StalinLocker Deletes Your Files Unless You Enter the Right Code

A new in-development screenlocker/wiper called StalinLocker, or StalinScreamer, is discovered, which gives you 10 minutes to enter a code or it will try to delete the contents of the drives on the computer.
While running, it will display screen that shows Stalin while playing the USSR anthem and displaying a countdown until files are deleted.
When executed, StalinLocker will perform the following actions:
-
Extract the "USSR_Anthem.mp3" file to the %UserProfile%\AppData\Local folder and play it. This anthem is the same one heard in this YouTube video, but of much worse quality.
-
It will copy itself to %UserProfile%\AppData\Local\stalin.exe and create an autorun called "Stalin" that starts the screenlocker/wiper when the user logs into the computer.
-
It will create %UserProfile%\AppData\Local\fl.dat and write the current amount of seconds left divided by 3. So each time you start the program, the countdown is significantly less.
-
Attempt to terminate processes other than Skype or Discord.
-
Terminate Explorer.exe and taskmgr.exe.
-
Tries to create a Scheduled Task called "Driver Update" to launch Stalin.exe. This part of the code is currently throwing errors.
-
StalinLocker will then display the above lock screen that contains a 10 minutes countdown until your files are deleted or you enter a code. This code is derived by subtracting the current date of when the program was executed by the date 1922.12.30. If the user enters the correct code, the wiper will exit and delete the autorun.
On the other hand, if the code is not entered by the time the countdown reaches zero, the screenlocker will attempt to delete all of the files on each drive letter found on the computer. This is done by going through all drive letters from A to Z and deleting any that are accessible as shown below.
This wiper is currently in development, but could easily be made into a workable state. Thankfully, most security vendors are detecting this either through definitions or heuristics, so make sure that you have an npav anti-virus program installed and updated to the latest definitions.
Comment(s)
Categories
- Other (42)
- Ransomware (142)
- Events and News (27)
- Features (45)
- Security (466)
- Tips (79)
- Google (23)
- Achievements (11)
- Products (34)
- Activation (7)
- Dealers (1)
- Bank Phishing (44)
- Malware Alerts (212)
- Cyber Attack (259)
- Data Backup (11)
- Data Breach (97)
- Phishing (154)
- Securty Tips (1)
- Browser Hijack (18)
- Adware (15)
- Email And Password (68)
- Android Security (70)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (8)
- vulnerability (56)
- Hacker (31)
- Spyware (9)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (4)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (7)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (9)
- IoT Security (1)
- Deals and Offers (2)
- Cloud Security (11)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (2)
- DMart (1)
- Payment Risk (4)
- Occasion (3)
- firewall (2)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (10)
- Impersonation phishing (1)
- DDoS (5)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)
Recent Posts
Archive
Tags
cyber attack
phishing
data breach
phishing attacks
cyber threats
ransomware
phishing attack
ransomeware
malware
android malware
cyber security
data theft
phishingattack
cyberthreats
financial security
data stealing
cybercrime
network security
ddos attack
data security
critical vulnerability
cyber fraud
trojan
net protector total security
data protection
cert-in
financial fraud
phishing email
microsoft
lockbit
cybercriminals
cyber crime
ddos
phishing scam
cyber threat
india
twitter
android
ransomware attacks
cryptojacking
winrar
malicious apps
pakistan-backed hacker
android apps
email phishing
play store
server security
databreach
clop
ransomware attack