Threat Database Ransomware ACCDFISA v2.0 Ransomware

ACCDFISA v2.0 Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Popularity Rank: 7,267
Threat Level: 80 % (High)
Infected Computers: 5,389
First Seen: October 27, 2017
Last Seen: January 23, 2026
OS(es) Affected: Windows

The ACCDFISA v2.0 Ransomware is an encryption ransomware Trojan that is in its second release. The first version of the ACCDFISA v2.0 Ransomware was active in February of 2012 so that the ACCDFISA v2.0 Ransomware seems to be quite an old ransomware family. The original version of the ACCDFISA v2.0 Ransomware carried out a typical scareware tactic that was popular at that time. The ACCDFISA v2.0 Ransomware uses an updated attack method that involves encryption algorithms, which are favored by most modern encryption ransomware Trojans. Like other encryption ransomware Trojans, the ACCDFISA v2.0 Ransomware is designed to encrypt the victim's files and then require a ransom in exchange for the decryption key needed to recover the infected files. The ACCDFISA v2.0 Ransomware is delivered using corrupted spam email messages, which may use social engineering tactics to induce computer users into opening a corrupted attachment, which includes corrupted macro scripts that download and install the ACCDFISA v2.0 Ransomware unto the victim's computer.

The ACCDFISA v2.0 Ransomware Hides Its Activities

The ACCDFISA v2.0 Ransomware is installed on the AppData folder and carries out a typical encryption ransomware Trojan attack, encrypting the user-generated files while avoiding Windows system files (these threats need Windows to remain functional so that they can deliver a ransom note to the victim and have the victim pay the ransom). The following are examples of the file types that are encrypted in attacks like the ACCDFISA v2.0 Ransomware:

.3gp, .7z, .apk, .avi, .bmp, .cdr, .cer, .chm, .conf, .css, .csv, .dat, .db, .dbf, .djvu, .dbx, .docm, ,doc, .epub, .docx .fb2, .flv, .gif, .gz, .iso .ibooks,.jpeg, .jpg, .key, .mdb .md2, .mdf, .mht, .mobi .mhtm, .mkv, .mov, .mp3, .mp4, .mpg .mpeg, .pict, .pdf, .pps, .pkg, .png, .ppt .pptx, .ppsx, .psd, .rar, .rtf, .scr, .swf, .sav, .tiff, .tif, .tbl, .torrent, .txt, .vsd, .wmv, .xls, .xlsx, .xps, .xml, .ckp, .zip, .java, .py, .asm, .c, .cpp, .cs, .js, .php, .dacpac, .rbw, .rb, .mrg, .dcx, .db3, .sql, .sqlite3, .sqlite, .sqlitedb, .psd, .psp, .pdb, .dxf, .dwg, .drw, .casb, .ccp, .cal, .cmx, .cr2.

The ACCDFISA v2.0 Ransomware will inject its processes into legitimate file processes to hide its activities. However, the ACCDFISA v2.0 Ransomware also will create an executable file named 'Decrypt.exe' in a directory named 'Decrypt' on the main system drive. After encrypting the victim's files, this executable file runs and delivers a ransom note.

The ACCDFISA v2.0 Ransomware’s Ransom Note

The ACCDFISA v2.0 Ransomware's ransom note is delivered in a program window that is named 'Malware protection' and launched by the executable file mentioned above. This program window contains the following message:

'Warning! Access to your computer is limited and all your important files has been decrypted with AES-256-KEY.
A mailing (spam) was detected on your computer that was sending a very dangerous polymorphic virus, which contradicts the law and harms other network users. Your computer has been also infected by this very dangerous polymorphic virus, which modifies itself every 24 hours and in this case virus detection by antiviruses is very difficult.
You need to buy and send an sms with MoneyPak or Paysafecard or Ukash code ($300 or 300 euros) and your Reference Number to our special service phone number or email.
After that, our experts within 1-3 hours will perform an audit to clean up your computer from this very dangerous polymorphic and send you sms on the cell phone or email (from which you sent the code and reference number) password (which unlocks your computer and decrypts your files) and this must be entered below.'

However, there is no truth to this message, which claims that it is there to protect you from threats. Fortunately, a decryption program for the ACCDFISA v2.0 Ransomware has been released and is available at the following link:

Karwos[.]net/accdfisa20/

It is likely that the con artists will update the ACCDFISA v2.0 Ransomware eventually to bypass the current access to a decryption program.

