Showing posts with label Brazil. Show all posts
Showing posts with label Brazil. Show all posts

Thursday, 31 January 2019

V/A - Cultural Compost Pit! 1985

Pretty awesome tape from Mothra Productions with thirty five bands from around the world with huge tophits. Excellent selection I can only say!, a brilliant Hardcore Punk onslaught pulled by rare 7Inches and other secret sources with nice little info-sheet makes this an excellent stew with hot spices and bite-sized chunks, add a slice of rye bread and beer and it's done... but beware! breaks through well, so don't forget toilet paper.

1.Violacion - KANGRENA
2.Funk Is Dead - HEIMAT LOS
3.Dreamworld - PÖPEL MÖBEL
4.Poison Food - BLACK VAMPIRE
5.Hočem Stran - III KATEGORIJA
6.Medalje Eller Dom - BANNLYST
7.Fight For Your Freedom - ABADDON
8.Alibi - NEGAZIONE
9.Antisexism - NO LIP
10.Dueling Banjos - F
11.Gerechtigheid? - LAITZ
12.Le Râleur - KROMOZOM 4
13.Bock Auf.... - DIE MÄNNER
14.Slere Bomber, Mere Magt - ENOLA GAY
15.No Friends - SOLUCION MORTAL
16.Air That We Breathe - DEATH SENTENCE
17.Isto E Olho Seco - OLHO SECO
18.Mädchen Mit Den Roten Haar'n - THE IDIOTS
19.La Valse - SHERWOOD
20.Dom Styr Våra Liv - MOB 47
21.Pogo - SCHLIESSMUSKEL
22.Louder - ANGOR WAT
23.Psychose Komplex - INDIREKT
24.Nation On Fire - CCM
25.Lies - PSYCHO
26.Vendeurs De Mort - FINAL BLAST
27.Nichts Zu Tun - HOSTAGES OF AYATOLLAH
28.Glutton For Punishment - CHRONIC SUBMISSION
29.Fuego En La Moncloa - ANTI-DOGMATIKSS
30.It's Not What It Seems To Be (Remix) - LÄRM
31.Torture - RAPT
32.Mikä On Totuus - MASSACRE
33.Straßenfest - RIM SHOUT
34.Eres Una Pose - GUERRILLA URBANA
35.Declino - DECLINO


Wednesday, 16 January 2019

RESTOS DE NADA - s/t LP 1987

Excellent debut of Brazilian punk rock band Restos De Nada, originally released in 1987 and reissued in 2002 by the same label Devil Records. Some of the songs were written in the late 70's (except "Direito Á Preguiça", which was written 1982), the instrumental largely composed by guitarist Douglas Viscaino, while the album cover was designed by the members themselves, Douglas and Ariel - the latter being the lead singer of the band on the album. The last track, this is a live recording of the band of 1979, placed as a bonus track. It is considered by many the first band of Brazilian punk (!). The band was formed by important leaders of the punk movement in Brazil, such as Clemente (Condutores De Cadáver and Inocents) & Ariel (from the first phase of the Inocents later Invasores De Cérebro). Unfortunately, I sold the record so forgive the flimsy scans.


Tuesday, 23 October 2018

D.F.C. - Igreja Quadragular Do Triâgulo Redondo 1996

Brilliant Hardcore album by D.F.C (Distrito Federal Caos), a combo from Brazil and this is their second release via Sonya Music and they active since 1993 and by 2014 ten albums are released. What can I tell you; an absolute firework of twenty songs in just under twenty minutes. The band is completely unknown to me but celebrated with energetic power and they can really compete with my eighties heroesEnjoy them and preferably very loud!

- Great Thx to Fredrik -


Sunday, 23 April 2017

Ransomware, fala sério!


Recently, a user contacted me in regards to what looks like a new, Brazilian ransomware. In this blog post, we're taking a quick look at the ransom and how to unlock or decrypt your files.

TL;DR: to unlock your files, you can use the key or password: 123
Para desbloquear seus arquivos, você pode usar a chave ou a senha: 123

The title of this blog loosely translates to: ransomware, no way! (excuse my Portuguese)

The ransomware appears to call itself 'Sem Solução'; which translates to 'Hopeless' or 'No Solution'. I propose we call it 'Hopeless ransomware':


Figure 1 - 'Seus arquivos foram criptografados'

Sua IDNão a formas de recuperar sem comprar a senha, ser tenta eu apago tudo!O método de pagamento é via Bitcoins.  O preço é: 600,00 REAIS =  Bitcoins
Não tem Bitcoins?, pesquise no google e aprenda comprar ou clique em Compra Bitcoinsenvie os bitcoins para: 1LULpQbdvoAWqKzhe8fuMiPQ8iGdW36pk1Para receber a senha, voce precisa criar uma e-mail em https://mail.protonmail.comE enviar SUA ID para 785910@protonmail.com em 24h ou mais voce receberá a sua senha!, Obrigado..

