"The developers/actors behind Anatova are, according our assessment, skilled malware authors," Mundo writes. "We draw this conclusion as each sample has its own unique key, as well as other functions... [that] we do not often see in ransomware families."Notably, the researchers observed that Anatova looks for a flag whose value can trigger the loading of two extra DLLs files. "This might indicate that Anatova is prepared to be modular or to be extended with more functions in the near future," the blog post states.Meanwhile, the ransomware protects itself from analysis using a series of defensive maneuvers. For example, it encrypts most of its strings, with multiple decryption keys embedded in the executable. Also, it checks the victim's active username against a blacklist that includes terms like "tester," "malware" and "analyst." If such words appear, the ransomware will not work.
To further frustrate security experts, the ransomware clean the computer’s memory of any key value data, to prevent the possibility of dumping this information from memory as a means of creating a decryption program.McAfee notes that the ransomware is programmed not to attack machines based in all CIS countries, Syria, Egypt, Morocco, Iraq and India. Such restrictions can sometimes, but not always offer attribution clues.The next step is to prepare a buffer of memory and with all of the info encrypted (Salsa20 key, Salsa20 IV, and private RSA key). It makes a big string in BASE64 using the function “CryptBinaryToStringA.” The ransomware will later clean the computer’s memory of the key, IV, and private RSA key values, to prevent anyone dumping this information from memory and creating a decrypter. Responding victims are then allowed to decrypt one .jpg file of maximum size 200KB free of charge, as proof that they the decrypted files can be retrieved.