Home Malware Programs Ransomware '.setimichas1971@protonmail.com.b4wq File Extension' Ransomware

'.setimichas1971@protonmail.com.b4wq File Extension' Ransomware

Posted: June 8, 2018

The '.setimichas1971@protonmail.com.b4wq File Extension' Ransomware is a file-locker Trojan that searches for and encrypts your digital media, such as pictures, spreadsheets, or documents, automatically. The '.setimichas1971@protonmail.com.b4wq File Extension' Ransomware also creates text messages promoting its ransom negotiations for the author's decryption help. Traditional anti-malware programs should identify and delete the '.setimichas1971@protonmail.com.b4wq File Extension' Ransomware automatically, and secure backups can limit this threat's file-damaging capabilities greatly.

Hostile Encryption with a Little Extra on Top

Although visually, one encrypted or otherwise 'locked' file looks very similar to any other one, their internal contents can differ drastically from one another. A recent example of Trojans exploiting that superficial resemblance is the RedEye Ransomware's campaign, which overwrote media with fake information instead of encrypting them. Malware experts also are seeing another variation with the '.setimichas1971@protonmail.com.b4wq File Extension' Ransomware, whose family and distribution exploits remain unidentified.

The '.setimichas1971@protonmail.com.b4wq File Extension' Ransomware utilizes data encryption for locking your files in the same way as the members of Hidden Tear, EDA2, or the Globe Ransomware all employ. However, the '.setimichas1971@protonmail.com.b4wq File Extension' Ransomware also generates a Base64, identifying serial for each infection that it inserts into the internal data of every file it locks. The end of the block also includes a simple marker, as a shorthand for denoting the file's status. This custom-tailored addition means that one-size-fits-all decryption software will not function for decoding and unlocking the victim's files properly.

The other feature malware experts are verifying for the '.setimichas1971@protonmail.com.b4wq File Extension' Ransomware's payload is the dropping of a 'Readme.txt' message, which includes the threat actor's ransoming instructions. Except for the e-mail and website addresses (both of which use the TOR's anonymity features for protecting the criminal's identity), most of this text is a duplication of the instructions of old campaigns by Trojans with similar, encryption-based payloads. Victims should ignore the ransom, if possible since many threat actors choose to take their payment without unlocking any files.

Sparing Your Files from an Onion-Scented Captivity

The anonymous nature of TOR (AKA, 'The Onion Router'), along with a strong emphasis on cryptocurrencies, vouchers, and other ransoming methods with limited or no refunding or legal protections are reoccurring factors in file-locker Trojans' attacks. Without a certain means of decrypting your files, backing up anything of value to another device is the simplest way of protecting them and reversing any damage that the '.setimichas1971@protonmail.com.b4wq File Extension' Ransomware might inflict. Malware experts encourage using password-protected cloud storage and removable devices, such as USBs, in particular. Victims can isolate the 'locked' content from searching for the extension that the '.setimichas1971@protonmail.com.b4wq File Extension' Ransomware appends, which, as per its name, consists of the 'b4wq' string and the campaign's e-mail.

This threat's campaign is new, and the '.setimichas1971@protonmail.com.b4wq File Extension' Ransomware may display additional features as its threat actor updates it. Likely attacks alongside infections include hijackings of the desktop's wallpaper, pop-ups, the erasing of any local backups (particularly, the Windows Shadow Volume Copies), and the disabling of security-useful tools like the Task Manager or Regedit. Dependable anti-malware products, if they're updated and active, should delete the '.setimichas1971@protonmail.com.b4wq File Extension' Ransomware before it accomplishes any of these attacks or locks your media.

Disregarding how easy it is to implement a hostile encryption feature in any program, reversing it via decryption is, often, arduous. The '.setimichas1971@protonmail.com.b4wq File Extension' Ransomware offers an accessible example of how easy it is for criminals to change the attacks of any file-locker Trojan just enough that it makes undoing them impossible.

Loading...