Rapid Note V2 0

broken image


Jan 22, 2006 The Microsoft.NET Framework version 2.0 (x64) redistributable package installs the.NET Framework runtime and associated files required to run 64-bit applications developed to target the.NET Framework v2.0.

Precisely two months on the day since the release of its first version, the group behind the Rapid ransomware strain has released v2.0 today.

  • Import newer ViGEm.NET libraries for ViGEmBus 1.17.333.0 extended support; Allow passthru of Touchpad and Gyro to output virtual DS4. Requires ViGEmBus 1.17.333.0 and Windows 10; Put note about DS4Windows assembly architecture in Log. Needed to diagnose Exclusive mode problems. No longer reset X360 report data each gamepad poll.
  • The most important part of listing your API on RapidAPI is making sure developers can run it from the comfort of their browser; in doing so, you enable them to quickly abstract what endpoints to query and see the resulting queries displayed with only a few clicks. Documenting every aspect of your AP.

This new version has not suffered any major modifications compared to its previous release, but small changes have occurred.

The biggest is the addition of a code routine that detects the user's PC locale settings before launching encryption operations. If the user has locale settings set to Russian, the ransomware will not encrypt files.

Second, the ransomware now adds a randomly generated string as the file extension at the end of encrypted files. Version 1.0 used '.rapid', which allowed victims to easily detect what ransomware strain had infected their PCs.

But users now can detect they've been infected with Rapid 2.0 because the ransom note says so right at the top. The ransom note also uses different wording, compared to v1.0, and a subsequent updated version that was deployed in fake IRS malspam campaign.

Rapid 2.0 still relies on asking victims to get in contact with the ransomware's operators via email. This version uses supp1decr@cock.li and supp2decr@cock.li as contact addresses.

First spotted by security researcher MalwareHunter, Rapid 2.0 seems to have been released into the wild by accident, as the ransomware's source code was not packed and included debug messages that helped researchers quickly analyze its source code. The AVCrypt ransomware, also spotted for the first time today, was also not packed, revealing its secrets to researchers in a similar manner.

Rapid

Bleeping Computer is not aware of any attempts to mass-distribute this threat at the time of writing, but the Rapid crew were quite successful at distributing v1.0, so they do have the channels in place to switch to mass-distributing v2.0 if they wish to.

IOCs:

Ransom note text:

Ransom note file name:

Email contacts:

Rapid Notes Pads

Sha-256:

11 Options · Game Version: v2.10-v2.72.0+ · Last Updated: 2019.11.26

Rapid Note V2 0 User

Options

Num 1 – Infinite Health
Num 2 – Infinite Ammo
Num 3 – No Reload
Num 4 – Super Accuracy
Num 5 – No Recoil
Num 6 – Rapid Fire
Num 7 – Jam Enemies Weapon
Num 8 – Super Speed
Num 9 – Slow Motion
Num 0 – One Hit Kill
Num . – Stealth Mode

Notes
  1. 'Infinite Ammo' takes effect when you reload.
  2. 'Stealth Mode': If you are already in battle before activating this option , you'll need to exit battle to have stealth effect. Note while in stealth mode, you may not be able to accept some challenges, disable this option when you want to do challenges.

Download

FileDate addedFile sizeDownloads
HITMAN.2.v2.10-v2.72.0.Plus.11.Trainer-FLiNG2019-11-26 00:54623 KB40266




broken image