Threat Database Ransomware ABC Ransomware

ABC Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Threat Level: 20 % (Normal)
Infected Computers: 16
First Seen: June 11, 2021
Last Seen: October 19, 2022
OS(es) Affected: Windows

The ABC Ransomware is a typical ransomware encryption Trojan. The ABC Ransomware uses the AES 256 encryption to make the victims' files inaccessible. The ABC Ransomware seems to be a variant in the Globe family of ransomware Trojans. The ABC Ransomware, like many similar threats, is delivered to the victim through spam email messages with damaged file attachments.

How the ABC Ransomware Attacks a Computer

Using a combination of the AES and RSA encryptions, the ABC Ransomware makes the victim's files inaccessible and reports to its Command and Control servers online. This means that the decryption key will be away from the reach of the victims, security software or malware researchers. The ABC Ransomware encrypts the user-generated files, targeting a wide variety of file types, which include media, documents, and various other commonly used file types. The ABC Ransomware will mark the encrypted files with a string of eight random characters that are added as a file extension at the end of the file's names. The file types that may be targeted in threat attacks similar to the ABC Ransomware are:

.3dm, .3g2, .3gp, .7zip, .aaf, .accdb, .aep, .aepx, .aet, .ai, .aif, .as, .as3, .asf, .asp, .asx, .avi, .bmp, .c, .class, .cpp, .cs, .csv, .dat, .db, .dbf, .doc, .docb, .docm, .docx, .dot, .dotm, .dotx, .dwg, .dxf, .efx, .eps, .fla, .flv, .gif, .h, .idml, .iff, .indb, .indd, .indl, .indt, .inx, .jar, .java, .jpeg, .jpg, .js, .m3u, .m3u8, .m4u, .max, .mdb, .mid, .mkv, .mov, .mp3, .mp4, .mpa, .mpeg, .mpg, .msg, .pdb, .pdf, .php, .plb, .pmd, .png, .pot, .potm, .potx, .ppam, .ppj, .pps, .ppsm, .ppsx, .ppt, .pptm, .pptx, .prel, .prproj, .ps, .psd, .py, .ra, .rar, .raw, .rb, .rtf, .sdf, .sdf, .ses, .sldm, .sldx, .sql, .svg, .swf, .tif, .txt, .vcf, .vob, .wav, .wma, .wmv, .wpd, .wps, .xla, .xlam, .xll, .xlm, .xls, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .xqx, .xqx, .zip.

The ABC Ransomware's Ransom Demand

The ABC Ransomware delivers its ransom note in a file named 'READ_IT.html' on the infected computer's desktop. This file urges the victim to connect to a Dark Web website using TOR, where they are invited to purchase a program named 'ABC Decryptor™' and offered the option of uploading and decrypting a single file. However, paying the ransom or establishing contact with these people is not the right choice. Instead, file backups should be used to restore affected files and a dedicated security suite used to remove the ABC Ransomware infection itself. The ransom message used by the ABC Ransomware reads:

'All your files have been encrypted!
You have to pay for decryption in Bitcoins. The price depends on how fast you write to us. After payment, we will send you the decryption tool that will decrypt all your files.
Decryption as guarantee
Your documents, photos, databases and other important files have been encrypted cryptographically strong, without the original key recovery is impossible! To decrypt your files you need to buy the special software - "DECRYPTER" Using another tools could corrupt your files, in case of using third party software we dont give guarantees that full recovery is possible so use it on your own risk. If you want to restore files, go to on our site: 1) Download TOR-Browser (hxxps://www.torproject.org/download/download) 2) Run it 3) Go to hxxp://cr7icbfqm64hixta.onion
How to obtain Bitcoins
The easiest way to buy bitcoins is LocalBitcoins site. You have to register, click 'Buy bitcoins', and select the seller by payment method and price.
hxxps://localbitcoins.com/buy_bitcoins
Also you can find other places to buy Bitcoins and beginners guide here:
hxxp://www.coindesk.com/information/how-can-i-buy-bitcoins/
Attention!
Wait from us for reply to your mail within 48 hours.
Do not try to decrypt your data using third party software, it may cause permanent data loss.
Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.
Your personal ID: [EDITED]'

Refrain from following the instructions in the above ransom note so as not to support these people in creating and developing new ransomware Trojans.

Related Posts

Trending

Most Viewed

Loading...