IGotYou Ransomware
Posted: November 28, 2017
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 1/10 |
---|---|
Infected PCs: | 37 |
First Seen: | January 30, 2022 |
---|---|
Last Seen: | December 19, 2022 |
OS(es) Affected: | Windows |
The IGotYou Ransomware is a Trojan based on the FTSCoder partially, which can encrypt various data types on an infected PC and create pop-up messages, usually for ransom purposes. These attacks may prevent you from opening files like documents, make alerts that demand money through non-refundable methods, delete your local backups, or change your PC's security settings. For protection, always use safe locations to back up your work and have anti-malware products act to uninstall the IGotYou Ransomware immediately.
India is Getting a New Trojan Problem
The FTSCoder family appears to be set to grow one member greater, with a threat actor using the name of 'Rogers_Pro' conducting tests with a partially-complete build of the Trojan. The new variant of FTSCoder is using the name of IGotYou Ransomware, with working data-locking attacks and ransoming methods specific to Asia. Minor expansions to its whitelist could let the IGotYou Ransomware block almost any range of data formats on any location on an infected PC.
The builds of the IGotYou Ransomware that malware experts have in analysis limit their attacks to targeting a 'test' directory on the C drive, which is a common method of experimenting with file-locking features without risking any data loss on the threat actor's system. Typically, file-locker Trojans like the IGotYou Ransomware will attack the user's downloads folder and desktop, among other locations. The IGotYou Ransomware demonstrates minimal variance from FTSCoder's default, file-blocking behavior, which uses a simple, non-secure encryption function. Any files that the IGotYou Ransomware converts to locked formats also bear the '.iGotYou' extension (such as 'meadow.gif.iGotYou').
When it finishes with its file-blocking feature, the IGotYou Ransomware also loads a Windows dialog box that shows Rogers_Pro's demands: transferring ten thousand Indian rupees (equaling 155 USD) via the payTM service. The same note also claims that the threat actor is monitoring the infected PC actively, but malware experts find no evidence of the IGotYou Ransomware using any spyware or backdoor network-related features that would accomplish this feat. While its transaction methods are India-specific, the IGotYou Ransomware's data-locking and pop-up attacks could affect the Windows systems anywhere in the world.
Getting Your Files out of Getting 'Got'
By boasting of features it doesn't possess and bluffing about its default features, the IGotYou Ransomware is an ideal example of Trojans feeding intentionally inaccurate information to their victims. Victims may recover their files without needing to pay any ransom by using decryption utilities that are compatible with the FTSCoder's family and its variants, such as the Haters Ransomware, the NIBIRU Ransomware, the WhyCry Ransomware, the BlackSheep Ransomware, or the Cyron Ransomware. Independent PC security organizations host these file-unlocking programs and provide downloads without any charges.
Although its ransoming method is more suitable for small numbers of recreational users than large, corporate targets, the IGotYou Ransomware is unfinished and not yet in public circulation. Its infection strategies could include attaching to a forged e-mail message, using corrupted website scripts during drive-by-download attacks, or pretending to be another download kind (such as a game-cracking tool). Most of these methods are preventable entirely by having standard anti-malware programs that should detect and remove the IGotYou Ransomware instantly.
Unless you have a habit of keeping invaluable files in a 'test' folder, the IGotYou Ransomware is a minimal threat to your media, for now. In spite of this silver lining, malware analysts anticipate further progress on its campaign, as well as other versions of the FTSCoder's ransoming offspring.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:C:\Users\<username>\AppData\Local\Temp\vmware-goldeneye\VMwareDnD\40a183e7\Deceptor\77773820e0751c7731ae2a22662b3ae712aac20b77e218b4e8e22940d5c14e56.exe
File name: 77773820e0751c7731ae2a22662b3ae712aac20b77e218b4e8e22940d5c14e56.exeSize: 876.92 KB (876920 bytes)
MD5: 0811d70467592bf47f38a40b74f27f42
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Path: C:\Users\<username>\AppData\Local\Temp\vmware-goldeneye\VMwareDnD\40a183e7\Deceptor\77773820e0751c7731ae2a22662b3ae712aac20b77e218b4e8e22940d5c14e56.exe
Group: Malware file
Last Updated: May 25, 2023
%PROGRAMFILES(x86)%\tssi\.net wysiwyg html editor\.net wysiwyg html editor.exe
File name: .net wysiwyg html editor.exeSize: 402.98 KB (402984 bytes)
MD5: 611aecb1a917acdfca7e69121aa84132
Detection count: 9
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\tssi\.net wysiwyg html editor
Group: Malware file
Last Updated: May 25, 2023
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.