Analysis Report

General information

Family Name: Trojan.Blackmoon.A
Packers: UPX!
Signature status: No Signature

Known Samples

MD5: 8051c86d897bf4b1fc13ba886a14dee9
SHA1: 40f23ca8da2d9c82fb92e29d7bbc26b87a87aa68
SHA256: 5ECA3D0B67DE81C5057225294E0BCD60EDE50609F5DF4ADCDEDA2750FB75E493
File Size: 8.94 MB, 8937230 bytes
MD5: a004f4e14a84b89ea74272c3b860baa4
SHA1: 57d97c44c359948c6bd362e29eeda2a04054f7e2
SHA256: 5E804EE6D5A51DB969C97B866A03E68F1A7DDD0094CBB91E7D832F7FF3A0FB6E
File Size: 40.96 KB, 40960 bytes
MD5: 326b873b5863f30991745276d01b111b
SHA1: 377814953aa0dcb0e3c7c1048034d38ee1d059dc
SHA256: 6EB67922254BF1E6DEF3FB947F373E70BE0DC09508DB40235470D8C3A3F28A93
File Size: 1.40 MB, 1397760 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have resources
  • File doesn't have security information
  • File has been packed
  • File has exports table
  • File is 32-bit executable
  • File is either console or GUI application
Show More
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
File Version 1.00
Internal Name TJprojMain
Original Filename TJprojMain.exe
Product Name Project1
Product Version 1.00

File Traits

  • 2+ executable sections
  • dll
  • HighEntropy
  • packed
  • themida
  • themida section variant
  • UPX!
  • x86

Block Information

Total Blocks: 2,625
Potentially Malicious Blocks: 1,031
Whitelisted Blocks: 272
Unknown Blocks: 1,322

