction remains pending of being confirmed by the blockchain this time period is excedeed. In this case the key will remain safe throughout all this "pending of being confirmed" status of your transaction and additionally it will remain 7 days more after your transaction is confirmed in order that you have enough time to recover your files)


Q:  How can I trust?
A:  We strongly guarantee you can recover your files. Besides, if we didn't do it nobody trust us and we wouldn't get any payment. In fact, we built the decryptor in the own encryptor software as well in order to make the decryption process as simple as possible for you, thus avoiding having to download an external decryptor. Just make the payment, click  and if your payment is approved the  button will become enable to click.


If somehow you closed the decryptor window and you can't run the decryptor software you can download a copy of the decryptor through this link:
https://mega.nz/#!KclRVIRY!YrUgGjvldsoTuNZbCOjebAz5La7hbB41nJHk1mlgqZo
(Don't worry, your files won't be re-encrypted if they already are).