Erenahen Ransomware

Erenahen Ransomware Description

Cybersecurity researchers are struggling to keep up with all the new file-encrypting Trojans that are popping up on a daily basis. It appears that the 'business' of ransomware threats is thriving and the entry barrier is very low as even shady actors with little to no experience can create a data-locking Trojan by simply borrowing the code of an already established ransomware threat and altering it slightly.

Infection and Encryption

This appears to be the case of the file-encrypting Trojan in question today – the Erenahen Ransomware. When malware researchers studied this threat, they discovered that it might belong to the GlobeImposter Ransomware family. If the Erenahen Ransomware infiltrates your machine, it will start the attack by performing a brief scan of the data. The objective is to determine the locations of the files, which are considered of interest to this threat. The next step is the encryption process. The Erenahen Ransomware will use an encryption algorithm to lock all the targeted files. Once this threat locks a file, it also changes its name by appending the '.Erenahen' extension at the end of the filename. For example, an audio file called 'dream.mp3' will be renamed to 'dream.mp3. Eranahen' after the encryption process is completed.

The Ransom Note

Then, the Erenahen Ransomware drops its ransom note. The note is called 'How_to_open_files.html' and reads:

’Your files are encrypted!
What happened?
Your files are encrypted, and currently unavailable.
You can check it: all files on you computer has new expansion.
By the way, everything is possible to recover (restore), but you need to buy a unique decryptor.
Otherwise, you never cant return your data.

For purchasing a decryptor contact us by email:
If you will get no answer within 24 hours contact us by our alternate emails:

What guarantees?
Its just a business. If we do not do our work and liabilities - nobody will not cooperate with us.
To verify the possibility of the recovery of your files we can decrypted 1 file for free.
Attach 1 file to the letter (no more than 10Mb). Indicate your personal ID on the letter:
ï Attempts of change files by yourself will result in a loose of data.
ï Our e-mail can be blocked over time. Write now, loss of contact with us will result in a loose of data.
ï Use any third party software for restoring your data or antivirus solutions will result in a loose of data.
ï Decryptors of other users are unique and will not fit your files and use of those will result in a loose of data.
ï If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key.’

As you can see, the criminals have provided two emails to the user – '' and alternatively '' As proof that they have a functional decryption key, the authors of the Erenahen Ransomware offer to decrypt one file free of charge, as long as it does not exceed 10MB in size. They also go on to warn the user against attempting to unlock the files on their own as this would cause permanent damage to the data supposedly.

The advice is to keep your distance when it comes to dealing with cyber crooks. They keep their promises rarely but will take your money gladly. A safer approach is to download and install a reputable anti-malware application, which will help you remove the Erenahen Ransomware from your computer and will keep it safe going forward.

Do You Suspect Your PC May Be Infected with Erenahen Ransomware & Other Threats? Scan Your PC with SpyHunter

SpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like Erenahen Ransomware as well as a one-on-one tech support service. Download SpyHunter's FREE Malware Remover
Note: SpyHunter's scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read more on SpyHunter. Free Remover allows you to run a one-off scan and receive, subject to a 48-hour waiting period, one remediation and removal. Free Remover subject to promotional details and Special Promotion Terms. To understand our policies, please also review our EULA, Privacy Policy and Threat Assessment Criteria. If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter.

Security Doesn't Let You Download SpyHunter or Access the Internet?

Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
  • Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
  • Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
  • Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
  • IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.
If you still can't install SpyHunter? View other possible causes of installation issues.

Site Disclaimer is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their PC with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your PC. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.