Hitler Ransomware
Posted: August 8, 2016
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 169 |
First Seen: | August 8, 2016 |
---|---|
Last Seen: | May 2, 2022 |
OS(es) Affected: | Windows |
The Hitler Ransomware is a Trojan that renames and deletes the files on your PC. While the Hitler Ransomware does display an extortion message demanding that the victim purchases a decryption service for reversing its attacks, malware experts can find no encryption capabilities in the Hitler Ransomware, at this time. PC users still are at risk of significant data loss, and should act to remove the Hitler Ransomware as soon as possible with standard anti-malware products.
A New Reich for Ransomware
Although file encryption is a relatively straightforward way to hold a PC owner's personal data hostage, not all threat developers have the talent or time to create a sufficiently secure encrypting function. As an even easier alternative to encryption algorithms, some campaigns turn to deleting content. That strategy is one that malware experts previously saw with Anonpop Ransomware's campaign and, now, are observing again with the new Hitler Ransomware.
The Hitler Ransomware is a batch file-based Trojan that consists of several executable components, each of which is responsible for tasks such as loading its ransom message, deleting files and forcing the PC to restart. Before unpacking these individual components, the Hitler Ransomware's initial execution runs a function for renaming any files in the Windows user directories. This renaming process removes all extensions, but, unlike data encryption Trojans, doesn't encrypt their content. Renaming the files by adding their previous extensions back will restore all data and make it usable.
The Hitler Ransomware then places several executable files in the victim's Temp directory, along with a duplicate of one of them ('firefox32.exe') in Startup, thereby guaranteeing that it launches once Windows reboots. The rest of the Hitler Ransomware's payload proceeds in the following sequence:
- A Visual Basic script loads a fake error message, meant to confuse you into thinking that the Hitler Ransomware's installer performed a generic error, instead of installing threats.
- An EXE loads a Hitler-themed ransom message, claiming that your files have been through an unbreakable encryption process and that you should pay for decryption via Vodafone cards (an unusual method). It also displays a timer until the Hitler Ransomware deletes your supposedly encrypted content.
- Once the timer concludes, the Hitler Ransomware terminates an essential Windows process, causing a BSOD. Rebooting triggers that fake Firefox component, which is responsible for deleting your files.
Escaping a Digital War You didn't Start
Internal data in the Hitler Ransomware's files indicates that this threat is a work in progress that may see recurring updates. While the Hitler Ransomware is incapable of encrypting any content currently, it still endangers your data through its Windows UI-locking pop-up and deleting capabilities effectively. PC users should be particularly cautious of restarting their OS, which may load components of the Hitler Ransomware that can cause further damage.
However, a prompt and safe response to the Hitler Ransomware can prevent it from causing any permanent harm. Malware experts recommend using alternative reboot methods, such as an emergency recovery OS on an external drive, that would ignore any default Windows Startup programs. Since its victims don't require a decryption routine, removing the Hitler Ransomware before it deletes any content can facilitate a straightforward recovery process.
Like its namesake, the Hitler Ransomware's campaign seems to be targeting European regions, and uses a note referencing the Euro for purchasing 'decryption.' Also like that dictator, the Hitler Ransomware is a threat that uses subterfuge to make itself seem even more formidable than it is, and already-protected PC users should be able to detect the Hitler Ransomware with anti-malware solutions before it finishes installing itself.
Technical Details
Registry Modifications
HKEY..\..\..\..{RegistryKeys}SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adolf HitlerSOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Adolf Hitler
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.