{"id":14771,"date":"2019-03-06T09:10:13","date_gmt":"2019-03-06T17:10:13","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/03\/06\/news-8520\/"},"modified":"2019-03-06T09:10:13","modified_gmt":"2019-03-06T17:10:13","slug":"news-8520","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/03\/06\/news-8520\/","title":{"rendered":"Spotlight on Troldesh ransomware, aka &#8216;Shade&#8217;"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Wed, 06 Mar 2019 16:00:00 +0000<\/strong><\/p>\n<p>Despite\u00a0the decline in the number of ransomware infections over the last year, there are several ransomware families that are still active. <a href=\"https:\/\/blog.malwarebytes.com\/detections\/ransom-troldesh\/\">Ransom.Troldesh<\/a>, aka Shade, is one of them. According to our product telemetry, Shade has experienced a sharp increase in detections from Q4 2018 to Q1 2019.<\/p>\n<p>When we see a swift spike in detections of a malware family, that tells us we\u2019re in the middle of an active, successful campaign. So let\u2019s take a look at this \u201cshady\u201d ransomware to learn how it spreads, what are its symptoms, why it\u2019s dangerous to your business, and how you can protect against it.<\/p>\n<div id=\"attachment_27322\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/TroldeshFebspike.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27322\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/spotlight-troldesh-ransomware-aka-shade\/attachment\/troldeshfebspike\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/TroldeshFebspike.png\" data-orig-size=\"672,246\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"TroldeshFebspike\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/TroldeshFebspike-300x110.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/TroldeshFebspike-600x220.png\" class=\"size-large wp-image-27322\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/TroldeshFebspike-600x220.png\" alt=\"Troldesh spike\" width=\"600\" height=\"220\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/TroldeshFebspike-600x220.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/TroldeshFebspike-300x110.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/TroldeshFebspike.png 672w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\"><em>Troldesh spiked in February 2019<\/em><\/p>\n<\/div>\n<h3>Infection vector<\/h3>\n<p>Troldesh, which has been around since 2014, is typically spread by malspam\u2014specifically malicious email attachments. The attachments are usually zip files presented to the receiver as something he \u201chas to\u201d open quickly. The extracted zip is a Javascript that downloads the malicious payload (aka the ransomware itself). The payload is often hosted on sites with a <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/08\/secure-content-management-system\/\">compromised Content Management System (CMS)<\/a>.<\/p>\n<div id=\"attachment_27323\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_obfuscated_js.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27323\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/spotlight-troldesh-ransomware-aka-shade\/attachment\/troldesh_obfuscated_js\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_obfuscated_js.png\" data-orig-size=\"1002,823\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Troldesh_obfuscated_js\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_obfuscated_js-300x246.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_obfuscated_js-600x493.png\" class=\"size-large wp-image-27323\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_obfuscated_js-600x493.png\" alt=\"Troldesh obfuscated Javascript\" width=\"600\" height=\"493\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_obfuscated_js-600x493.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_obfuscated_js-300x246.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_obfuscated_js.png 1002w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\"><em>Part of the obfuscated Troldesh Javascript<\/em><\/p>\n<\/div>\n<p>As the sender in Troldesh emails is commonly <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2016\/06\/email-spoofing\/\">spoofed<\/a>, we can surmise that the threat actors behind this campaign are <a href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/02\/business-anti-phishing\/\" target=\"_blank\" rel=\"noopener\">phishing<\/a>, hoping to pull the wool over users\u2019 eyes in order to get them to open the attachment.<\/p>\n<p>The origin of Troldesh is believed to be Russian because its ransom notes are written in both Russian and English.