Threat Database Ransomware Anatova Ransomware

Anatova Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 4
First Seen: January 24, 2019
Last Seen: October 30, 2020
OS(es) Affected: Windows

The Anatova Ransomware is an encryption ransomware Trojan. This means that the Anatova Ransomware is designed to carry out an attack that involves taking the victim's files hostage by enciphering them with a strong encryption algorithm. The Anatova Ransomware then demands a ransom payment in exchange for supposedly restoring access to the compromised data.

Although Very Common, the Anatova Ransomware can Cause a Lot of Damage

The Anatova Ransomware uses the AES encryption to make the victim's files inaccessible. The Anatova Ransomware demands a ransom payment in DASH, a cryptocurrency, and delivers its ransom note as a text file named 'ANATOVA.TXT' dropped on the infected computer. The Anatova Ransomware targets the user-generated files in its attack, which may include a wide variety of types that may include media files, databases, configuration files and numerous others. Threats like the Anatova Ransomware target the files specified below in these attacks:

.jpg, .jpeg, .raw, .tif, .gif, .png, .bmp, .3dm, .max, .accdb, .db, .dbf, .mdb, .pdb, .sql, .dwg, .dxf, .cpp, .cs, .h, .php, .asp, .rb, .java, .jar, .class, .py, .js, .aaf, .aep, .aepx, .plb, .prel, .prproj, .aet, .ppj, .psd, .indd, .indl, .indt, .indb, .inx, .idml, .pmd, .xqx, .xqx, .ai, .eps, .ps, .svg, .swf, .fla, .as3, .as, .txt, .doc, .dot, .docx, .docm, .dotx, .dotm, .docb, .rtf, .wpd, .wps, .msg, .pdf, .xls, .xlt, .xlm, .xlsx, .xlsm, .xltx, .xltm, .xlsb, .xla, .xlam, .xll, .xlw, .ppt, .pot, .pps, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .sldx, .sldm, .wav, .mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4, .3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob, .m3u8, .dat, .csv, .efx, .sdf, .vcf, .xml, .ses, .qbw, .qbb, .qbm, .qbi, .qbr , .cnt, .des, .v30, .qbo, .ini, .lgb, .qwc, .qbp, .aif, .qba, .tlg, .qbx, .qby , .1pa, .qpd, .txt, .set, .iif, .nd, .rtp, .tlg, .wav, .qsm, .qss, .qst, .fx0, .fx1, .mx0, .fpx, .fxr, .fim, .ptb, .ai, .pfb, .cgn, .vsd, .cdr, .cmx, .cpt, .csl, .cur, .des, .dsf, .ds4, , .drw, .eps, .ps, .prn, .gif, .pcd, .pct, .pcx, .plt, .rif, .svg, .swf, .tga, .tiff, .psp, .ttf, .wpd, .wpg, .wi, .raw, .wmf, .txt, .cal, .cpx, .shw, .clk, .cdx, .cdt, .fpx, .fmv, .img, .gem, .xcf, .pic, .mac, .met, .pp4, .pp5, .ppf, .nap, .pat, .ps, .prn, .sct, .vsd, .wk3, .wk4, .xpm, .zip, .rar.

Typically, the Anatova Ransomware will be delivered to the victim through spam email messages, although there are numerous other ways in which threats like the Anatova Ransomware can be delivered, which include fake software downloads and tampered online advertisements. Once the Anatova Ransomware has been installed and the victim's files compromised, the Anatova Ransomware delivers the following message in its ransom note:

'All your files are crypted. Only us can decrypt your files, you need pay 10 DASH in the address:
XpRvUwSjSeHfJqLePsRfQtCKa1VMwaXh12
After the payment send us the address used to make the payment to one of these mail addresses:
anatova2@tutanota.com
anatoday@tutanota.com
Later wait for our reply with your decryptor. If you want can send us ONE JPG FILE ONLY max 200kb to decrypt per free before of payment.
Dont try fuck us, in this case you NEVER will recover your files. Nothing personal, only business.
Send this file untouched with your payment or/and free file!'

Preventing the Anatova Ransomware Attacks

Unfortunately, you cannot recover the files encrypted by the Anatova Ransomware at this time. Because of this, it is paramount that computer users take measures to prevent this and similar attacks. The best prevention method is to have backup copies of all data, preventing the criminals from having any leverage to enable them to demand a ransom payment. If the copies are kept on the cloud or an external memory device, then the victim can simply delete the compromised files and the Anatova Ransomware itself and restore any compromised data by replacing it with the backup copy. Apart from having file backups, PC security researchers also advise that computer users should have a security program that is always updated and capable of detecting and removing the Anatova Ransomware before it can carry out its attack.

SpyHunter Detects & Remove Anatova Ransomware

File System Details

Anatova Ransomware may create the following file(s):
# File Name MD5 Detections
1. file.exe 2a0da563f5b88c4d630aefbcd212a35e 0

Trending

Most Viewed

Loading...