Home Malware Programs Ransomware Executioner Ransomware

Executioner Ransomware

Posted: June 7, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 49
First Seen: June 7, 2017
Last Seen: March 23, 2023
OS(es) Affected: Windows

The Executioner Ransomware is a Trojan that uses encryption derived from the Hidden Tear project to block your files from opening. This form of file damage sometimes is curable by third-party decryption software, although malware experts also recommend having backups to cover any difficulties in data restoration. Any anti-malware program able to deal with Hidden Tear previously should have no issues with removing the Executioner Ransomware as a default threat to your PC.

Trojans Executing Plans for High-Tech Hostage Grabs

Hidden Tear is far from the only Trojan family to be reused and recycled in 2017 widely, but retains a notably leading position, either due to how easy it is to work with, or how simple its code is to obtain without few or no costs. Threat actors are using the HT family to attack systems throughout the world, including, as readers can see with the Executioner Ransomware, PCs in the Middle East. The Executioner Ransomware uses a slightly more sophisticated ransoming method than a similar threat, the DolphinTear Ransomware, although the more threatening features are all but indistinguishable.

The Executioner Ransomware follows its installation by scanning the system, potentially also including network-accessible folders, for documents, pictures and other media. Appropriate formats in the locations it scans will be encrypted with an AES or Rijndael-based cipher to keep them from opening. The Trojan also adds an extension to their filenames, although, unlike most Hidden Tear versions, malware experts find that the Executioner Ransomware's extension uses random characters.

The Trojan collects profits from its attacks by asking any victims to visit its TOR-protected website to pay a ransom for decrypting their media. In contrast to most, low-effort Hidden Tear variants, the Executioner Ransomware uses both an image (most likely locked as the desktop wallpaper) and a crafted HTML page for its ransom demands, instead of plain text.

Preventing Wild Programs from Playing Judge, Jury and Executioner

PC owners can counter even the most successful the Executioner Ransomware's infections by using remote backups, such as cloud services, to let them restore their files from non-damaged copies. The Hidden Tear family also isn't one of the most secure groups of file-encrypting Trojans that malware experts have identified, and free decryption solutions can be possible. Like other Hidden Tear Trojans, the Executioner Ransomware doesn't damage the operating system intentionally but does represent a significant danger to computer user's data, such as work or recreational content.

The Executioner Ransomware uses both Turkish and English languages in its ransom notes, and PC owners watching for possible infection vectors should keep this campaign's geographical preferences in mind. Recent trends emphasize file-encrypting Trojans installing through spam e-mail campaigns, although other methods also are in play. Regardless, standard PC security products should block and delete the Executioner Ransomware outright.

Prevention is always key to keeping threats from gaining the footholds necessary to wreak harm upon your PC and anything you save on it. A few minutes a day abiding by the right security tips can pay off in dividends, or Bitcoins, when it comes to handling Trojans like the Executioner Ransomware.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



file.exe File name: file.exe
Size: 118.78 KB (118784 bytes)
MD5: eec4f84d12139add6d6ebf3b8c72fff7
Detection count: 72
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: June 11, 2017

Registry Modifications

The following newly produced Registry Values are:

Regexp file mask%USERPROFILE%\ransom.jpg

Related Posts

Loading...