A new variant of ransomware from the CryptoMix family is active in the wild. As discovered by researchers, the new Clop ransomware variant now kills 663 Windows processes before encrypting the data.
In early 2019, researchers from the MalwareHunterTeam caught a new CryptoMix ransomware variant that targeted networks. The ransomware was dubbed as ‘Clop’ ransomware since it added a .CLOP extension to the encrypted files.
According to the researcher Vitali Kremez the Clop ransomware first terminated multiple Windows processes in an attempt to disable any antivirus present on the system. It would then encrypt the data files on the target device.
Bleeping Computer also revealed that the malware, which exhibited digitally signed executables to appear legit, also created a batch file clearnetworkdns_11-22-33.bat to disable Windows startup repair and remove shadow volume copies.
Besides restricting the victim from all possible options to recover lost data, the ransom note also depicted that Clop ransomware broadly targeted the entire network instead of individual PCs.
Recently, Vitalin Kremez reverse-engineered a new Clop variant discovered by MalwareHunterTeam in December 2019. As revealed, the new variant now kills 663 Windows processes for a more robust infection. The terminated processes include various Windows 10 apps, debuggers, terminal programs, text editors, programming languages and programming IDE software.
As reported some of the ‘interesting’ processes killed by the new Clop include Microsoft Office apps, Android Debug Bridge, Everything, Tomcat, SnagIt, Windows Calculator, and the Your Phone app too. Kremez has listed the full list of all the processes terminated by Clop in a GitHub repo.