Threat Database Trojans Win32:Ransom-AOQ

Win32:Ransom-AOQ

By JubileeX in Trojans

Threat Scorecard

Popularity Rank: 19,132
Threat Level: 60 % (Medium)
Infected Computers: 8
First Seen: August 21, 2013
Last Seen: April 28, 2026
OS(es) Affected: Windows

Win32:Ransom-AOQ is a dangerous ransomware Trojan that encrypts your files and then charges you to decrypt them. The Win32:Ransom-AOQ Trojan may be used to steal private information from your computer that can then be used to steal your identity or carry out other types of online fraud. In the long run, this may be used to steal sensitive business-related data, banking credentials, or other important data that may allow criminals to impersonate you, steal your money or profit at your expense in other ways. Win32:Ransom-AOQ Is related to a fraudulent online service that offers to decrypt files on your computer. The service associated with Win32:Ransom-AOQ, named 'No Problem Bro' supposedly helps computer users recover passwords after having forgotten them. However, Win32:Ransom-AOQ's attack is actually much more dangerous than Win32:Ransom-AOQ seems.

Win32:Ransom-AOQ and the Misleading 'No Problem Bro'

'No Problem Bro' offers its decryption services in exchange for anonymous online payment methods such as WMZ or bitcoin. However, this service is actually used to distribute Win32:Ransom-AOQ. This is often distributed as a decoy PDF file that actually encloses an executable file. In the background, this malicious executable file installs malware on the victim's computer and carries out various harmful changes to the infected computer's settings. Once installed, Win32:Ransom-AOQ first ensures that Win32:Ransom-AOQ has not been installed on a virtual machine of on a computer used by PC security researchers to analyze malware. If Win32:Ransom-AOQ does, then the Win32:Ransom-AOQ infection shuts down and deletes itself. Win32:Ransom-AOQ also verifies the infected computer's IP address and attempts to connect to the Internet. Win32:Ransom-AOQ connects to the 'No Problem Bro' website and downloads a malicious RAR file that encrypts files on the victim's computer and deletes all detected back-up files. Win32:Ransom-AOQ also drops text files containing information relating to this bogus decryption service. Essentially, Win32:Ransom-AOQ blocks all access to the victim's files and then demands payment in order to restore them to normality.

Do not Fall for the Win32:Ransom-AOQ Scam

There's a way to restore the deleted files from your computer by using a recovery utility. It may also be attainable to bring them back if your traffic goes through a proxy server. To prevent these kinds of scams, ESG security researchers strongly advise computer users to back up all of their files. In case that the computer user has a suitable backup, dealing with this attack would entail the removal of the malware threat and then restoring all the compromised files from their backed up copies.

Analysis Report

General information

Family Name: Backdoor.Zegost.CB
Signature status: No Signature

Known Samples

MD5: 45dc749351fd65d71da89ca2ed2766cb
SHA1: e080faf81157b7f867cb56938c5e579c206af9b9
SHA256: 391109432BA2DF9F3EBC74E0144F42A490405F7C8ECB51DA01B4CE793BE72F25
File Size: 65.54 KB, 65536 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have security information
  • File has exports table
  • File is 32-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Company Name Sogou.com Inc.
File Description 搜狗拼音输入法 语言栏支持
File Version 5.0.0.3787
Internal Name SogouPY SogouTSF
Legal Copyright ? 2010 Sogou.com Inc. All rights reserved.
Original Filename SogouTSF.dll
Product Name 搜狗拼音输入法
Product Version 5.0.0.3787

File Traits

  • dll
  • Installer Manifest
  • x86

Block Information

Total Blocks: 78
Potentially Malicious Blocks: 42
Whitelisted Blocks: 36
Unknown Blocks: 0

Visual Map

x x x x 0 x x x 0 x x x x x x x x 0 x x x x x x x x x x x 1 x x x x x x x x x x x x x x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Zegost.AE
  • Zegost.CB

Files Modified

File Attributes
c:\net-temp.ini Generic Write
c:\windows\filename.jpg Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\windows\filename.jpg Generic Write,Read Attributes
c:\windows\filename.jpg Synchronize,Write Attributes

Registry Modifications

Key::Value Data API Name
HKLM\software\wow6432node\243930894\parameters::servicedll C:\WINDOWS\FileName.jpg RegNtPreCreateKey
HKLM\software\wow6432node\116109950::imgsvc Please Input Service Name RegNtPreCreateKey

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtQueryAttributesFile
Show More
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Anti Debug
  • NtQuerySystemInformation

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\e080faf81157b7f867cb56938c5e579c206af9b9_0000065536.,LiQMAxHB

Trending

Most Viewed

Loading...