Home Malware Programs Ransomware Evasive Ransomware

Evasive Ransomware

Posted: November 15, 2017

Threat Metric

Threat Level: 8/10
Infected PCs: 21
First Seen: May 17, 2021
OS(es) Affected: Windows

The Evasive Ransomware is a file-locking Trojan that can prevent you from accessing different, common formats of digital media, ranging from documents to compressed archives. The Trojan also may make extension-based changes to the names of your files, create messages demanding a ransom for its file-unlocking key, and operate as a concealed, background memory process. Due to its being a threat to any data you save on your computer, malware experts recommend allowing your anti-malware products to detect and delete the Evasive Ransomware in all cases.

A Trojan with Poor Evasive Techniques

New months bring new versions of suspicious or threatening software to the fore of centralized threat analysis databases, such as another variant of the file-locker Trojan known as Hidden Tear. While the threat actor administrating its potential campaign has taken steps to secure his ransoming communications, in other aspects, the Evasive Ransomware is limited, with few changes to the Hidden Tear payload and poor avoidance of existing threat detection standards. In spite of its small-scale edits, the Evasive Ransomware can target and damage over twenty types of data for extorting money out of the PC user.

The Evasive Ransomware, like most versions of the Hidden Tear program, runs in the background without notifying the user of its primary function: searching for files of up to twenty-six formats (including RAR archives, PDF documents and JPG pictures) to encrypt and lock. By default, the Evasive Ransomware's code continues using an AES-based standard for its data enciphering and also appends a generic '.locked' extension onto the names of all the hostage media.

Most versions of Hidden Tear use simple, text-based messages to communicate with their victims. The Evasive Ransomware's author uses a desktop background-hijacking feature, instead, which changes the wallpaper to an image that the Trojan bundles. This picture gives conflicting information on the deadline to contact the threat actor (via an encrypted e-mail service), presumably to pay for receiving a decryption key. Although such a key could restore your files, in theory, malware experts can't yet verify whether the Evasive Ransomware uploads this essential data to the threat actor's remote server or deletes it.

Having the Security to Evade a File-Kidnapping Attempt

With file-locking threats, in general, but any variant of a known-vulnerable family like Hidden Tear particularly, malware researchers can encourage using free decryption programs to restore any files that suffer encryption from an infection. Major AV companies and associated security organizations always provide these tools to the public free of charge. Backing your work up to a secure location, such as a removable USB device, also is a simple but foolproof way to keep the Evasive Ransomware from causing any permanent damage.

The Evasive Ransomware campaign has yet to hash out many of the details concerning its payments, and malware analysts have yet to see a live attack using the Trojan through a verifiable infection vector. Since a majority of file-locking Trojans utilize e-mail-based installation exploits, users who place any value in their files should be cautious about opening suspicious attachments or links. Anti-malware programs should remove the Evasive Ransomware with no more issues than with any other version of Hidden Tear, which has very little protection from current threat analysis protocols.

The Evasive Ransomware is idealistically named, with no modifications that would make it any better than old Hidden Tear remixes for avoiding quarantining by security software. Even with that in mind, slacking on coding from the Evasive Ransomware's author isn't a good excuse to exercise equal carelessness with your file preservation or Web security habits.

Related Posts

Loading...