Home Malware Programs Ransomware FlatChestWare Ransomware

FlatChestWare Ransomware

Posted: August 23, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 9
First Seen: August 23, 2017
Last Seen: October 14, 2021
OS(es) Affected: Windows

The FlatChestWare Ransomware is a variant of Hidden Tear, a Trojan project intended as a non-harmful demonstration of how con artists use encryption to hold files hostage originally. Besides using a standard, data-encrypting attack to lock your files, the FlatChestWare Ransomware also includes custom graphics for its ransoming instructions and can pretend to be a Windows update. Anti-malware programs should delete the FlatChestWare Ransomware before it can endanger any content on your PC, and freeware decryptors also can help victims who lack undamaged backups.

Hidden Tear Goes Full Anime

Although it does have more than a little competition, minor variants on the common theme of Hidden Tear are persisting as one of the top formats for file-encrypting threats throughout the year. Individual threat actors often separate themselves from their counterparts by aesthetic and ransom-related differences, such as the FlatChestWare Ransomware and its unusual choice of theme. Although this Trojan requires the victim to launch it manually for its attacks to take place, it includes a disguise for its encryption operations, after which an anime-themed warning screen greets the victim.

When running, the FlatChestWare Ransomware begins an encryption routine that searches for file types such as DOC or JPG and encrypts them using an AES-based cipher. So that the victim can identify what content is at risk, it also appends '.flat' extensions at the ends of the names of these files. More unusually, however, when it finishes this attack, the FlatChestWare Ransomware also generates a fake Windows update alert asking the victims to restart their computers. This feature is one that malware experts see in Hidden Tear-based Trojans rarely since it requires additional work from the threat actor.

After the reboot, the FlatChestWare Ransomware shows its ransoming instructions through a pop-up that includes various, standardized features, such as a custom wallet field for transferring payment, a built-in decryption button, and a 'help' button for more information. The threat actor, named Loli appropriately, also includes a screenshot of a small girl from a Japanese animation product, which gives the Trojan a visually distinctive theme. Bitcoins remain the preferred payment method, which gives the con artist the option to keep the money and withhold any decryption help without the risks of refunds.

Escorting Little Encryption Girls Back Home

No matter how valuable your media is, paying a ransom to decrypt your files always is a data recovery solution to avoid until all other options fail. Since malware researchers find that most versions of Hidden Tear are relatively easy to decrypt, victims can copy their blocked files and test appropriate, free decryption tools for the feasibility of reversing the FlatChestWare Ransomware's attack. Other families of Trojans with stronger encryption methods may require different solutions, such as having a backup that the Trojan can't access to delete or encrypt.

Although some threats do prefer installing themselves through fake Windows updates, malware experts have yet to determine whether the FlatChestWare Ransomware's update-based theme is limited to its payload or also part of its delivery method. Regardless of any disguises, anti-malware programs with any history of removing Hidden Tear-based threats also should delete the FlatChestWare Ransomware by default. Identifying the FlatChestWare Ransomware infection by its post-infection symptoms, such as pop-ups, always involves a risk of allowing your files to be enciphered, deleted or corrupted.

On artists like the FlatChestWare Ransomware's author always are looking for ways to make their Trojans stand out from the crowd. Despite that, even an adorable mascot is no greater reassurance that your ransoms are paying for real data recovery, as opposed to the dryer but more practical efforts of various cyber security researchers.

Loading...