Author Topic: New CryptoWall Infection  (Read 2088 times)

0 Members and 1 Guest are viewing this topic.

REDACTED

  • Guest
New CryptoWall Infection
« on: January 19, 2015, 08:06:54 PM »
Hello - I have read everything I can find on this topic.  I got infected, installed Avast, ran a boot scan, installed anti-malware that was recommended on the forum, ran a scan, system automatically rebooted ... still infected.  Please advise.

Offline Eddy

  • Avast Evangelist
  • Maybe Bot
  • ***
  • Posts: 31078
  • Watching (over?) you
    • Malware removal, Biljart and other things.
Re: New CryptoWall Infection
« Reply #1 on: January 19, 2015, 08:36:20 PM »

Offline Lisandro

  • Avast team
  • Certainly Bot
  • *
  • Posts: 67194
Re: New CryptoWall Infection
« Reply #2 on: January 19, 2015, 08:37:25 PM »
CryptoWall is a ransomware that, even when "cleaned" or removed, will let all your documents encrypted and ask for a ransom.
Did you install after being infected?
The best things in life are free.

Offline Eddy

  • Avast Evangelist
  • Maybe Bot
  • ***
  • Posts: 31078
  • Watching (over?) you
    • Malware removal, Biljart and other things.
Re: New CryptoWall Infection
« Reply #3 on: January 19, 2015, 08:45:26 PM »
Depending on the version of CryptoWall there are decoding tools for it to restore the files.

If the system is really clean, remove all encrypted files and restore them from a backup.
Ofcourse do a thorough check on the backup before restoring from it.

Offline Lisandro

  • Avast team
  • Certainly Bot
  • *
  • Posts: 67194
Re: New CryptoWall Infection
« Reply #4 on: January 20, 2015, 01:11:58 AM »
Indeed Eddy.
My concern is about Avast detection. I hope it did not miss the infection... (false negative). But we need to wait for the user to return and post.
The best things in life are free.

Offline Michael (alan1998)

  • Massive Poster
  • ****
  • Posts: 2768
  • Volunteer
Re: New CryptoWall Infection
« Reply #5 on: January 20, 2015, 11:39:22 AM »
I think he installed after the infection. Just my read. My issue now, is I don't think the new one is clean-able. The new version of Cryptowall (3.0) is it also uses Win32:Sality (or a modified version of that) and the REN command to rename the Executables. Once that is done, it'll inject the Source Malicious code, and once you run (What you think is your personal Documents), it'll just reinfect your system. Hopefully this ins't the case. If it is, well, sadly, a full reformat might be needed.
VOLUNTEER

Senior Security Analyst; Sys Admin (Linux); Forensics/Incident Response.

Security is a mindset, not an application. Think BEFORE you click.