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_ransom_note-1.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27324\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/spotlight-troldesh-ransomware-aka-shade\/attachment\/troldesh_ransom_note-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_ransom_note-1.png\" data-orig-size=\"600,332\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Troldesh_ransom_note\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_ransom_note-1-300x166.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_ransom_note-1-600x332.png\" class=\"aligncenter size-large wp-image-27324\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_ransom_note-1-600x332.png\" alt=\"Troldesh ransom note\" width=\"600\" height=\"332\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_ransom_note-1.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_ransom_note-1-300x166.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>Target systems are running Windows OS. Victims will have to unzip the attachment and double-click the Javascript file to get the infection started.<\/p>\n<h3><strong>Ransomware behavior<\/strong><\/h3>\n<p>Once deployed, the ransomware drops a lot of numbered readme#.txt files on the infected computer after the encryption routine is complete, most likely to make sure that the victim will read at least one of them. These text files contain the same message as the ransom note.<\/p>\n<h4>Targeted file extensions<\/h4>\n<p>Troldesh looks for files with these extensions on fixed, removable, and remote drives:<\/p>\n<p>.1cd, .3ds, .3fr, .3g2, .3gp, .7z, .accda, .accdb, .accdc, .accde, .accdt, .accdw, .adb, .adp, .ai, .ai3, .ai4, .ai5, .ai6, .ai7, .ai8, .anim, .arw, .as, .asa, .asc, .ascx, .asm, .asmx, .asp, .aspx, .asr, .asx, .avi, .avs, .backup, .bak, .bay, .bd, .bin, .bmp, .bz2, .c, .cdr, .cer, .cf, .cfc, .cfm, .cfml, .cfu, .chm, .cin, .class, .clx, .config, .cpp, .cr2, .crt, .crw, .cs, .css, .csv, .cub, .dae, .dat, .db, .dbf, .dbx, .dc3, .dcm, .dcr, .der, .dib, .dic, .dif, .divx, .djvu, .dng, .doc, .docm, .docx, .dot, .dotm, .dotx, .dpx, .dqy, .dsn, .dt, .dtd, .dwg, .dwt, .dx, .dxf, .edml, .efd, .elf, .emf, .emz, .epf, .eps, .epsf, .epsp, .erf, .exr, .f4v, .fido, .flm, .flv, .frm, .fxg, .geo, .gif, .grs, .gz, .h, .hdr, .hpp, .hta, .htc, .htm, .html, .icb, .ics, .iff, .inc, .indd, .ini, .iqy, .j2c, .j2k, .java, .jp2, .jpc, .jpe, .jpeg, , .jpf, .jpg, .jpx, .js, .jsf, .json, .jsp, .kdc, .kmz, .kwm, .lasso, .lbi, .lgf, .lgp, .log, .m1v, .m4a, .m4v, .max, .md, .mda, .mdb, .mde, .mdf, .mdw, .mef, .mft, .mfw, .mht, .mhtml, .mka, .mkidx, .mkv, .mos, .mov, .mp3, .mp4, .mpeg, .mpg, .mpv, .mrw, .msg, .mxl, .myd, .myi, .nef, .nrw, .obj, .odb, .odc, .odm, .odp, .ods, .oft, .one, .onepkg, .onetoc2, .opt, .oqy, .orf, .p12, .p7b, .p7c, .pam, .pbm, .pct, .pcx, .pdd, .pdf, .pdp, .pef, .pem, .pff, .pfm, .pfx, .pgm, .php, .php3, .php4, .php5, .phtml, .pict, .pl, .pls, .pm, .png, .pnm, .pot, .potm, .potx, .ppa, .ppam, .ppm, .pps, .ppsm, .ppt, .pptm, .pptx, .prn, .ps, .psb, .psd, .pst, .ptx, .pub, .pwm, .pxr, .py, .qt, .r3d, .raf, .rar, .raw, .rdf, .rgbe, .rle, .rqy, .rss, .rtf, .rw2, .rwl, .safe, .sct, .sdpx, .shtm, .shtml, .slk, .sln, .sql, .sr2, .srf, .srw, .ssi, .st, .stm, .svg, .svgz, .swf, .tab, .tar, .tbb, .tbi, .tbk, .tdi, .tga, .thmx, .tif, .tiff, .tld, .torrent, .tpl, .txt, .u3d, .udl, .uxdc, .vb, .vbs, .vcs, .vda, .vdr, .vdw, .vdx, .vrp, .vsd, .vss, .vst, .vsw, .vsx, .vtm, .vtml, .vtx, .wb2, .wav, .wbm, .wbmp, .wim, .wmf, .wml, .wmv, .wpd, .wps, .x3f, .xl, .xla, .xlam, .xlk, .xlm, .xls, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .xps, .xsd, .xsf, .xsl, .xslt, .xsn, .xtp, .xtp2, .xyze, .xz, and .zip<\/p>\n<h4>Encryption<\/h4>\n<p>Files are encrypted using AES 256 in <a href=\"https:\/\/en.wikipedia.org\/wiki\/Block_cipher_mode_of_operation#Cipher_Block_Chaining_(CBC)\">CBC mode<\/a>. For each encrypted file, two random 256-bit AES keys are generated: One is used to encrypt the file\u2019s contents, while the other is used to encrypt the file name. The extensions mentioned above are added after the encryption of the filename.<\/p>\n<h3>Protect against Troldesh<\/h3>\n<p>Malwarebytes users can block Ransom.Troldesh through several different protection modules, which are able to stop the ransomware from encrypting files in real time.<\/p>\n<p>Real-time protection against the files in our definitions stops the ransomware itself:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_rtp-1.