Home Malware Programs Ransomware 'Drugvokrug727@india.com' Ransomware

'Drugvokrug727@india.com' Ransomware

Posted: August 24, 2016

Threat Metric

Threat Level: 10/10
Infected PCs: 16
First Seen: August 24, 2016
OS(es) Affected: Windows


The 'Drugvokrug727@india.com' Ransomware is a Trojan that encrypts your computer's files (other than those required by the operating system). Such attacks most often follow up with instructions for contacting the admins of that Trojan's build, which lets con artists negotiate a ransom fee in return for giving you a decryption service. These services often are faulty or non-functional, and, instead, malware experts recommend that you use well-known standards of data protection and anti-malware security for dealing with the 'Drugvokrug727@india.com' Ransomware.

A Fresh Face in E-mail for Ancient Trojan Problems

The 'Drugvokrug727@india.com' Ransomware is an example of the current model favored by the threat industry, which often involves a coding team that's separate from the administrators of any individual attack campaigns. The latter entities are responsible for delivering the threat to the target, as well as collecting the ransom. To provide an incentive, the 'Drugvokrug727@india.com' Ransomware includes file enciphering attacks that use encryption to block data.

Threats most closely related to the 'Drugvokrug727@india.com' Ransomware, such as the 'Meldonii@india.com' Ransomware or the Okean-1955@india.com' Ransomware, most often use e-mails to compromise specific targets via fake invoices and other documents. However its installation takes place, the 'Drugvokrug727@india.com' Ransomware launches afterward automatically, without any display of symptoms until it finishes encrypting the files of the PC.

The 'Drugvokrug727@india.com' Ransomware uses what malware experts currently surmise as being a combination of AES and RSA encryption ciphers, while also adding its e-mail address to the names of each file. You also may see additional name changes, such as the presence of a string of numbers (an ID unique to your infection) or a new extension. Even if you restore their original names, associated programs can't open the encrypted data.

Just Saying No to the Drug of Black Market Ransoms

Although the 'Drugvokrug727@india.com' Ransomware's administration team is likely to make strong claims about the reliability of their decryption tools, PC users can better protect their information by seeking help in the PC security sector. Various security companies do provide free decryptors for major families of Trojans, including the Crysis Ransomware, the threat malware experts estimate is most closely related to the 'Drugvokrug727@india.com' Ransomware. Keeping a backup that you update regularly, and kept on a non-local drive or server, also is a valid way to protect your data.

Other symptoms of the 'Drugvokrug727@india.com' Ransomware infections may include the insertion of text-based ransom demands or changes to your wallpaper's background. However, these symptoms appear only after the 'Drugvokrug727@india.com' Ransomware has finished encrypting your PC. Use anti-malware products to remove the 'Drugvokrug727@india.com' Ransomware or its installers beforehand, and pay close attention to common infection vectors, such as e-mail attachments with misleading formats.

Ultimately, whether or not the 'Drugvokrug727@india.com' Ransomware succeeds as an individual campaign is less historically significant than its point of being another extension of well-known threat campaign strategy turning regular PC users into opportunities for profit.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Payload00.exe File name: Payload00.exe
Size: 222 KB (222004 bytes)
MD5: 3ec1f0f804dc58d16a94e6b6f1350f36
Detection count: 16
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: August 24, 2016
Loading...