Home Malware Programs Ransomware Jhash Ransomware

Jhash Ransomware

Posted: November 10, 2017

Threat Metric

Ranking: 4,356
Threat Level: 1/10
Infected PCs: 4,024
First Seen: March 27, 2019
Last Seen: October 17, 2023
OS(es) Affected: Windows

The Jhash Ransomware is a Trojan that can block your files by converting them to encrypted equivalents that require decoding with the help of the threat actor's decryption key. Symptoms also seen during a Jhash Ransomware infection include changes to your wallpaper and the presence of text notes that provide details on paying the cybercrook for the above assistance. Malware experts recommend using other decryption solutions that are consistent with the Hidden Tear family of threats, in addition to uninstalling the Jhash Ransomware with anti-malware equipment.

When Judging Infections by Their Symptoms Provides Bad Intelligence

Many Trojans are quick to give away their identities by not bothering to obfuscate their code or the attacks their payloads deliver, but an equal amount of them also specialize in misinforming their victims. Modern examples of new, file-locking Trojans with mismatching symptoms and code include the Jhash Ransomware, a South American threat. Malware experts last saw this Trojan extorting money from PC users in Venezuela and delivering messages meant for Spanish-based targets.

The Jhash Ransomware is a variant of Hidden Tear, a project developed by the Turkish researcher Utku Sen for demonstrating harmful, file-encrypting attacks without any intention of deploying them. Like most versions of Hidden Tear, the Jhash Ransomware uses AES enciphering attacks to lock different formats of files on an infected PC automatically, including text documents, spreadsheets, slideshows, pictures and archives. The Jhash Ransomware's authors also include a deliberately misleading symptom: appending the '.locky' extension to this locked media, which, usually, signifies an attack from the '.locky File Extension' Ransomware.

Malware researchers observe different versions of the Jhash Ransomware dropping different, text-based ransom notes for the victim, all of which ask for ransoms of ten USD via the Payza online payment service. It makes all communications in Spanish solely and has yet to be seen targeting victims outside of South American regions. The Jhash Ransomware also downloads an Imgur-hosted image with another warning message that it uses for hijacking the desktop; the fact that the Trojan doesn't bundle it internally may offer its threat actor the possibility of swapping the picture dynamically.

Hashing out a Safe Route around a File-Locking Campaign

Its lack of a sophisticated, payment-processing infrastructure and a low price for unlocking the user's files are two particularly stark flags marking the Jhash Ransomware's campaign as being for recreational PC owners primarily, rather than government or corporate systems. Infection methods malware experts often see in use for distributing file-locking Trojans like the Jhash Ransomware include:

  • Torrents and other, piracy-related download sources may deliver installers for the Jhash Ransomware that pretend to be movies, video games, music, or other, illegal media.
  • Spammed e-mail messages may include links or attachments for exploits that install the Jhash Ransomware, often via a document or browser-based script.
  • Some threat actors also prefer attacking individual systems directly by compromising their network login combinations, with short, simple passwords being especially at risk from these brute-force attacks.

The Jhash Ransomware's symptoms also go some way towards misdirecting the victim towards inappropriate data-unlocking solutions. Only use decryption software compatible with Hidden Tear for restoring the files that the Jhash Ransomware damages, and always keep spare copies of your media to prevent the infliction of any harm that's irreversible. At current rates, four out of every six brands of anti-malware products should eliminate the Jhash Ransomware automatically and before it can damage any files.

Venezuela isn't the most expected target for the campaign of any file-locking threat, but national borders don't provide perfect safety from threatening software. For an open-source style Trojan like the Jhash Ransomware, where you live is much less relevant than whether or not you have backups.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%SYSTEMDRIVE%\Users\<username>\desktop\usosetup.exe File name: usosetup.exe
Size: 11.61 MB (11613032 bytes)
MD5: 890682fe942ba4e2e37e7e4068d6bc6a
Detection count: 1,925
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\desktop
Group: Malware file
Last Updated: October 17, 2023
Loading...