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27325\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/spotlight-troldesh-ransomware-aka-shade\/attachment\/troldesh_rtp-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_rtp-1.png\" data-orig-size=\"472,240\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Troldesh_rtp\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_rtp-1-300x153.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_rtp-1.png\" class=\"aligncenter size-full wp-image-27325\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_rtp-1.png\" alt=\"real time protection Troldesh\" width=\"472\" height=\"240\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_rtp-1.png 472w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_rtp-1-300x153.png 300w\" sizes=\"auto, (max-width: 472px) 100vw, 472px\" \/><\/a><\/p>\n<p>Our anti-exploit and anti-ransomware modules block suspicious behavior:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_mbarw.png\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27326\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/spotlight-troldesh-ransomware-aka-shade\/attachment\/troldesh_mbarw\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_mbarw.png\" data-orig-size=\"490,252\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Troldesh_mbarw\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_mbarw-300x154.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_mbarw.png\" class=\"aligncenter size-full wp-image-27326\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_mbarw.png\" alt=\"Malwarebytes anti ransomware\" width=\"490\" height=\"252\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_mbarw.png 490w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_mbarw-300x154.png 300w\" sizes=\"auto, (max-width: 490px) 100vw, 490px\" \/><\/a><\/p>\n<p>Meanwhile, Malwarebytes&#8217; malicious website protection blocks compromised sites:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_mwac.png\" data-rel=\"lightbox-5\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27327\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/spotlight-troldesh-ransomware-aka-shade\/attachment\/troldesh_mwac\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_mwac.png\" data-orig-size=\"526,276\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Troldesh_mwac\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_mwac-300x157.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_mwac.png\" class=\"aligncenter size-full wp-image-27327\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_mwac.png\" alt=\"Web protection\" width=\"526\" height=\"276\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_mwac.png 526w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/Troldesh_mwac-300x157.png 300w\" sizes=\"auto, (max-width: 526px) 100vw, 526px\" \/><\/a><\/p>\n<h3>Other methods of protection<\/h3>\n<p>There are some security measures you can take to avoid getting to the phase where protection has to kick in or files need to be recovered.<\/p>\n<ul>\n<li><strong>Scan emails with attachments.<\/strong> These suspicious mails should not reach the end user.<\/li>\n<li><strong>User education.<\/strong> If they do reach the end user, they should be informed not to open attachments of this nature or run executable files in attachments. In addition, if your company has an <a href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/02\/business-anti-phishing\/\" target=\"_blank\" rel=\"noopener\">anti-phishing plan<\/a>, they should know who to forward the email to in the organization for investigation.<\/li>\n<li><strong>Blacklisting.<\/strong> Most end users do not need to be able to run scripts. In those cases, you can blacklist\u00a0<em>wscript.exe.<\/em><\/li>\n<li><strong>Update software and systems.\u00a0<\/strong>Updating software can plug up vulnerabilities and keep known exploits at bay.<\/li>\n<li><strong>Back up files.\u00a0<\/strong>Reliable and easy-to-deploy backups can shorten the recovery time.<\/li>\n<\/ul>\n<h3>Remediation<\/h3>\n<p>If you should get to the point where remediation is necessary, these are the steps to follow:<\/p>\n<ul>\n<li><strong>Perform a full system scan.<\/strong> Malwarebytes can detect and remove Ransom.Troldesh without further user interaction.<\/li>\n<li><strong>Recover files.\u00a0<\/strong>Removing Troldesh does not decrypt your files. You can only get your files back from backups you made before the infection happened or by performing a roll-back operation.<\/li>\n<li><strong>Get rid of the culprit.\u00a0<\/strong>Delete the email that was the root cause.