Home Malware Programs Ransomware Jaff Ransomware

Jaff Ransomware

Posted: May 12, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 56
First Seen: May 12, 2017
Last Seen: May 30, 2023
OS(es) Affected: Windows

The Jaff Ransomware is a Trojan that can block your files with the use of an asymmetric encryption routine. Among its symptoms, victims may identify the hijackings of their desktop backgrounds, being unable to open any of the affected media, or seeing pop-ups asking them to visit the Trojan's ransom-processing website. Use anti-malware programs for removing the Jaff Ransomware as soon as possible and contact appropriate anti-malware experts if you need help with data recovery.

The Dangers of Judging Your PC's Safety at a Glance

The principle of 'seeing is believing' is one that offers a false sense of security for some PC users, especially when it relates to Trojan attacks. A new threat circulating with the help of the Necurs botnet is conducting attacks that not only may be too late to cure, once seen, but also deliver symptoms that could give a mistaken impression of its identity. As per usual safety recommendations, malware experts are encouraging preemptive security standards for blocking the Jaff Ransomware before it can compromise and damage your PC.

The Jaff Ransomware installers are in live distribution through spam e-mail messages carrying corrupted documents. Opening the documents and enabling their macros triggers the threat's disguised installation routine. While the Jaff Ransomware's set of features is limited relatively, the formats of the files that it attacks aren't: the Trojan encrypts over four hundred different types of data. The '.jaff' extension that it adds also may help a victim detect this temporarily unusable content.

The Jaff Ransomware uses three methods of promoting its TOR-based ransoming website: a wallpaper-hijacking feature, a text message, and a local Web page. While malware experts can verify the Jaff Ransomware as not being related to the Locky Ransomware, the two Trojans do use almost identical ransoming formats, which could confuse anyone trying to use free decryptors. The ransom amounts the Jaff Ransomware's threat actors are demanding are unusually expensive, with victims reporting rates of over three thousand USD in Bitcoins.

Spotting the E-Mail that Wants to Hold Up Your Files

PCs compromised by a variant of the Necurs rootkit previously are exploitable for sending spam, including the Jaff Ransomware installers, automatically. From the other end, a target of such attacks can identify a compromised message from its format, which will include subject lines with random numbers and references to work documents (such as PDFs or scanned content). The Jaff Ransomware infection also requires enabling the unsafe content manually after the user opens the attached document.

Leaving macros disabled, by default, and scanning unidentified e-mail files with anti-malware solutions should catch the Jaff Ransomware's installer before it can begin encrypting and blocking your media. While malware experts outline some minor vulnerabilities in the Jaff Ransomware that could lead to free decryption solutions, on an individual basis, most users should have backups instead of depending on decoding the attack. Since the Jaff Ransomware uses a relatively secure encryption method with a combination of AES (in CBC mode) and RSA), victims shouldn't anticipate the release of a comprehensive freeware decryptor.

The cost of not paying attention to what you're opening can be a sharp one. Even though many anti-malware products of most brands could uninstall the Jaff Ransomware, being able to rid yourself of a Trojan doesn't imply removing all the problems it brings along.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



file.exe File name: file.exe
Size: 233.47 KB (233472 bytes)
MD5: 56185d85038547ec352a0f39396a37a7
Detection count: 86
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 24, 2017
file.exe File name: file.exe
Size: 155.64 KB (155649 bytes)
MD5: bf0455ac54931da70445d71ad9ebfe2d
Detection count: 82
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 16, 2017
file.exe File name: file.exe
Size: 155.64 KB (155647 bytes)
MD5: 63ff8e84e4aea1217eb0490757a49ae7
Detection count: 81
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 16, 2017

Registry Modifications

The following newly produced Registry Values are:

File name without pathREADME_TO_DECRYPTl.bmp

Additional Information

The following directories were created:
%ALLUSERSPROFILE%\Rondo

Related Posts

Loading...