Jump to content

Marcos

Administrators
  • Posts

    37,941
  • Joined

  • Last visited

  • Days Won

    1,504

Posts posted by Marcos

  1. 15 hours ago, itman said:

    Care to elaborate on this?

    It implies to me that the OP was being repeatedly infected and never reviewed his Eset detection log during that time period.

    Scratch that. Appears you are stating that Eset had a sig. for the ransomware that was at least a month old.

    image.png

    ECLS Command-line scanner, version 7.0.2097.0, (C) 1992-2018 ESET, spol. s r.o.
    Module scanner, version 19940 (20190830), build 42596

    Scan started at:   Wed Sep 11 12:46:06 2019
    name="975f6d0b2b10f2e77fc9e98adf12e4c40946398b", threat="a variant of Win32/Filecoder.NXE trojan", action=""

    Don't wonder about the difference in name; the Filecoder has been renamed just recently and it was given a more friendly name.
    Still between Aug 30 when a detection was added for that particular variant (not taking into account Ransomware shield and other proactive protection techniques) and Sept 10 when the ransomware was executed there was plenty of time.

    Checking the event logs revealed that update was failing with "unauthorized access" error (probably due to invalid license) since Aug 12 until Sept 10 and that appears to have been the main cause of the infection. The problem with license also caused LiveGrid not to work and Ransomware shield didn't work either because of missing data from LiveGrid.

    I'm still waiting for logs to find out if there was also an RDP attack at that time.

  2. No, it was disabled. ESET had recognized the ransomware for at least one month when it was run on your machine which would not have been possible with real-time protection enabled.

    Please provide the files and logs we requested from you at samples[at]eset.com and communicate with us primarily there please.

  3. A result of analysis was sent to your email address with a request for additional files and logs. Obviously the ransomware has been recognized by ESET for a month at least, maybe even longer with all the protection features taken into account.

    The logs revealed that real-time protection must have been disabled at the time when the ransomware was run. Further logs should show if an RDP attack has been performed recently.

    Last but not least, there's a good chance that decryption will be possible.

  4. Firstly, this forum is not meant to be a channel for disputing detections or blocks.

    Secondly, we're not going to play that game. There are numerous legitimate websites that got hacked and had a link to similar websites injected without the knowledge of the owner of the website and hidden by a malicious javascript.
    Also a link to it was added as a comment to blogs and articles that were not moderated and protected against spamming, e.g. like this one about mobile phones written in Czech with various English spam in comments:

    image.png

  5. Files were encrypted by Filecoder.Ouroboros. If you have an ESET license purchased, please collect logs with ESET Log Collector and email the generated archive along with the following stuff to samples[at]eset.com:

    - a pair of an encrypted an unencrypted file
    - the ransomware note with payment instructions
    - the ransomware itself

  6. We'll need additional logs. Please carry on as follows:

    • Disable Self-Defense
    • Restart the machine
    • Enable heap tracing for ekrn:
      wpr -HeapTracingConfig ekrn.exe enable
    • Restart the machine
    • Start tracing:
      wpr -start Heap -filemode
    • Wait until the issue is replicated, ekrn memory usage should get above 200MB
    • Stop tracing:
      wpr -stop heap_trace.etl

    Please provide the generated log heap_trace.etl and disable tracing as follows:

    • wpr -HeapTracingConfig ekrn.exe disable
    • Enable Self-Defense
    • Restart the machine
  7. Please read this before you post

    Do not report blocked websites
    After cleaning a website from malware and taking measures to prevent further re-infection, request a re-check as per the instructions in the FAQ. This forum does not serve as a channel for requesting website re-check or disputing blocks or detections.

    In your case, removing references to deloplen.com should sort it. Having said that, we'll draw this topic to a close.

     

  8. That's weird because egui_proxy is just a simple gui for basic interactions and operations accessible from the tray icon menu. For other operations it launches the main egui.exe. The only process that can affect other programs is ekrn.exe.

    It's possible that a complete memory dump from a manual crash when the issue occurs will be needed for analysis. Please raise a support ticket with your local customer care.

    As for protocol filtering,  you can find the setting here:

    image.png

×
×
  • Create New...