Threat Database Ransomware Executioner Ransomware

Executioner Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 21
First Seen: June 7, 2017
Last Seen: March 23, 2023
OS(es) Affected: Windows

The Executioner Ransomware is a ransomware Trojan that was first observed on June 6, 2017. The Executioner Ransomware delivers its ransom note and attack in English and seems to be delivered to victims through corrupted email attachments sent in spam email messages. Most of the Executioner Ransomware attacks and their associated spam email campaign are targeting computer users in Western Europe and North America. There is little to differentiate the Executioner Ransomware from most encryption ransomware Trojans that are active currently. As with most ransomware Trojans, the goal of the Executioner Ransomware attack is to encrypt the victims' files and then demand the payment of a large ransom in exchange for the decryption key or software necessary to recover the affected files. In essence, the Executioner Ransomware takes the victim's files hostage and then demands the payment of a ransom.

The Executioner Ransomware and Other Encryption Ransomware Trojans

New versions of ransomware Trojans like the Executioner Ransomware are released every day. The Executioner Ransomware represents a threat to computer users and their data. Because of the high number of ransomware Trojans being distributed currently, it is more needed than ever that computer users protect their data with the help of a reliable, fully updated anti-malware application. Since the Executioner Ransomware and other ransomware Trojans may be delivered through the use of corrupted spam email attachments, take steps to ensure that this content does not reach your computer and learn to handle these messages if they happen to make it past your anti-spam filter.

How the Executioner Ransomware Executes Its Attack

The Executioner Ransomware is very similar to other ransomware Trojans targeting computer users in Turkey released recently. The Executioner Ransomware will search for the user-generated files such as those created with software such as Windows Photo, Microsoft Office, Adobe Acrobat, etc., as well as media files, which may include video, audio, images and various others. The Executioner Ransomware will use a strong encryption algorithm to make its victim's files unreadable. The Executioner Ransomware will deliver a ransom note once the victim's files have been compromised. The Executioner Ransomware delivers its ransom note in the form of an HTML file named 'Sifre_Cos_Talimat.html' written in Turkish. Below is a translation into English of the Executioner Ransomware's ransom note text:

'READ THIS!
YOUR FILES HAVE BEEN ENCRYPTED BY the Executioner Ransomware !!!
TEXT, PHOTOGRAPHS, AUDIO IN YOUR COMPUTER AND OTHER IMPORTANT FILES !!
YOU NEED DECRYPTION SOFTWARE TO RECOVER THE FILES
NOTE: DO NOT CLOSE THE WINDOW
OR YOU WILL NOT RECOVER YOUR FILES!
BUY SOFTWARE?
THE PRICE IS $ 150 BITCOIN
ID NUMBER: [RANDOM CHARACTERS]
THEN YOU WRRITE AN EMAIL INCLUDING YOUR ID
DO NOT RENAMED FILES AND CHANGE THEIR SIZE
GOOD LUCK!
Mail:executioner.ransom@protonmail.com
EXECUTIONER'

Protecting Your Data from the Executioner Ransomware and Similar Ransomware Trojan

The files encrypted in the Executioner Ransomware attack will have random extensions and text strings added to their names frequently. Computer users should refrain from contacting the people responsible for the Executioner Ransomware attack or paying the ransom amount. Instead of doing this, take steps to protect your data from this and other attacks. The most effective way of ensuring that your data is safe from the Executioner Ransomware and other encryption ransomware Trojans is to have a reliable backup system. If you can recover your files by copying over from a backup copy in the cloud or a mobile memory device, then the people responsible for the Executioner Ransomware attack lose any power that allows them to demand a ransom payment from you. In fact, once enough computer users have backup copies of their data, then attacks like the Executioner Ransomware will become obsolete and will die off. Apart from file backups, you should have a reliable security program that you can trust.

SpyHunter Detects & Remove Executioner Ransomware

File System Details

Executioner Ransomware may create the following file(s):
# File Name MD5 Detections
1. file.exe eec4f84d12139add6d6ebf3b8c72fff7 0

Registry Details

Executioner Ransomware may create the following registry entry or registry entries:
Regexp file mask
%USERPROFILE%\ransom.jpg

Related Posts

Trending

Most Viewed

Loading...