Corona-lock ransomware


Corona-lock is yet another ransomware campaign using the disease as a lure 

Corona-lock ransomware

Corona-lock ransomware

Corona-lock ransomware is a cryptovirus that misuses the COVID-19 pandemic to trick people into opening malicious ransomware payload and lock personal people’s files. It has been found spreading via spam emails[1] called “Corona virus cure for China, Italy.” The email contains a CORONA TREATMENT.doc file, which is infected with the malicious ransomware payload. 

Upon the infiltration, the Corona-lock virus roots into the OS by changing Windows Registry entries and injecting malicious executables among boot up files. After that, the system is forced to restart leading to a complete lock of personal files. All non-system data gets encrypted by the .corona-lock! file extension. Usually, victims cannot fully understand what happened until the README_LOCK.txt note gets placed on the desktop and other folders. 

The Corona-lock ransomware is also known as the CovidWorldCry virus. Both variants are not decryptable. At least not yet. The criminals behind this threat programmed this threat to run a combination of ChaCha and AES encryption algorithm, which is a tough nut to crack for cybersecurity experts.

Name of the virus Corona-lock
Also known as CovidWorldCry ransomware, CoronaLock ransomware, Corona-Lock virus, BigLock ransomware
Ransom note README_LOCK.txt or !!!READ_ME!!!.TXT
Encryption model ChaCha + AES
Contacts  Criminals provide the [email protected]  email 
Payload Usually, people are represented with malicious spam emails that contain CORONA TREATMENT.doc file with a hidden 2020-05-22_17-36-19.exe payload
File marker  The ransomware locks files using a strong encryption model and appends .corona-lock file extension. However, people can also be attacked by other Corona-lock ransomware variants exhibiting .biglock file marker
Goals The ransomware is a crypt-extortionists, meaning that it’s sole purpose is to earn the money. For that, it locks files and demands a ransom payment
Distribution The virus has been found spreading via Coronavirus-related spam email messages in particular. However, experts warn that the payload can also be launched via Rig exploit kit, rogue software installers, and cracks
Removal If ransomware infected the machine, the only way to delete it is to restart the machine into Safe Mode with Networking (a guide below explains how to to that) and then run a full system scan with a professional AV engine.
Data recovery There’s no official Corona-lock decryptor. However, it’s advisable to backup encrypted files and send the samples to cybersecurity experts for analysis. Besides, you can try decrypting the data using alternative methods, such as Volume Shadow Copies
Windows recovery Upon ransomware elimination, recover the system using Reimage Reimage Cleaner Intego repair tool

The Corona-lock virus is ransomware without a family. It’s a stand-alone threat, which only can be attributed to the COVID-19 campaign viruses[2] alongside Cov19Coronavirus ransomware, Dharma, Maze, REvil, CovidLock, and many others. Although it’s one of the ransomware-type viruses that take advantage of the Rig exploit kits, the most victims are caught on the hook by reliable-looking spam emails that contain the CORONA TREATMENT.doc file. 

This CORONA TREATMENT.doc spam attachment disguises the malicious 2020-05-22_17-36-19.exe file, which is a unique Corona-lock ransomware payload. Once launched, the creates the following entries:

  • %APPDATA%\key.file
  • %HOMEPATH%\desktop\readme_lock.txt
  • D:\install.log.corona-lock
  • :\000814251_video_01.avi.corona-lock
  • :\delete.avi.corona-lock
  • :\join.avi.corona-lock
  • :\archer.avi.corona-lock
  • :\dashborder_96.bmp.corona-lock
  • :\dial.bmp.corona-lock
  • :\dialmap.bmp.corona-lock

Moreover, the Corona-lock virus creates malicious processes under names %WINDIR%\syswow64\vssadmin.exe, \conhost.exe, \dllhost.exe, \vssvc.exe, and %WINDIR%\syswow64\wbem\wmic.exe, which lock AV engines and increase ransomware persistence.

According to the VirusTotal analysis[3], the Corona-lock file virus executable can be detected and quarantined by 61 security tools out of 71. The most common detections are the following:

  • Ransom:Win32/Coronalock.DEA!MTB (Windows Defender)
  • Win32:Malware-gen (AVG)
  • Trojan.GenericKDZ.67331 (BitDefender)
  • Trojan.TR/AD.RansomHeur.eku (F-Secure)
  • Trojan.Win32.DelShad.dfc (Kaspersky)
  • Win32:Malware-gen (Avast)
  • A Variant Of Win32/Kryptik.HDOJ (ESET-NOD32), etc. 

Corona-lock detection
The corona-lock virus can currently be detected by most of the AV security tools

Corona-lock detection
The corona-lock virus can currently be detected by most of the AV security tools

All activities initiated by Corona-lock ransomware are extremely malicious. It roots into the OS, compromises %AppData%, %Temp%, and entries in other directories, eliminates Shadow Volume copies, terminates core processes, and starts alternative ones, etc. All performance leads to one goal – complete restriction from personal files. 

Once the files are encoded by .corona-lock file extension, the ransomware generates a note README_LOCK.txt or !!!READ_ME!!!.TXT, which contains a unique ID number, which is bound to a personal file decryption key stored by criminals. to get the key, victims have to write an email to [email protected] and pay the criminals a ransom payment. 

YOUR FILES WERE ENCRYPTED
AND MARKED BY EXTENSION .corona-lock


DON’T WORRY! YOUR FILES ARE SAFE! ONLY MODIFIED :: ChaCha + AES
WE STRONGLY RECOMMEND you NOT to use any Decryption Tools.
These tools can damage your data, making recover IMPOSSIBLE.
Also we recommend you not to contact data recovery companies.
They will just contact us, buy the key and sell it to you at a higher price.
If you want to decrypt your files, you have to get RSA private key.

