This way, the Trojan makes sure that only the owner of the private RSA key can obtain the random key used to encrypt the file. Then, it encrypts the random key using an asymmetric public-private key encryption algorithm (RSA) and keys of over 1024 bits (we’ve seen samples that used 2048-bit keys), and adds it to the encrypted file. The Trojan generates a random symmetric key for each file it encrypts, and encrypts the file’s content with the AES algorithm, using that key.
0 Comments
Leave a Reply. |