Threat Database Ransomware Al-Namrood Ransomware

Al-Namrood Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 539
First Seen: September 30, 2016
Last Seen: March 9, 2023
OS(es) Affected: Windows

The Al-Namrood Ransomware is a ransomware Trojan that seems to target computer users in Saudi Arabia. The Al-Namrood Ransomware makes a pop culture mention in its attack, referencing a black metal music band from Saudi Arabia. The use of the pop culture reference is not uncommon in these attacks, having been observed ransomware attacks that referenced Harry Potter, Pokemon Go, and Batman recently. Because of the reference to this particular band, it is likely that the creators or operators of theAl-Namrood Ransomware Trojan are based in Saudi Arabia or have some connection with this country. Ransomware Trojans target, practically, every region in the world. Ransomware Trojans also vary wildly in the severity of the attack, with some being relatively simple to recover from while others use sophisticated attacks that can be nearly impossible to recover from. Computer users should remove the Al-Namrood Ransomware with the help of a reliable security application that is fully up-to-date and restore all files encrypted by the Al-Namrood Ransomware from a backup.

How the Al-Namrood Ransomware Attacks Your Computer

Like most other ransomware Trojans, the Al-Namrood Ransomware encrypts its victims' files and takes them hostage. The Al-Namrood Ransomware may be distributed by using corrupted email attachments or compromised links distributed through social media. After the Al-Namrood Ransomware enters a computer, it will operate in the background, searching for certain file types to encrypt. Some of the file types that the Al-Namrood Ransomware targets in its attack include:

1cd, dbf, dt, cf, cfu, mxl, epf, kdbx, erf, vrp, grs, geo, st, pff, mft, efd, 3dm, 3ds, rib, ma, sldasm, sldprt, max, blend, lwo, lws, m3d, mb, obj, x, x3d, movie.byu, c4d, fbx, dgn, dwg, 4db, 4dl, 4mp, abs, accdb, accdc, accde, accdr, accdt, accdw, accft, adn, a3d, adp, aft, ahd, alf, ask, awdb, azz, bdb, bib, bnd, bok, btr, bak, backup, cdb, ckp dsk, dsn, dta, dtsx, dxl, eco, ecx, edb, emd, eql, fcd, fdb, fic, fid, fil, fm5, fmp, fmp12, fmpsl, fol, fp3, fp4, fp5, fp7, fpt, fpt, fzb, fzv, gdb, gwi, hdb, his, ib.

The Al-Namrood Ransomware targets files of all types but tends to prefer media files and documents that could have special value to its victims. the Al-Namrood Ransomware uses the AES encryption to encrypt the files, encrypting the generated key and storing it on its Command and Control servers, away from the victim. The files encrypted by the Al-Namrood Ransomware can be identified because their extensions will have been changed to '.namrood.' The Al-Namrood Ransomware will drop text files named 'Decrypt_me.txt' in every directory where it encrypts files. These text files contain information on how to pay the ransom to recover the data, which is now inaccessible. Computer users shouldn't pay this ransom since it is unlikely that the con artists responsible for the Al-Namrood Ransomware attack will keep their promise and allow victims to recover their files after the ransom amount is paid.

Infection Vectors Used by the Al-Namrood Ransomwar

There are many ways to distribute ransomware like the Al-Namrood Ransomware. The most common way of distributing this Trojan is through the use of corrupted email attachments contained in spam email messages. These communications may use social engineering techniques to trick inexperienced computer users into opening the corrupted file attachment. For example, the email may seem to be a shipping invoice or a financial statement from a bank. When the file is opened, it may even display this data, while carrying out its attack in the background. This is why computer users should be extremely wary of unsolicited email attachments. If one of these emails comes from an email contact, that person may have been compromised; PC security analysts advise contacting that person directly to double-check the contents of the file before opening it.

Trending

Most Viewed

Loading...