Threat Database Ransomware Desktop Ransomware

Desktop Ransomware

By GoldSparrow in Ransomware

The Desktop Ransomware is an encryption ransomware Trojan. The Desktop Ransomware's main targets seem to be individual, home computer users. The Desktop Ransomware, like most encryption ransomware Trojans, is mainly designed to keep the victim's files inaccessible and then demand a ransom payment from the victim. The Desktop Ransomware was first observed on November 1, 2018.

How the Desktop Ransomware Attacks a Computer

The Desktop Ransomware uses a strong encryption algorithm to make the victim's files inaccessible. The Desktop Ransomware targets the user-generated files, which may include a wide variety of media files, databases and document types. The files that threats like the Desktop Ransomware target in these attacks may include:

.jpg, .jpeg, .raw, .tif, .gif, .png, .bmp, .3dm, .max, .accdb, .db, .dbf, .mdb, .pdb, .sql, .dwg, .dxf, .cpp, .cs, .h, .php, .asp, .rb, .java, .jar, .class, .py, .js, .aaf, .aep, .aepx, .plb, .prel, .prproj, .aet, .ppj, .psd, .indd, .indl, .indt, .indb, .inx, .idml, .pmd, .xqx, .xqx, .ai, .eps, .ps, .svg, .swf, .fla, .as3, .as, .txt, .doc, .dot, .docx, .docm, .dotx, .dotm, .docb, .rtf, .wpd, .wps, .msg, .pdf, .xls, .xlt, .xlm, .xlsx, .xlsm, .xltx, .xltm, .xlsb, .xla, .xlam, .xll, .xlw, .ppt, .pot, .pps, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .sldx, .sldm, .wav, .mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4, .3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob, .m3u8, .dat, .csv, .efx, .sdf, .vcf, .xml, .ses, .qbw, .qbb, .qbm, .qbi, .qbr , .cnt, .des, .v30, .qbo, .ini, .lgb, .qwc, .qbp, .aif, .qba, .tlg, .qbx, .qby , .1pa, .qpd, .txt, .set, .iif, .nd, .rtp, .tlg, .wav, .qsm, .qss, .qst, .fx0, .fx1, .mx0, .fpx, .fxr, .fim, .ptb, .ai, .pfb, .cgn, .vsd, .cdr, .cmx, .cpt, .csl, .cur, .des, .dsf, .ds4, , .drw, .eps, .ps, .prn, .gif, .pcd, .pct, .pcx, .plt, .rif, .svg, .swf, .tga, .tiff, .psp, .ttf, .wpd, .wpg, .wi, .raw, .wmf, .txt, .cal, .cpx, .shw, .clk, .cdx, .cdt, .fpx, .fmv, .img, .gem, .xcf, .pic, .mac, .met, .pp4, .pp5, .ppf, .nap, .pat, .ps, .prn, .sct, .vsd, .wk3, .wk4, .xpm, .zip, .rar.

The Desktop Ransomware will mark the damaged files with the string 'Lock.' added as a prefix to the affected file's name. This is a departure from most encryption ransomware Trojan naming schemes, which add a new string to the end of the affected files' names as a new extension rather than to the beginning.

The Desktop Ransomware’s Ransom Demands

The Desktop Ransomware will change the infected computer's desktop background imageThe Desktop Ransomware will replace this image with a red skull over a black screen. This image will contain the following text:

The Desktop Ransomware displays a ransom note in the form of a program window that is titled 'Desktop Ransomware.' The Desktop Ransomware ransom note contains the following message:

'Welcome in
the Desktop Ransomware
Oooooops All your files on the desktop
are encrypted To decrypt files enter PIN
see you soon
Enter PIN
PIN = [TEXT BOX]
[Decryption|BUTTON]
[Get PIN|BUTTON]'

Clicking on the 'Get PIN' button leads computer users to a Facebook page that has been since removed. The PIN used by the Desktop Ransomware was recovered easily so that computer users can, fortunately, restore their data after a Desktop Ransomware attack.

Restoring Your Data from a Desktop Ransomware Attack

Computer users can restore their data by entering the following PIN code:

00114455220033669988554477++//

Since most of these threats are delivered in association with other malware and hoaxes, once the files have been restored, malware researchers strongly advise computer users to perform a full scan of their machines using a reliable, fully updated anti-malware program. It also is primordial to take precautions and have file backups since in most ransomware attacks it is not so simple to restore the files that have been compromised (and in most cases, the files may be lost permanently).

SpyHunter Detects & Remove Desktop Ransomware

File System Details

Desktop Ransomware may create the following file(s):
# File Name MD5 Detections
1. file.exe c013c2911340d6d29325254cf72d4e42 0

Related Posts

Trending

Most Viewed

Loading...