Translated:

Your IDNot the ways to recover without buying the password, be try I delete everything!The method of payment is via Bitcoins. The price is: 600,00 REAIS = Bitcoins
Do not have Bitcoins ?, search google and learn how to buy or click Buy BitcoinsSend the bitcoins to: 1LULpQbdvoAWqKzhe8fuMiPQ8iGdW36pk1To receive the password, you need to create an email at https://mail.protonmail.comAnd send YOUR ID to 785910@protonmail.com in 24h or more you will receive your password !, Thank you ..

The price is 600 REAIS (Brazilian Real), which currently amounts to 0.15 BTC.
(176 EUR | 155 GBP | 199 USD)

Interestingly enough, the ransomware has a built-in function to detect whether or not your machine belongs to a domain, and if so, will increase the amount of ransom to be paid to a whopping 1000 REAIS, or 0.25 BTC. (293 EUR | 259 GBP | 333 USD)


Figure 2 - Func _get_bitcoin_value()


The ransomware author or authors is/are definitely not kidding: if you enter a wrong password, the ransom will start deleting files.

Figure 3 - 'Error!", "Senha de descriptografia errada, NA PROXIMA 500 ARQUIVOS SERÃO EXCLUIDOS!'


Files to encrypt, including those used in virtualization software such as VMware for example:

zip, 7z, rar, pdf, doc, docx, xls, xlsx, pptx, pub, one, vsdx, accdb, asd, xlsb, mdb, snp, wbk, ppt, psd, ai, odt, ods, odp, odm, , , odc, odb, docm, wps, xlsm, xlk, pptm, pst, dwg, dxf, dxg, wpd, rtf, wb2, mdf, dbf, pdd, eps, indd, cdr, dng, 3fr, arw, srf, sr2, bay, crw, cr2, dcr, kdc, erf, mef, mrw, nef, nrw, orf, raf, raw, rwl, rw2, r3d, ptx, pef, srw, x3f, der, cer, crt, pem, pfx, p12, p7b, p7c, abw, til, aif, arc, as, asc, asf, ashdisc, asm, asp, aspx, asx, aup, avi, bbb, bdb, bibtex, bkf, bmp, bpn, btd, bz2, c, cdi, himmel, cert, cfm, cgi, cpio, cpp, csr, cue, dds, dem, dmg, dsb, eddx, edoc, eml, emlx, EPS, epub, fdf, ffu, flv, gam, gcode, gho, gpx, gz, h, hbk, hdd, hds, hpp, ics, idml, iff, img, ipd, iso, isz, iwa, j2k, jp2, jpf, jpm, jpx, jsp, jspa, jspx, jst, key, keynote, kml, kmz, lic, lwp, lzma, M3U, M4A, m4v, max, mbox, md2, mdbackup, mddata, mdinfo, mds, mid, mov, mp3, mp4, mpa, mpb, mpeg, mpg, mpj, mpp, msg, mso, nba, nbf, nbi, nbu, nbz, nco, nes, note, nrg, nri, afsnit, ogg, ova, ovf, oxps, p2i, p65, p7, pages, pct, PEM, phtm, phtml, php, php3, php4, php5, phps, phpx, phpxx, pl, plist, pmd, pmx, ppdf, pps, ppsm, ppsx, ps, PSD, pspimage, pvm, qcn, qcow, qcow2, qt, ra, rm, rtf, s, sbf, set, skb, slf, sme, smm, spb, sql, srt, ssc, ssi, stg, stl, svg, swf, sxw, syncdb, tager, tc, tex, tga, thm, tif, tiff, toast, torrent, txt, vbk, vcard, vcd, vcf, vdi, vfs4, vhd, vhdx, vmdk, vob, wbverify, wav, webm, wmb, wpb, WPS, xdw, xlr, XLSX, xz, yuv, zipx, jpg, jpeg, png, bmp

Additionally, Steam users aren't spared of getting their files encrypted either:

Figure 4 - Executable files in Steam's games directory will be encrypted

In reality, it appears all files are encrypted, regardless of extension.

The ransomware ultimately calls home and leverages Pastebin to do so. However, when analysing the ransomware, none of the Pastebin links were online as they had been removed.

$data = "pcname=" & @ComputerName & "&hwid=" & $key & "&version=Locker"

At time of writing, no payments have been made as of yet to the Bitcoin address:
1LULpQbdvoAWqKzhe8fuMiPQ8iGdW36pk1

The ransomware encrypts files prepending the original extension with '.encrypted.'. For example;
image.png would become: image.encrypted.png

The ransomware is based on CryptoWire, an open-sourced ransomware written in AutoIT.


Decryption

To unlock your files, you can use the key or password: 123
Para desbloquear seus arquivos, você pode usar a chave ou a senha: 123

Note: as always, prevention is more important than decryption or disinfection! Have a look at the dedicated page I've set up here.


Conclusion

While ransomware is anything but uncommon, ransomware very likely stemming from Brazil and specifically targeting Brazilian users and businesses, is a less frequent occurence. In fact, the only notable example, as far as I know, is TeamXRat also known as Xpan ransomware.

Below you may find IOCs.

IOCs