Evil Ransomware

Evil Ransomware Description

The Evil Ransomware is an encryption ransomware Trojan that is written in JavaScript. The Evil Ransomware encrypts its victims' files, adding the extension 'fie0locked' to each affected file. Once the victim's files are encrypted and no longer accessible, the Evil Ransomware displays a ransom note, dropping it on the affected computer's Desktop. The Evil Ransomware is designed to take its victims' files hostage until a ransom is paid.

The Evil Ransomware Uses a JavaScript Exploit to be Distributed

There are several ways in which threats like the Evil Ransomware may be distributed. One of the most common ways of distributing the Evil Ransomware is through corrupted email attachments distributed in spam email campaigns. The Evil Ransomware has been linked to a JavaScript exploit that is used to install this threat on the victim's computer. The Evil Ransomware has been observed on social media spam messages, as well as hidden in torrents on file sharing networks. Because of this, computer users are advised to exercise caution when handling any unsolicited emails or messages and avoid potentially harmful websites such as illegal file sharing sites.

How the Evil Ransomware Attack Works

Encryption ransomware Trojans like the Evil Ransomware are designed to take over the victim's files, making them inaccessible. These threats display a ransom note on the victim's computer, which alerts the victim of the attack and demands the payment of a ransom. The Evil Ransomware will create several files on the victim's computer, including the following:


The first two of these files contain the Evil Ransomware's ransom note in the form of a text file and an HTML file opened by the victim's Web browser. The second file is the image used to change the victim's Desktop background. The 'list.txt' file contains a listing of all of the files that were encrypted during the Evil Ransomware attack. The Evil Ransomware displays its ransom note after the victim's files are encrypted. The ransom note contains information on payment and the attack. The full text of the ransom note reads as follows:

Your UID: [Redacted] Its the Evil ransomware. As you can see some of your files have been encrypted!
Encryption was made using a unique strongest AES key.
If you want restore your files you need to BUY (sorry, nothing personal, its just business) the private key, send me your UID to r6789986@mail.kz'

During its attack, the Evil Ransomware will encrypt numerous file types, including the following:

.3fr, .accdb, .ai, .arw, .bay, .cdr, .cer, .certs, .cr2, .crt, .crw, .dbf, .dcr, .der, .dng, .doc, .dwg, .dxf, .dxg, .eps, .erf, .img, .indd, .jpg, .kdc, .mdb, .mdf, .mef, .mrw, .nef, .nrw, .odb, .odc, .odm, .odp, .ods, .odt, .orf, .p12, .p7b, .p7c, .pdd, .pef, .pem, .pfx, .ppt, .psd, .pst, .ptx, .pub, .r3d, .raf, .raw, .rtf, .rw2, .rwl, .sr2, .srf, .srw, .wb2, .wpd, .wps, .x3f, .xlk, .xls.

Dealing with the Evil Ransomware

PC security analysts strongly advise against paying the Evil Ransomware ransom. In many cases, the people responsible for these attacks will ignore the victim's payment, ask for more money, or deliver a decryption utility that does not work. Unfortunately, once the attack has been carried out, the victim's files will remain inaccessible. This is what makes these attacks so effective. Because of this, preventive measures are the most important aspect of dealing with ransomware threats. PC security researchers strongly advise computer users to use a reliable security program that is fully up-to-date to protect their computers. The use of a good anti-spam filter can stop the email messages used to distribute the Evil Ransomware. Most importantly, computer users should have backups of their files. Being able to recover the affected files from a backup copy makes the Evil Ransomware attack completely ineffective.

Infected with Evil Ransomware? Scan Your PC for Free

Download SpyHunter's Spyware Scanner
to Detect Evil Ransomware
* SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read more on SpyHunter. If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter.

Security Doesn't Let You Download SpyHunter or Access the Internet?

Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
  • Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
  • Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
  • Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
  • IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.

If you still can't install SpyHunter? View other possible causes of installation issues.

Related Posts

Site Disclaimer

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.

IMPORTANT! To be able to proceed, you need to solve the following simple math.
Please leave these two fields as is:
What is 10 + 6 ?