Threat Database Ransomware ABOUT FILES! Ransomware

ABOUT FILES! Ransomware

By GoldSparrow in Ransomware
Translate To:

Threat Scorecard

Popularity Rank: 13,143
Threat Level: 80 % (High)
Infected Computers: 12,439
First Seen: June 18, 2015
Last Seen: December 31, 2025
OS(es) Affected: Windows

The ABOUT FILES! Ransomware is a ransomware infection that will encrypt the victim's files and block all access to the infected computer. If you find a text file named ABOUT FILES! in every folder on your computer and your files renamed to include the string 'error_,' this indicates that your computer has become infected with the ABOUT FILES! Ransomware. This is caused by a Trojan that is distributed online using typical threat distribution methods (such as spam email messages and attack websites). Ransomware infections like the ABOUT FILES! Ransomware have become increasingly popular as a way of forcing computer users to pay hefty ransoms. Although the ABOUT FILES! Ransomware, like traditional viruses and Trojans, can be removed using a reliable security program, the victim's files will remain encrypted, requiring payment for a decryption key. Unfortunately, encryption carried out by ransomware infections like the ABOUT FILES! Ransomware is nearly impossible to break without the encryption key, meaning that the best protection against a threat like the ABOUT FILES! Ransomware is to keep a backup of any important files on a computer as a preventive measure.

The Damaging Consequences of the ABOUT FILES! Ransomware and Similar Infections

The ABOUT FILES! Ransomware is designed to take a computer hostage, preventing computer users from accessing their files. The ABOUT FILES! Ransomware essentially prevents computer users to retrieve the affected files if they do not possess the decryption algorithm. The ABOUT FILES! Ransomware uses a characteristic ransom note, which reads as follows:

'Hi guys! We have bad news for you.
Your files have been crypted by 2 popular alghoritms - AES and RSA. Only we have private RSA key
All crypted files now starting with "error_":

You can buy our decryptor that will recover all your files. You need:
1) Send us 3 bitcoins on our bitcoin address [edited] (Now 1 bitcoin approximately = 230 usd)
Only we and you know about this address, so we will understand that its your payment.
2) Send us your unique identificator on our mail dogdog@ruggedinbox.com
3) Wait 1,2... or 24 hours and we will send you decryptor (it is very easy to use it - you
need only run decryptor executable file and wait 5-10 hours and all files will be decrypted)

If we dont anwser on your letter more than 1 day then make your own mail account on www.ruggedinbox.com
(This action is very simple and takes 1-2 minutes) and send us your letter again
(some mail servers (for example hotmail.com and outlook.com) blocking letters to www.ruggedinbox.com)

Your unique identificator: [edited]

You can use one of those sites to change your money to bitcoins:
www.btc.my
www.cryptomarket.my
https://bitx.my/market
www.bitcoinmalaysia.com
www.goldux.com
www.kraken.com
www.bitquick.co
www.howtobuybitcoins.info
www.bestchange.com

You dont need install any bitcoin software - you need only find bitcoin exchange service (also you can try find it here for your country - www.google.com)

Additional information: before payment you can send us one small file (not bigger than 300Kb).
and we will decrypt it before payment (also you need send us your unique identificator).
After that, we think that it will be evedent that we have the program that can decrypt your files.

We dont want to destroy your files! We only need some money!'

Note the huge amount of the ransom. While most ransomware attacks previously asked for one Bitcoin in payment, the ABOUT FILES! Ransomware has jumped all the way to three Bitcoin! In some cases, it is possible to retrieve the encrypted files using special tools such as a Shadow Volume Explorer. However, in most cases the files encrypted by the ABOUT FILES! Ransomware are completely inaccessible. Unfortunately, computer users have no guarantee that the people responsible for the ABOUT FILES! Ransomware attack will follow through on their promise to restore the encrypted files after the ransom is paid.

Preventing the ABOUT FILES! Ransomware Attacks

Our PC security analysts strongly advise computer users to take steps to protect themselves from ransomware in the future. Attacks like the ABOUT FILES! Ransomware can be prevented or ameliorated if computer users take the following steps:

  1. Keep adequate backups of all important files on a different system or the cloud.
  2. Exercise caution when browsing the Web and avoid suspicious websites or opening unknown links and files.
  3. Use a reliable security program that is always up-to-date to protect your computer from attacks.

Analysis Report

General information

Family Name: Trojan.Malpack.CCJ
Signature status: No Signature

Known Samples

MD5: 66f2efb4172581971a8e75c50134a4bf
SHA1: 7b3477a1fa49ba6c0b19aaeaddedeab680c6e13c
SHA256: FAA27B74215AC29C98C4812E92F4925D0A68A58BB94302F32D27472C68C05744
File Size: 513.54 KB, 513536 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have relocations information
  • File doesn't have security information
  • File has exports table
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Copyright Copyright (C) 2020, fotc
File Versiones 1.0.0.1

File Traits

  • HighEntropy
  • x86

Block Information

Total Blocks: 533
Potentially Malicious Blocks: 5
Whitelisted Blocks: 522
Unknown Blocks: 6

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 2 0 0 0 0 0 0 0 0 1 0 0 1 1 0 0 1 0 0 0 2 2 0 0 1 0 0 0 0 0 1 1 0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 1 1 1 3 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 1 0 0 0 0 0 0 0 1 1 0 2 3 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 1 1 0 0 1 0 0 2 2 0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 1 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 x x x ? ? ? ?
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Trending

Most Viewed

Loading...