Home Malware Programs Ransomware Fenrir Ransomware

Fenrir Ransomware

Posted: July 10, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 44
First Seen: July 10, 2017
OS(es) Affected: Windows


The Fenrir Ransomware is a Trojan that uses the AES encryption to lock your files while it asks you to pay ransoms through its pop-ups, images and text instructions. Victims may turn to anti-malware researchers for free decryption help or use backups to restore their content from clean copies. Malware experts recommend using automated anti-malware defenses to block or remove the Fenrir Ransomware, which will install itself in the disguise of another program usually.

Wolves Attacking Your Files with Jokes Thrown In

There's no room for laughs in the deadly serious business of extortion, but at least one threat actor is finding the time to include gags in the payloads of his new Trojan. This threat, the Fenrir Ransomware, uses a file-locking routine that includes encryption and inserting new extensions into their names. However, while it's showing the expected symptoms of a Trojan of its kind, the Fenrir Ransomware also is conducting behind the scenes logging activities with a sense of humor.

By the apparent evidence, the Fenrir Ransomware is an independent program and not a relation of any known threats like Hidden Tear, the Jigsaw Ransomware or the Globe Ransomware. Its primary executable disguises itself as an Adobe Reader program while gaining initial system access, after which the Trojan commences encrypting media like documents and pictures. Although the Fenrir Ransomware does insert new extensions into the names of all files that it locks, these additions aren't static strings, and consist of varying, ten-character hexadecimal hashes (for instance, '.A12b34cd5e' or '.1BC23D4EF5').

Other symptoms of the Fenrir Ransomware infections include the various means by which it provides its ransom demands for the file-unlocking decryptor, such as a desktop-hijacking image, an interactive pop-up window and an RTF document. However, malware experts identified its more interesting feature as being its logging capability, which outputs information about each infection to a remote server. Bizarrely, the threat actor has chosen to redirect all server traffic to the Twitter profile of a prominent anti-malware researcher, apparently as a joke.

Calming the Appetite of Gluttonous Beasts

While the Fenrir Ransomware uses the intimidating name of a mythical monster known for heralding the end of the world with its appetite, this Trojan's encryption feature is more vulnerable than the brand would seem to indicate. Victims can try contacting appropriate researchers in the anti-malware industry for help with developing a decryption tool compatible with their blocked media. Malware experts recommend this solution or using a backup particularly, instead of paying the ransom, which uses Bitcoins to prevent refunds.

Current samples of the Fenrir Ransomware all pretend to be part of an Adobe Reader installation routine, which could circulate through fraudulent update prompts from compromised or toxic websites. Many anti-malware products can identify attacks of these nature and block them or the URLs hosting them. Stopping and removing the Fenrir Ransomware before it starts attacking your files remains the best method for protecting your PC and preventing any chance of incurring permanent data loss.

Even a surface level of familiarity with the anti-malware industry can help some threat actors gain forewarning on how to defend their threats against standard detection methods. So far, the Fenrir Ransomware seems to use its C&C features only for frivolous purposes, which, perhaps, is for the best.

Loading...