Home Malware Programs Ransomware Ransom32 Ransomware

Ransom32 Ransomware

Posted: January 5, 2016

Threat Metric

Threat Level: 8/10
Infected PCs: 333
First Seen: January 5, 2016
Last Seen: December 13, 2022
OS(es) Affected: Windows

The Ransom32 Ransomware is a JavaScript-based file encryptor that scans for files of particular formats, encrypts them to make them unreadable, and finally displays a ransom message to force you to purchase a decryption key. Although the Ransom32 Ransomware's development platform of choice is historically important, the Ransom32 Ransomware shows no signs of having significant features over similar threats, besides a low AV detection rate. For now, malware experts can continue emphasizing the intelligent use of data backup strategies for preventing any file damage, while also using anti-malware products to delete the Ransom32 Ransomware and related threats.

A Ransom Riding on the Back of a Development Kit

JavaScript, while a common element in the delivery of threatening software, rarely has much direct involvement in the underlying code of the threats that they help install. However, 2016 has shown an exception to that rule in the Ransom32 Ransomware, a fully-featured file encryption Trojan operating solely off of JavaScript, rather than C++ or another, 'standard' coding language. The Ransom32 Ransomware operates under JW.js, a derivative of Node-WebKit. This platform works on the same principles as JavaScript functionality in your Web browser, but with many of the limitations removed.

The Ransom32 Ransomware uses these capabilities to scan for files on your hard drive of appropriate types, such as MP4 audio files, Office documents, spreadsheets and JPG images. The data targeted by the Ransom32 Ransomware goes through a 128-bit AES encryption process that security experts at Emsisoft have, so far, deemed unbreakable. The files are unusable without a corresponding decryption routine, which is a service the Ransom32 Ransomware offers at a premium through a pop-up message.

The Ransom32 Ransomware also uses a straightforward control interface for its administrators, including supporting attack options, such as the ability to 'fully lock' the computer, display other forms of pop-ups or modify its ransom fee.

Keeping Your PC out of the Targeting Framework of New Ransomware

The Ransom32 Ransomware's developers rent their threat's services out to other people on a rental basis, profiting from a percentage of any ransoms paid. This business model, which is popular in the threat industry, means the Ransom32 Ransomware could see distribution through a range of different strategies. However, to date, the Ransom32 Ransomware only has been seen using Windows-based infection methods transferred via e-mail attachments. Malware experts do warn that the JavaScript platform could let third parties redesign the Ransom32 Ransomware for targeting non-Windows systems extremely easily.

Both because of its relative newness to the threat industry and its unique coding language, the Ransom32 Ransomware has only a minority of detections with most anti-malware vendors, many of which are generic. However, the Ransom32 Ransomware does use an unusually large (over twenty megabyte) file size, which could make it slightly more visible during delivery. PC users who want to protect their data from the Ransom32 Ransomware should, instead of paying its ransom, use a remote file backup storage that can block the Ransom32 Ransomware from compromising any essential files. Updated anti-malware products still should be used for detecting and removing the Ransom32 Ransomware from your system.

Of course, refraining from opening suspicious e-mail attachments also offers a surefire way of avoiding the Ransom32 Ransomware's current campaign.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%Temp%\nw3932_17475 File name: %Temp%\nw3932_17475
Group: Malware file
%AppData%\Microsoft\Windows\Start Menu\Programs\Startup\ChromeService.lnk File name: %AppData%\Microsoft\Windows\Start Menu\Programs\Startup\ChromeService.lnk
File type: Shortcut
Mime Type: unknown/lnk
Group: Malware file
%AppData%\Chrome Browser\.chrome\cached-microdesc-consensus File name: %AppData%\Chrome Browser\.chrome\cached-microdesc-consensus
Mime Type: unknown/chrome\cached-microdesc-consensus
Group: Malware file
%AppData%\Chrome Browser\.chrome\cached-microdescs.new File name: %AppData%\Chrome Browser\.chrome\cached-microdescs.new
Mime Type: unknown/new
Group: Malware file
%AppData%\Chrome Browser\.chrome\lock File name: %AppData%\Chrome Browser\.chrome\lock
Mime Type: unknown/chrome\lock
Group: Malware file
%AppData%\Chrome Browser\.chrome\state File name: %AppData%\Chrome Browser\.chrome\state
Mime Type: unknown/chrome\state
Group: Malware file
%AppData%\Chrome Browser\chrome.exe File name: %AppData%\Chrome Browser\chrome.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%AppData%\Chrome Browser\chrome File name: %AppData%\Chrome Browser\chrome
Group: Malware file
%AppData%\Chrome Browser\ffmpegsumo.dll File name: %AppData%\Chrome Browser\ffmpegsumo.dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
%AppData%\Chrome Browser\g File name: %AppData%\Chrome Browser\g
Group: Malware file
%AppData%\Chrome Browser\icudtl.dat File name: %AppData%\Chrome Browser\icudtl.dat
File type: Data file
Mime Type: unknown/dat
Group: Malware file
%AppData%\Chrome Browser\locales\ File name: %AppData%\Chrome Browser\locales\
Group: Malware file
%AppData%\Chrome Browser\msgbox.vbs File name: %AppData%\Chrome Browser\msgbox.vbs
Mime Type: unknown/vbs
Group: Malware file
%AppData%\Chrome Browser\n.l File name: %AppData%\Chrome Browser\n.l
Mime Type: unknown/l
Group: Malware file
%AppData%\Chrome Browser\n.q File name: %AppData%\Chrome Browser\n.q
Mime Type: unknown/q
Group: Malware file
%AppData%\Chrome Browser\nw.pak File name: %AppData%\Chrome Browser\nw.pak
Mime Type: unknown/pak
Group: Malware file
%AppData%\Chrome Browser\rundll32.exe File name: %AppData%\Chrome Browser\rundll32.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%AppData%\Chrome Browser\s.exe File name: %AppData%\Chrome Browser\s.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%AppData%\Chrome Browser\u.vbs File name: %AppData%\Chrome Browser\u.vbs
Mime Type: unknown/vbs
Group: Malware file
Loading...