<\/li>\n<\/ul>\n<h3>Decryption<\/h3>\n<p>Even though AES 256 is a strong encryption algorithm, there are free decryption tools available for some of the Troldesh variants. You can find out more about these decryption tools at <a href=\"https:\/\/www.nomoreransom.org\/\">NoMoreRansom.org<\/a> (look under \u201cShade\u201d in the alphabetical list).<\/p>\n<p>Victims of Troldesh are provided with a unique code, an email address, and a URL to an onion address. They are asked to contact the email address mentioning their code or go to the onion site for further instructions. It is not recommended to pay the ransom authors, as you will be financing their next wave of attacks.<\/p>\n<p>What sets Troldesh apart from other ransomware variants is the huge number of readme#.txt files with the ransom note dropped on the affected system, and the contact by email with the threat actor. Otherwise, it employs a classic attack vector that relies heavily on\u00a0tricking uninformed victims. Nevertheless, it has been quite successful in the past, and in its current wave of attacks. The free decryptors that are available only work on a few of the older variants, so victims will likely have to rely on backups or roll-back features.<\/p>\n<h3>IOCs<\/h3>\n<p><strong>Ransom.Troldesh has used the following extensions for encrypted files:<\/strong><\/p>\n<p>.xtbl<br \/> .ytbl<br \/> .cbtl<br \/> .no_more_ransom<br \/> .better_call_saul<br \/> .breaking_bad<br \/> .heisenberg<br \/> .da_vinci_code<br \/> .magic_software_syndicate<br \/> .windows10<br \/> .crypted000007<br \/> .crypted000078<\/p>\n<div id=\"x_magicdomid291\"><b>Contacts<\/b><b>:<\/b><\/div>\n<div id=\"x_magicdomid291\">Novikov.Vavila@gmail.com<\/div>\n<div id=\"x_magicdomid292\">Selenadymond@gmail.com<\/div>\n<div id=\"x_magicdomid292\">RobertaMacDonald1994@gmail.com<\/div>\n<div><\/div>\n<div><strong>IPs<\/strong><\/div>\n<div id=\"x_magicdomid293\">TCP 154.35.32.5 443 outgoing<\/div>\n<div><\/div>\n<div id=\"x_magicdomid293\">\n<div id=\"x_magicdomid785\"><b>Bitcoin:<\/b><\/div>\n<div id=\"x_magicdomid786\">1Q1FJJyFdLwPt5yyZAQ8kfxfeWq8eoD25E<\/div>\n<div><\/div>\n<div id=\"x_magicdomid787\"><b>Domain :<\/b><\/div>\n<div id=\"x_magicdomid788\">cryptsen7fo43rr6.onion<\/div>\n<\/p><\/div>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/spotlight-troldesh-ransomware-aka-shade\/\">Spotlight on Troldesh ransomware, aka &#8216;Shade&#8217;<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/spotlight-troldesh-ransomware-aka-shade\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Wed, 06 Mar 2019 16:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/spotlight-troldesh-ransomware-aka-shade\/' title='Spotlight on Troldesh ransomware, aka 'Shade''><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/shutterstock_401964952.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Troldesh is ransomware that relies heavily on user interaction. Nevertheless, a recent spike in detections shows it&#8217;s been successful against businesses in the first few months of 2019.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/malware-threat-analysis\/\" rel=\"category tag\">Malware<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/decryptor\/\" rel=\"tag\">decryptor<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/decryptors\/\" rel=\"tag\">decryptors<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransom-troldesh\/\" rel=\"tag\">ransom.troldesh<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware-remediation\/\" rel=\"tag\">ransomware remediation<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/shade\/\" rel=\"tag\">shade<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/threat-spotlight\/\" rel=\"tag\">threat spotlight<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/troldesh\/\" rel=\"tag\">Troldesh<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/spotlight-troldesh-ransomware-aka-shade\/' title='Spotlight on Troldesh ransomware, aka 'Shade''>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/spotlight-troldesh-ransomware-aka-shade\/\">Spotlight on Troldesh ransomware, aka &#8216;Shade&#8217;<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10491,11259,3764,21158,3765,21159,21160,10494,21161,11341],"class_list":["post-14771","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-decryptor","tag-decryptors","tag-malware","tag-ransom-troldesh","tag-ransomware","tag-ransomware-remediation","tag-shade","tag-threat-analysis","tag-threat-spotlight","tag-troldesh"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14771","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14771"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14771\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14771"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}