Home Malware Programs Ransomware IGotYou Ransomware

IGotYou Ransomware

Posted: November 28, 2017

Threat Metric

Threat Level: 1/10
Infected PCs: 37
First Seen: January 30, 2022
Last Seen: December 19, 2022
OS(es) Affected: Windows

The IGotYou Ransomware is a Trojan based on the FTSCoder partially, which can encrypt various data types on an infected PC and create pop-up messages, usually for ransom purposes. These attacks may prevent you from opening files like documents, make alerts that demand money through non-refundable methods, delete your local backups, or change your PC's security settings. For protection, always use safe locations to back up your work and have anti-malware products act to uninstall the IGotYou Ransomware immediately.

India is Getting a New Trojan Problem

The FTSCoder family appears to be set to grow one member greater, with a threat actor using the name of 'Rogers_Pro' conducting tests with a partially-complete build of the Trojan. The new variant of FTSCoder is using the name of IGotYou Ransomware, with working data-locking attacks and ransoming methods specific to Asia. Minor expansions to its whitelist could let the IGotYou Ransomware block almost any range of data formats on any location on an infected PC.

The builds of the IGotYou Ransomware that malware experts have in analysis limit their attacks to targeting a 'test' directory on the C drive, which is a common method of experimenting with file-locking features without risking any data loss on the threat actor's system. Typically, file-locker Trojans like the IGotYou Ransomware will attack the user's downloads folder and desktop, among other locations. The IGotYou Ransomware demonstrates minimal variance from FTSCoder's default, file-blocking behavior, which uses a simple, non-secure encryption function. Any files that the IGotYou Ransomware converts to locked formats also bear the '.iGotYou' extension (such as 'meadow.gif.iGotYou').

When it finishes with its file-blocking feature, the IGotYou Ransomware also loads a Windows dialog box that shows Rogers_Pro's demands: transferring ten thousand Indian rupees (equaling 155 USD) via the payTM service. The same note also claims that the threat actor is monitoring the infected PC actively, but malware experts find no evidence of the IGotYou Ransomware using any spyware or backdoor network-related features that would accomplish this feat. While its transaction methods are India-specific, the IGotYou Ransomware's data-locking and pop-up attacks could affect the Windows systems anywhere in the world.

Getting Your Files out of Getting 'Got'

By boasting of features it doesn't possess and bluffing about its default features, the IGotYou Ransomware is an ideal example of Trojans feeding intentionally inaccurate information to their victims. Victims may recover their files without needing to pay any ransom by using decryption utilities that are compatible with the FTSCoder's family and its variants, such as the Haters Ransomware, the NIBIRU Ransomware, the WhyCry Ransomware, the BlackSheep Ransomware, or the Cyron Ransomware. Independent PC security organizations host these file-unlocking programs and provide downloads without any charges.

Although its ransoming method is more suitable for small numbers of recreational users than large, corporate targets, the IGotYou Ransomware is unfinished and not yet in public circulation. Its infection strategies could include attaching to a forged e-mail message, using corrupted website scripts during drive-by-download attacks, or pretending to be another download kind (such as a game-cracking tool). Most of these methods are preventable entirely by having standard anti-malware programs that should detect and remove the IGotYou Ransomware instantly.

Unless you have a habit of keeping invaluable files in a 'test' folder, the IGotYou Ransomware is a minimal threat to your media, for now. In spite of this silver lining, malware analysts anticipate further progress on its campaign, as well as other versions of the FTSCoder's ransoming offspring.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



C:\Users\<username>\AppData\Local\Temp\vmware-goldeneye\VMwareDnD\40a183e7\Deceptor\77773820e0751c7731ae2a22662b3ae712aac20b77e218b4e8e22940d5c14e56.exe File name: 77773820e0751c7731ae2a22662b3ae712aac20b77e218b4e8e22940d5c14e56.exe
Size: 876.92 KB (876920 bytes)
MD5: 0811d70467592bf47f38a40b74f27f42
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Path: C:\Users\<username>\AppData\Local\Temp\vmware-goldeneye\VMwareDnD\40a183e7\Deceptor\77773820e0751c7731ae2a22662b3ae712aac20b77e218b4e8e22940d5c14e56.exe
Group: Malware file
Last Updated: May 25, 2023
%PROGRAMFILES(x86)%\tssi\.net wysiwyg html editor\.net wysiwyg html editor.exe File name: .net wysiwyg html editor.exe
Size: 402.98 KB (402984 bytes)
MD5: 611aecb1a917acdfca7e69121aa84132
Detection count: 9
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\tssi\.net wysiwyg html editor
Group: Malware file
Last Updated: May 25, 2023
Loading...