Visual Map

? x x ? ? 0 ? ? ? ? ? ? 0 0 ? ? ? ? ? ? ? 0 ? ? ? x x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? ? x x ? x x ? ? ? ? ? ? ? x ? ? ? x x ? x ? 0 ? ? ? 0 ? 0 x ? ? x 0 x 0 0 ? x x 0 x ? ? x ? ? ? ? x 0 0 0 x x x x x x x x x x x 0 0 ? x x ? x ? ? ? 0 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x x x x x x x x x x ? ? x ? x x x x x x ? x 0 ? ? x ? ? ? ? ? ? ? x ? ? ? ? ? ? 0 ? x x x x 0 x x x ? x ? ? ? ? ? ? ? x ? ? ? ? ? x x x x x x x x x ? x ? ? x ? x x ? ? ? ? ? ? x x x x x x ? x ? ? ? ? ? x ? ? ? ? ? ? ? x ? ? x ? ? x ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? x ? x ? ? ? ? x ? ? x ? x ? x ? x ? x ? x ? x ? x ? x ? x x x 0 ? ? 0 ? x ? x x x ? x ? ? x ? x ? ? ? x x ? x ? ? ? ? ? ? ? x x ? ? x x ? x ? ? ? ? x x ? ? x ? x x x x ? ? x ? ? ? x ? ? x ? ? ? x ? ? ? ? x ? x x ? 0 ? ? ? x ? ? ? ? ? x x x x x x x x x 0 ? x x ? ? ? x ? ? ? ? ? ? 0 ? ? x ? ? x ? ? ? x x ? x x 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? x x ? x ? x ? x ? x x ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? x ? ? ? ? x ? x ? 0 ? ? x ? x ? ? ? x x ? ? ? ? ? ? ? ? ? ? x x x ? ? 0 ? ? x ? x ? x ? ? x ? ? x ? ? ? x ? ? ? ? ? ? ? ? ? 0 ? ? ? x ? x x x x ? ? ? ? ? ? ? x x x x ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? x ? x ? ? ? ? x ? ? ? x 0 ? 0 ? x ? x ? ? ? ? x ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? x 0 ? x ? ? x ? x ? 0 ? ? ? ? ? ? x x ? ? ? 0 ? ? x ? 0 ? 0 ? x ? ? ? ? ? 0 ? x 0 ? ? x ? x ? x x 0 ? ? x 0 x 0 ? x ? x ? ? ? ? x ? ? ? x x ? ? x ? ? ? ? ? x ? x ? ? ? ? ? ? ? ? x x ? x ? ? ? x ? x ? x ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? ? ? x x ? ? ? ? ? ? ? x ? ? x ? ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? x ? ? ? x ? ? ? ? ? ? ? ? x ? x ? ? ? ? x x x x x x x x x ? ? 0 x 0 ? ? ? ? ? ? ? ? ? ? x x x x ? ? x x ? x ? 0 ? x ? x x x x x x x x ? ? x x x ? ? x ? x ? x x ? x ? x x x x x x x x ? x x x x x ? x x x ? x x x x x x x x x ? x x x ? x x x x x x x x x ? x x x x x x x x x ? x x ? x x ? x x x x x x x x ? ? x x 0 x x 0 x x ? x x ? 0 x x x ? x x ? ? 0 x ? x ? x ? 0 x x ? ? x ? x ? ? ? x ? ? ? x x x ? x x x x ? x ? x ? ? ? x ? x x x ? ? ? ? x x x ? x ? x x x x x x x x x x ? x x x x x x x x x x x x x x x x x x x x 0 x x x x x 0 x x x x x x x x x x x x x x x x 0 x x x x x x x x 0 x x x x x x x 0 0 x x x x x x x x x ? x ? x x x x x x x x x x x x x ? x ? ? ? ? ? ? x x x x x x x x x x x x x x x x x x x x x ? x x x x x x x x x x x x x x x x x ? ? 0 x x x x x x x x x x x x x x x x x x x ? x x x x ? x ? ? ? x x ? x ? x x ? x x x x x x x x x x x x x x x ? x x x x x x x x x x x x x x x x x x x x x x x ? ? ? ? ? x x ? x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x ? x x x x x x x x x x x x x x x x x x x x x x x x x x x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x x ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? x x x x x ? x ? 0 x x x x x x ? ? ? ? 0 0 0 ? ? ? x x x x ? x x x x x ? ? ? ? x x x x x ? ? ? x 0 x x x ? ? ? ? ? ? ? ? ? ? ? ? ? x ? 0 ? ? x ? ? ? ? x x 0 x x ? ? ? ? ? ? ? ? ? ? ? ? x x ? ? ? x x x x x x x x x ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? x ? x x x x ? x x ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? x x ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? x ? ? x ? ? ? ? x ? x x ? ? ? ? x ? ? ? ? ? ? ? ? ? x x x ? x ? ? ? ? ? ? ? x x x 0 x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x ? x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 x x x x x x 0 x x x 0 x x x x x x x x x x 0 0 x 0 x x x x 0 0 x x x 0 0 0 x x x x x x x x 0 1 x x x x x x x x x 0 x x x x x x x 0 x x x x x x 0 x x x x x x x x ? x ? x x x x x x x x 1 x x 0 x 0 x x x x x ? x 0 x x x x x x 0 0 x x 0 0 0 x 0 1 0 x x x x x x x x x ? 0 x 0 x x x x 0 x x 0 x x x x x x 0 x x x x x x x x 0 0 0 0 x x x x x 0 x 0 x ? ? x x x x x x x ? 0 ? x x x x x 0 x 0 ? 0 x ? ? ? ? ? 0 ? ? ? x ? ? 0 x x x ? ? x ? ? ? ? ? x 0 x ? x ? ? ? x ? ? ? ? x ? ? ? ? ? 0 ? ? ? ? ? ? ? x x x x x x x x x x x ? ? ? ? ? ? x ? ? ? ? 0 x ? x ? x x x ? ? ? x ? x ? ? ? ? x x 0 ? x ? ? 0 x ? ? ? ? x ? ? 0 ? ? ? ? ? ? x ? ? ? ? ? ? ? ? x 0
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
c:\users\user\adb.exe Generic Write,Read Attributes

Windows API Usage

Category API
Other Suspicious
  • SetWindowsHookEx
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtQueryAttributesFile
Show More
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Anti Debug
  • NtQuerySystemInformation

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\57d97c44c359948c6bd362e29eeda2a04054f7e2_0000040960.,LiQMAxHB
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\377814953aa0dcb0e3c7c1048034d38ee1d059dc_0001397760.,LiQMAxHB

Trending

Most Viewed

Loading...