

You can send us a 1 encrypted file for decryption.įeel free to email us with your country and computer name and username of the infected system. Price depends on how important your files and network is.it could be 0.5 bitcoin to 25 bitcoin. We will give instructions where and how you buy bitcoin in your country. We accept just BITCOIN if you dont know what it is just google it. You can email us to and your Email to both email addresses PLS
#Teamviewer extension how to#
If your files is important just email us to discuss the price and how to decrypt your files. If your files not important for you just reinstall your system. There is no way to decrypt your files without the key. The ransom note for this ransomware states:Īll of your files were protected by a strong encryption. %Desktop%\Encrypted_Files.Notepad file that contains a list of encrypted files.

%Desktop%\surprise.bat, which executes the vssadmin.exe Delete Shadows /All /Quiet to remove Shadow Volume Copies.%Desktop%\DECRYPTION_HOWTO.Notepad ransom note.When the ransomware finishes encrypting the computer, it will create 3 files on the desktop. When encrypting files it will skip any files that contain the $ symbol or contain the c:\windows and c:\program strings in the filename. When it finds a matching file, it will encrypt it with the AES encryption key and append the. The ransomware will now begin to scan the all fixed disks on the computer for files that contain a particular file extension. This key will then be used to encrypt a generated AES encryption key, which is then sent back to the Command & Control server. Once launched, the ransomware will attempt to connect to its Command & Control server where it will send the victim's computer name and username and retrieve a public encryption key. The Surprise Ransomware Encryption ProcessĪs already explained, this ransomware is distributed via TeamViewer connections to the victim's computer, which the ransomware developer will use to upload a file called Surprise.exe to the victim's desktop. Once this file is launched, it will decrypt a encrypted BASE64 encoded executable into memory and launch this executable from there. So far this has not helped, as the malicious behavior will still be detected when the ransomware is launched from memory.
#Teamviewer extension code#
Thankfully, this is not the case.īelow is some partial source code showing how they are using this technique: By trying to offload the encryption functions, typically targeted by behavior analysis, into an file executed from memory, they are hoping it would not be detected. Behavior detection is becoming the best way to detect and stop ransomware as signature detections have become easily bypassed. This method is being used to not only try to bypass AV signature definitions, but also behavior detection.

At runtime this string is decrypted, loaded into memory, and then executed directly from there. Instead it contained another executable that transformed into an encrypted BASE64 encoded string. Executing from memory to bypass behavior detectionĪnother interesting characteristic that we saw in the Surprise Ransomware is that the executable itself does not contain any of the encryption functions or other behavior associated with ransomware programs. On checking various databases, I did find that more than half of the victims were listed on the site.Īt this point, the Surprise ransomware appeared to have gone dark, so we are unable to investigate this further. TeamViewer felt that some of these accounts may have been included in account dumps, where their credentials were retrieved by the ransomware devs. I was also told, that it appears that the connections made by the ransomware developer were using the credentials of the victim. Once it was discovered that TeamViewer was involved, I immediately reached out to TeamViewer support to try and get someone who was part of their security team to either call me or email me so we could discuss this attack.Talking to one of the security team members, I was told that the associated IDs have already been disabled so that they could no longer be used on TeamViewer.

As more logs were posted, it could be seen that there were two TeamViewer IDs that were used by the attackers to upload the ransomware to the computer and execute it.
