Home Malware Programs Ransomware ‘.surprise File Extension’ Ransomware

‘.surprise File Extension’ Ransomware

Posted: March 14, 2016

Threat Metric

Threat Level: 8/10
Infected PCs: 91
First Seen: March 14, 2016
OS(es) Affected: Windows

The '.surprise File Extension' Ransomware is a file encryption Trojan that attacks your data in hopes of forcing you to pay a ransom fee. These ransoms have no supporting legal authority or any guarantee that the con artists will provide a solution to their first attacks, and malware researchers don't encourage paying them. Most anti-malware products should be capable of identifying typical file encryptors, and other data recovery strategies can be put into play after you delete the '.surprise File Extension' Ransomware.

A not so Pleasant Surprise for Your File System

Although the new year has brought some surprises for malware researchers, other elements of threat campaigns remain very traditional, based on derivatives of tried-and-true Trojan design. March has seen the emergence of another Trojan based on old file encrypting attacks: the '.surprise File Extension' Ransomware. For the victim, the most noticeable changes are updates to the name of the extensions associated with it, as well as a new ransom instruction, although the '.surprise File Extension' Ransomware's main attacks still are as capable as those of past file encryptors.

The '.surprise File Extension' Ransomware's body, the 'surprise.exe' executable file, uses one form of encryption to block itself from being identified. It includes a corresponding loader that decrypts its base64 string before launching the Trojan. A completed payload lets the '.surprise File Extension' Ransomware use another encryption technique against file data on the compromised PC, simultaneously making the files unreadable while also adding the '.surprise' file extension to their names. Unsurprisingly, this visual change of file format doesn't have any relationship with any real file format conversion.

The '.surprise File Extension' Ransomware finishes its attack by dropping two Notepad files on your hard drive. The texts include instructions for purchasing a decryption service from the fraudsters administering the '.surprise File Extension' Ransomware through Bitcoin (a preferred currency for illicit activities in general, and especially ransomware campaigns). Unlike the campaigns of past file encryptors, malware researchers note that the '.surprise File Extension' Ransomware's con artists are open to haggling, and may ask for a ransom fee ranging from 200 to 10,000 USD in value.

Packing a Surprise Trojan Back in Its Box

Some versions of the '.surprise File Extension' Ransomware may make use of file archives, such as .ZIP bundles, for protecting themselves from detection by various security tools. Nevertheless, malware researchers have found that many, major brands of anti-malware software can identify the '.surprise File Extension' Ransomware, albeit often by heuristic titles, such as Gen:Variant.MSILPerseus.14499 or Gen:Variant.Barys.51812. Installers may distribute themselves through e-mail attachments, corrupted websites or pirated downloads.

If your PC is compromised by the '.surprise File Extension' Ransomware before the threat is detected, act under the assumption that third parties may have backdoor access to your system. Remove the '.surprise File Extension' Ransomware with the anti-malware software of your choosing, and change any passwords that could be used to access your accounts.

Recovering any lost information or files can be attempted after uninstalling the '.surprise File Extension' Ransomware. While paying ransom fees to con artists offers only a slim chance of getting any data restored, malware researchers find that you can achieve better odds against file encryptors by using public domain decryptor tools and sensible backups.

Loading...