To get RSA private key you have to contact us via email to:
—————————->> [email protected] <<
and send us your id: >> 2374052812 <<

HOW to understand that we are NOT scammers?
You can ask SUPPORT for the TEST-decryption for ONE file!

LIST OF ENCRYPTED FILES

If you are currently seeing such a message, we strongly recommend you to backup the encrypted files to alternative storage (hard drive, USB flash drive, cloud storage, etc.) and then restart the machine into Safe Mode with Networking. The safe mode disables malicious processes and allows launching the security software. To remove Corona-lock ransomware virus from the system thoroughly, we recommend using Malwarebytes, SpyHunter 5Combo Cleaner, or similar security software. 

Upon successful Corona-lock removal, it’s must to recover the Windows directories that the virus might have compromised. Distorted Windows Registries, disabled processes, and written/deleted files, modified attributes, and other performances can trigger Windows malfunctions and crashes. For this purpose, you can take advantage of the Reimage Reimage Cleaner Intego tool. 

.corona-lock file recovery options

Do not get confused by false claims on some unreliable sources that the removal of Coronal-lock ransomware using an anti-virus tool will recover personal files. Ransomware removal means that the AV engine quarantines the malicious ransomware processes and files. 

The data that is encrypted using the ChaCha + AES encryption algorithm and exhibits the .corona-lock file extension will not be encrypted upon virus removal. Data encryption requires a specific decryption software that reverts the changes initiated by the cipher. 

Corona-lock ransomware virus
Corona-lock virus appends .corona-lock file extension to encrypted files

Corona-lock ransomware virus
Corona-lock virus appends .corona-lock file extension to encrypted files

Criminals behind the Corona-lock virus offer their victims to buy the decryptor for a considerable amount of money and we are sure that a part of victims agree with the payment as they crave for unlocking important data. However, we do not recommend supporting criminals in any way. 

Instead of that, experts from NoVirus.uk[4] advisable to remove Corona-lock ransomware and then decrypt files using alternative methods. First of all, you can contact ransomware researchers and provide them with ransomware examples for testing. It’s very likely that sooner or later they can develop a free decryptor. 

While the Corona-lock decryptor is under development, you can try decrypting the files using third-party data recovery programs, System Restore, or Shadow Volume copies. You can find a comprehensive guide at the end of this article. 

.biglock file extension is related to Corona-lock ransomware 

Corona-lock ransomware is also known as the CovidWorldCry virus. Both variants are equally dangerous. However, depending on the variant that infiltrated the machine, the diverse extension can be appended to personal files. 

In many cases, people find their files encrypted by the .biglock file extension virus. Files that contain such a suffix cannot be opened, moved, deleted, or renamed. Unfortunately, automatically renamed personal files means only one thing – ransomware attack. 

Beware that criminals seek to gain as much money as possible. Corona-lock virus managers may demand you to pay a redemption that varies from $480 to $1500 depending on the amount of encrypted data. 

As we have already pointed out, this ransomware cannot be decrypted for free. Thus, you can either pay the criminals or get rid of Corona-lock virus from your machine and try data recovery methods provided by our security experts. 

Coronavirus-themed email spam keeps flooding inboxes

During the worldwide Coronavirus pandemic, criminals launched thousands of disease-related spam campaigns, malware, and viruses. Unfortunately, millions of people were caught on the hook of intriguing news, disease prevention methods, charities, and other rogue email messages that were used by scammers to infect PCs with ransomware. 

It’s very important to raise people’s consciousness, so we keep repeating that official and reliable organizations are sharing the information on the official website or other reliable sources. They are not sending emails with questionable attachments to random PC users unless they are registered or made their e-mails public. 

However, the malspam campaign is not the only way to spread malware and ransomware viruses. Criminals can quite easily exploit software vulnerabilities, known as flaws. Hackers take advantage of the exploit kits to gain access to people’s machines. This particular ransomware is known for exploiting Rig exploit kit, which allows hackers to inject the malicious payload to the targeted machines remotely. Therefore, it’s crucial to update outdated software and patch reported vulnerabilities without a delay. 

Corona-lock spam
Corona-lock virus managers are exploiting spam emails and Rig exploit kits to infiltrate machines

Corona-lock spam
Corona-lock virus managers are exploiting spam emails and Rig exploit kits to infiltrate machines

Therefore, people should be extremely careful with suspicious email attachments, avoid downloading pirated software, cracking software, visiting x-rated websites, or clicking on doubtful ads. Instead of that, take advantage of a reputable anti-virus suite, which features real-time protection and other additional security measures. 

Corona-lock removal guide: learn how to eliminate the entire ransomware package thoroughly

Usually, people attempt to remove Corona-lock ransomware and similar cyber-infections by simply launching the AV tool in a regular Windows mode. Unfortunately, such an attempt is usually unsuccessful because ransomware runs malicious processes that block security software. 

If you are currently solving such a situation, you should perform Corona-lock removal while the machine is restarted into Safe Mode with Networking. You can find a full guide explaining how to do that down below. 

Besides, it’s very important to select a professional security software to elimination to Corona-lock virus. Ransomware, in general, is an intricate piece of software, which may remain in the disguise of Windows system files and re-attack the machine upon elimination if a single malicious entry is left intact. Our recommended programs are SpyHunter 5Combo Cleaner and Malwarebytes, but if you have another preferable security tool, you are free to use it, except make sure it’s fully up-to-date. 

Reimage Intego has a free limited scanner. Reimage Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.

This entry was posted on 2020-06-09 at 03:17 and is filed under Ransomware, Viruses.