{"id":13138,"date":"2016-10-03T10:10:56","date_gmt":"2016-10-03T14:10:56","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=13138"},"modified":"2019-11-15T06:52:58","modified_gmt":"2019-11-15T11:52:58","slug":"polyglot-decryptor","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/polyglot-decryptor\/13138\/","title":{"rendered":"MarsJoke: the cryptor and the cure"},"content":{"rendered":"<p>Every day, new versions and variations of ransomware pop up. Malware creators are still sure that ransomware is their ticket to easy street, despite the fact that law enforcement agencies are paying more and more attention to the problem.<\/p>\n<p>In fact, so many different versions are out there, ransomware creators have started to repeat themselves or copy the work of others. For example, the recently discovered <a href=\"https:\/\/securelist.com\/blog\/research\/76182\/polyglot-the-fake-ctb-locker\/\" target=\"_blank\" rel=\"noopener noreferrer\">Trojan-cryptor Polyglot<\/a>, aka MarsJoke, is a knockoff of the infamous (and rather nasty) <a href=\"https:\/\/www.kaspersky.com\/blog\/new-version-ctb-locker\/7310\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">CTB-Locker ransomware<\/a>.<\/p>\n<p>You can see traces of CTB-Locker all over Polyglot. Its interface is absurdly reminiscent of the older Trojan. It changes victims\u2019 desktop wallpaper the same way and, just like CTB-Locker, it lets victims decrypt five files free as proof that they can be decrypted.<\/p>\n<p>Polyglot\u2019s instructions to victims are also identical to those of CTB-Locker \u2014 the text looks to have been copied and pasted. Even the \u201cRequest failed\u201d window that pops up in case there is no Internet connection looks the same.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/10\/06021521\/polyglot-comparison-screen.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-13139\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/10\/06021521\/polyglot-comparison-screen.png\" alt=\"MarsJoke: the cryptor and the cure\" width=\"1571\" height=\"515\"><\/a><\/p>\n<p>The encryption algorithms Polyglot uses are also the same \u2014 and they are rather strong.<\/p>\n<p>Polyglot is delivered mostly through spam \u2014 the letters contain malicious links allegedly leading to some important documents. Of course, there are no documents \u2014 just an archive with a malicious executable file. Once installed, Polyglot connects to its command-and-control sever to send information about the infected PC and handle the ransom. In our case, it demanded 0.7 bitcoins, which is about $320.<\/p>\n<p>Perhaps the only visual discrepancy between CTB-Locker and its new clone is that MarsJoke\/Polyglot leaves the encrypted files with their original extensions, whereas CTB-Locker changed the extension \u2014 usually to .ctbl or .ctb2.<\/p>\n<p>Despite the apparent similarities between Polyglot and CTB-Locker, they are two completely different malware species. They share almost no code. Our experts think that by mimicking CTB-Locker\u2019s looks, Polyglot\u2019s creators were trying to put researchers on the wrong track.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/10\/06021523\/polyglot-comparison-screen2.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-13140\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/10\/06021523\/polyglot-comparison-screen2.png\" alt=\"MarsJoke: the cryptor and the cure\" width=\"1572\" height=\"514\"><\/a><\/p>\n<div class=\"pullquote\">Fortunately, Polyglot\u2019s creator made a mistake with the key generator, which made it possible for Kaspersky Lab\u2019s researchers to come up with a free decryptor<\/div>\n<p>As you may know, there is no known way to decrypt files encrypted by CTB-Locker without paying the ransom. But again, Polyglot and CTB-Locker are not the same under the hood. And fortunately, Polyglot\u2019s creator made a mistake with the key generator, and that made it possible for Kaspersky Lab\u2019s researchers to come up with a cure \u2014 a free utility that can decrypt all of the damaged files.<\/p>\n<p>To decrypt the files encrypted by Polyglot\/MarsJoke, download and install the free RannohDecryptor utility (version 1.9.3.0 or newer) from <a href=\"http:\/\/noransom.kaspersky.com\" target=\"_blank\" rel=\"noopener noreferrer\">noransom.kaspersky.com<\/a>. It will restore your files.<\/p>\n<p>Truth be told, we got lucky with Polyglot\/MarsJoke. Malware creators are constantly adapting and improving their creations. For example, after we solved <a href=\"https:\/\/www.kaspersky.com\/blog\/cryptxxx-ransomware\/11939\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">CryptXXX<\/a> three times, its creator finally tuned the encryption algorithm such that our utilities could not handle it. Maybe Polyglot\u2019s creator will manage the same feat. Bottom line: You can\u2019t rely on a decryption utility being available for any ransomware you might encounter.<\/p>\n<p>The best way to stay safe from ransomware is to catch it before it starts doing anything. And that is what good antivirus solutions \u2014 like <a href=\"https:\/\/store.kaspersky.com\/store\/kaspersk\/en_IE\/buy\/productID.320853100\/quantity.1\/Currency.USD?cid=gl_socmed_pro_ona_smm__onl_b2c_kasperskydaily_lnk____kismd___&amp;affiliate=gl_socmed_pro_ona_smm__onl_b2c_kasperskydaily_lnk____kismd___\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Kaspersky Internet Security<\/a> \u2014 do.<\/p>\n<p>To be on the safe side, we also recommend that you back up your data frequently and avoid opening suspicious attachments or clicking on suspicious links.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Polyglot, aka MarsJoke, had aspirations. It was trying to be the next CTB-Locker \u2014 but we developed a cure.<\/p>\n","protected":false},"author":696,"featured_media":13141,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2683],"tags":[1680,1105,1733,352,1834,420,723,1835],"class_list":{"0":"post-13138","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-cryptors","10":"tag-ctb-locker","11":"tag-decryptors","12":"tag-kaspersky-lab","13":"tag-marsjoke","14":"tag-ransomware","15":"tag-trojans","16":"tag-zipcryptor"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/polyglot-decryptor\/13138\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/polyglot-decryptor\/7736\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/polyglot-decryptor\/7743\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/polyglot-decryptor\/7790\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/polyglot-decryptor\/9217\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/polyglot-decryptor\/9075\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/polyglot-decryptor\/13245\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/polyglot-decryptor\/2479\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/polyglot-decryptor\/6119\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/polyglot-decryptor\/6607\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/polyglot-decryptor\/5468\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/polyglot-decryptor\/8841\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/polyglot-decryptor\/12751\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/polyglot-decryptor\/13245\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/polyglot-decryptor\/13138\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/polyglot-decryptor\/13138\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/ransomware\/","name":"Ransomware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13138","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/696"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=13138"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13138\/revisions"}],"predecessor-version":[{"id":30136,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13138\/revisions\/30136"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/13141"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=13138"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=13138"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=13138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}