Home Malware Programs Ransomware RAA Ransomware

RAA Ransomware

Posted: June 15, 2016

Threat Metric

Threat Level: 8/10
Infected PCs: 7
First Seen: June 15, 2016
Last Seen: November 11, 2020
OS(es) Affected: Windows

The RAA Ransomware is a Trojan that attacks particular data types with an encryption routine, preventing the content from being opened or otherwise used. In addition to using this attack to extort money from its victims, the RAA Ransomware also is closely connected with spyware that may collect information in a symptomless manner. As a result of all these risks, malware experts categorize this Trojan as a high-level threat and only advise removing the RAA Ransomware with the strongest available anti-malware tools.

Executing Your Files without an EXE

Executable files within the EXE format are, by far, the most common means of packaging software, but not the only means available. Some enterprising coders may use alternate structures, such as the pure JavaScript approach of the RAA Ransomware. This Trojan's campaign was confirmed this year recently for honing in on Russian-speaking victims, according to its ransom note.

The RAA Ransomware's delivery mechanisms are 'traditional,' within the traditions of data-encrypting Trojans. The RAA Ransomware may use e-mail messages for delivering itself, along with a fake document that distracts the user from the deposited threat. Malware analysts also can verify the presence of at least one other Trojan smuggling itself within some the RAA Ransomware attacks: a client-side installer for the Pony Botnet and its attendant spyware.

A finalized installation gives the RAA Ransomware the opportunity to scan your PC for a handful of data types, including DOC documents, XLS spreadsheets and ZIP archives. The RAA Ransomware eschews any folder related to your Windows operating system or other programs. Any content that falls into the former prerequisite without being in one of the blacklisted locations is sent through an AES-based encryption sequence, preventing other programs from reading it.

As always, con artists designed the RAA Ransomware's campaign for the purpose of making money. The RAA Ransomware loads ransom messages requesting Bitcoin payments averaging 250 USD, claiming that its administrators will undo the encryption after the fact.

Pulling Back from the Brink of a Digital Ransom

Although you should be able to identify all affected files according to their name changes (which include an ID tag and the '.locked' extension), the anti-malware industry has yet to publish a free decryptor for the RAA Ransomware. Additionally, the RAA Ransomware takes care to delete local backup information that Windows could use for restoring your content. As a workaround, malware researchers can recommend such conventional standbys as cloud services, or backups kept on detached storage devices.

It's equally important to recognize the less obvious dangers arising from the RAA Ransomware infections. The Pony Botnet infections can collect browser passwords or give third parties long-term, remote access to your computer. Unlike the RAA Ransomware, the Pony Botnet malware does not show symptoms of being installed. Victims should make sure to change all passwords, and related account access information, after disinfecting their PCs.

Even though paying a ransom may seem like the easiest method of restoring your files, the RAA Ransomware's con artists can offer no reassurances of delivering decryption services after processing a payment. Proper responses to this threat include ignoring disinformation provided by its ransom instructions and using anti-malware products for uninstalling the RAA Ransomware, as well as the Pony Botnet program. Whatever the fate of your data, the RAA Ransomware does show that threat authors are looking into new ways of packaging old threats to keep them relevant in the current climate clearly

Related Posts

Loading...