February 3, 2018 — Acronis Security Team
Backup and recoveryCybersecurityEndpoint protectionInnovations and technologiesIT channel insightsExecutive vision

SpriteCoin is a New Ransomware, Not Cryptocurrency

Acronis
Cyber Protect

The new SpriteCoin (also known as MoneroPay) ransomware leverages a novel social engineering technique – posing as a new cryptocurrency called SpriteCoin – and combines a cryptolocker and password stealer in a single application.

The link to the SpriteCoin homepage was published on the bitcointalk.org forum and spread among users interested in new cryptocurrencies. The topic was removed when its malicious nature was revealed.

Acronis
SpriteCoin tweet
Acronis
SpriteCoin Introduction

Once a user downloads and runs the rouge cryptocurrency application, the cryptolocker encrypts files and demands a ransom via the Monero cryptocurrency to decrypt user’s data.

Installation

The downloaded SpriteCoin package includes:

The ‘spritecoinwallet.exe’ application shows the windows with fake wallet operations while connecting to the C&C server.

Acronis
SpriteCoin Install 1
Acronis
SpriteCoin Install 2
Acronis
SpriteCoin Install 3

Once the connection has been established, it starts the cryptolocker ‘spritecoind.exe’.

The cryptolocker ‘spritecoind.exe’ is 1,228,800 bytes in size and UPX packed.

Once executed, the SpriteCoin adds the reference to the copy of ‘spritecoind.exe’ to the Autorun key:

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]

‘MoneroPay’ = ‘C:\Users\<USER>\AppData\Roaming\MoneroPayAgent.exe’

Acronis
SpriteCoin Install 4
Acronis
SpriteCoin Install 5

Communication with C&C

The cryptolocker connects to the C&C server in the Tor network using the web proxy:

http://jmqapf3nflatei35.onion.link/paid?id=<PAYMENT_ID>

Acronis
SpriteCoin CC 1
Acronis
SpriteCoin CC 2

‘Payment ID’ is the first eight bytes of the hash of the computer name and C&C server address. It is also the first eight bytes of the file encryption key.

The MoneroPay strain starts two threads to upload and download information to and from the C&C server.

Acronis
SpriteCoin CC 3
  • The ‘download’ thread implements downloading and execution of a new piece of malware from the C&C server by the following link:

                                http://jmqapf3nflatei35.onion.link/static/win

Acronis
SpriteCoin CC 4
  • The ‘upload’ thread collects information about an infected computer and dumps logins and passwords stored in Mozilla Firefox and Chrome browsers.
Acronis
SpriteCoin CC 5

The collected data is regularly uploaded to the C&C server using the following link and code:

http://jmqapf3nflatei35.onion.link/log?id=<PAYMENT_ID>

Acronis
SpriteCoin CC 6

Key generation

The key is 128 bits in size and generated based on the following strings:

  • A victim’s computer name (%COMPUTERNAME%)
  • A user name (%USERNAME%)
  • A user profile strings (%USERPROFILE%)
  • C&C address: jmqapf3nflatei35.onion
Acronis
SpriteCoin Key Generation

File encryption

The MoneroPay ransomware encrypts the files that contain the strings below in the file name, adding ‘.encrypted’ to the original file name.

c txt py doc rtf cpp cc go tcl html ppt docx xls xlsx pptx key pem psd mkv mp4 ogv zip jpg jpeg work pyw h hpp cgi pl rar lua img iso webm jar java class one htm js css vbs 7z eps psf png apk ps1 gz wallet.dat id_rsa

For example:

Acronis
SpriteCoin Encrypt 1

For debugging purposes, the author used the %TESTME% environment variable disabled in the release version that turns off file encryption.

Acronis
SpriteCoin Encrypt 2

The MoneroPay uses the Salsa20 algorithm for files encryption. The same key is used for all files encrypted from a hijacked computer.

File encryption:

Acronis
SpriteCoin Encrypt 3

The Salsa20 call:

Acronis
SpriteCoin Encrypt 4

Ransom note

Once the MoneroPay ransomware successfully registers a new victim at C&C (jmqapf3nflatei35.onion), it shows the ransom note in the specially created window titled ‘MoneroPay’ that emulates the Internet browser. The ransom payment is 0.3 Monero (less than $100 by current rate).

Acronis
SpriteCoin Ransom 1
Acronis
SpriteCoin Ransom 2
Acronis
SpriteCoin Ransom 3
Acronis
SpriteCoin Ransom 4

 

Stealing login data from Chrome and Mozilla Firefox browsers

The MoneroPay tries to retrieve login data stored in Mozilla Firefox and Chrome browsers, which it later sends to the C&C server using the code similar to https://github.com/wekillpeople/browser-dumpwd.

Acronis
SpriteCoin password stealer 1
Acronis
SpriteCoin password stealer 2

Conclusion

The decryption of files can be challenging without assistance of cyber security experts. Moreover, as stated by Fortinet, a victim can get one more malware under the guise of a decryptor in case of paying a ransom. It is recommended not to pay the ransom and restore the files from backups.

You can use Acronis True Image 2018 and our other products with Acronis Active Protection enabled to detect and stop MoneroPay (SpriteCoin) ransomware. You’ll also be able to restore any affected files in matter of seconds.

Acronis
SpriteCoin Detected 1
Acronis
SpriteCoin Detected 2

More from Acronis