Home Malware Programs Ransomware Hitler Ransomware

Hitler Ransomware

Posted: August 8, 2016

Threat Metric

Threat Level: 10/10
Infected PCs: 169
First Seen: August 8, 2016
Last Seen: May 2, 2022
OS(es) Affected: Windows


The Hitler Ransomware is a Trojan that renames and deletes the files on your PC. While the Hitler Ransomware does display an extortion message demanding that the victim purchases a decryption service for reversing its attacks, malware experts can find no encryption capabilities in the Hitler Ransomware, at this time. PC users still are at risk of significant data loss, and should act to remove the Hitler Ransomware as soon as possible with standard anti-malware products.

A New Reich for Ransomware

Although file encryption is a relatively straightforward way to hold a PC owner's personal data hostage, not all threat developers have the talent or time to create a sufficiently secure encrypting function. As an even easier alternative to encryption algorithms, some campaigns turn to deleting content. That strategy is one that malware experts previously saw with Anonpop Ransomware's campaign and, now, are observing again with the new Hitler Ransomware.

The Hitler Ransomware is a batch file-based Trojan that consists of several executable components, each of which is responsible for tasks such as loading its ransom message, deleting files and forcing the PC to restart. Before unpacking these individual components, the Hitler Ransomware's initial execution runs a function for renaming any files in the Windows user directories. This renaming process removes all extensions, but, unlike data encryption Trojans, doesn't encrypt their content. Renaming the files by adding their previous extensions back will restore all data and make it usable.

The Hitler Ransomware then places several executable files in the victim's Temp directory, along with a duplicate of one of them ('firefox32.exe') in Startup, thereby guaranteeing that it launches once Windows reboots. The rest of the Hitler Ransomware's payload proceeds in the following sequence:

  • A Visual Basic script loads a fake error message, meant to confuse you into thinking that the Hitler Ransomware's installer performed a generic error, instead of installing threats.
  • An EXE loads a Hitler-themed ransom message, claiming that your files have been through an unbreakable encryption process and that you should pay for decryption via Vodafone cards (an unusual method). It also displays a timer until the Hitler Ransomware deletes your supposedly encrypted content.
  • Once the timer concludes, the Hitler Ransomware terminates an essential Windows process, causing a BSOD. Rebooting triggers that fake Firefox component, which is responsible for deleting your files.

Escaping a Digital War You didn't Start

Internal data in the Hitler Ransomware's files indicates that this threat is a work in progress that may see recurring updates. While the Hitler Ransomware is incapable of encrypting any content currently, it still endangers your data through its Windows UI-locking pop-up and deleting capabilities effectively. PC users should be particularly cautious of restarting their OS, which may load components of the Hitler Ransomware that can cause further damage.

However, a prompt and safe response to the Hitler Ransomware can prevent it from causing any permanent harm. Malware experts recommend using alternative reboot methods, such as an emergency recovery OS on an external drive, that would ignore any default Windows Startup programs. Since its victims don't require a decryption routine, removing the Hitler Ransomware before it deletes any content can facilitate a straightforward recovery process.

Like its namesake, the Hitler Ransomware's campaign seems to be targeting European regions, and uses a note referencing the Euro for purchasing 'decryption.' Also like that dictator, the Hitler Ransomware is a threat that uses subterfuge to make itself seem even more formidable than it is, and already-protected PC users should be able to detect the Hitler Ransomware with anti-malware solutions before it finishes installing itself.

Technical Details

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\..\..{RegistryKeys}SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adolf HitlerSOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Adolf Hitler

Related Posts

Loading...