Threat Database Ransomware Gedantar Ransomware

Gedantar Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 1
First Seen: April 4, 2018
Last Seen: April 18, 2018
OS(es) Affected: Windows

The Gedantar Ransomware is an encryption ransomware Trojan. Once the Gedantar Ransomware infects a computer, it will run as an executable file named 'Gedantar.exe.' PC security researchers received the first reports of the Gedantar Ransomware infections on March 28, 2018. It seems that the Gedantar Ransomware is designed to target computer users in Russian-speaking locations because it delivers a ransom note written in Russian to the victim's computer. The Gedantar Ransomware is a variant of Unlock92, a ransomware family that includes several threats. The Gedantar Ransomware is the fourth version in this family of threats.

How the Gedantar Ransomware Carries out Its Attack

The most common way in which the Gedantar Ransomware enters a computer is through spam email messages. Victims will receive a spam email message containing an attached document with enabled macro scripts. The Gedantar Ransomware will be downloaded and installed on the victim's computer by these macros. Once the Gedantar Ransomware is installed, it will use a strong encryption algorithm to encrypt the victim's files, making them inaccessible. The Gedantar Ransomware will mark the files encrypted by the attack by adding a string of eight random characters after the file's original name but preserving the original file extension. However, the Gedantar Ransomware will make the affected files to become inaccessible, and their contents will be locked away. Some samples of the files that are commonly targeted in attacks like the Gedantar Ransomware include:

.3dm, .3g2, .3gp, .7zip, .aaf, .accdb, .aep, .aepx, .aet, .ai, .aif, .as, .as3, .asf, .asp, .asx, .avi, .bmp, .c, .class, .cpp, .cs, .csv, .dat, .db, .dbf, .doc, .docb, .docm, .docx, .dot, .dotm, .dotx, .dwg, .dxf, .efx, .eps, .fla, .flv, .gif, .h, .idml, .iff, .indb, .indd, .indl, .indt, .inx, .jar, .java, .jpeg, .jpg, .js, .m3u, .m3u8, .m4u, .max, .mdb, .mid, .mkv, .mov, .mp3, .mp4, .mpa, .mpeg, .mpg, .msg, .pdb, .pdf, .php, .plb, .pmd, .png, .pot, .potm, .potx, .ppam, .ppj, .pps, .ppsm, .ppsx, .ppt, .pptm, .pptx, .prel, .prproj, .ps, .psd, .py, .ra, .rar, .raw, .rb, .rtf, .sdf, .sdf, .ses, .sldm, .sldx, .sql, .svg, .swf, .tif, .txt, .vcf, .vob, .wav, .wma, .wmv, .wpd, .wps, .xla, .xlam, .xll, .xlm, .xls, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .xqx, .xqx, .zip.

The Gedantar Ransomware’s Ransom Demand

The Gedantar Ransomware will deliver a ransom note in the form of a JPG image that will be delivered as a JPG file with a name composed of 20 random characters. The image consists of a white screen with black text and red hyperlinks. The text of the Gedantar Ransomware ransom note, written entirely in Russian, reads:

'Ваши файлы были зашифрованы с помощью алгоритма а5А-2048 Если вы хотите их вернуть то отправьте один из зашифрованных файлов на е-mail: unlckr@protonmail.com
Если вы не получили ответ в течение суток то скачайте с сайта www.torproject.com браузер ТО и с его помощью зайдите на сайт h[tt]p://n3r2kuzhw2h7x6j5[.]onion -там будет указан действующий V почтовый ящик.
Попытки самостоятельного восстановления файлов могут безвозвратно их испортить!'

An English translation of the Gedantar Ransomware ransom note:

'Your files were encrypted using the a5A-2048 algorithm. If you want to return them, send one of the encrypted files to an e-mail: unlckr@protonmail.com
If you did not receive a reply within 24 hours then download the TO browser from the site www.torproject.com and use it to go to the site h[tt]p://n3r2kuzhw2h7x6j5[.]onion -the current V mailbox will be indicated.
Attempts to repair files yourself can irrevocably ruin them!'

The email address used by the people associated with the Gedantar Ransomware has been observed in previous versions in this ransomware family.

Dealing with the Gedantar Ransomware

Unfortunately, once the Gedantar Ransomware has compromised the files, they will not be recoverable without the decryption key. Because of this, PC security researchers advise using a security program that is fully up-to-date and handling spam email with caution, to prevent the Gedantar Ransomware from being installed in the first place. Computer users should use backup copies of their files to restore any files encrypted by the Gedantar Ransomware attack.

SpyHunter Detects & Remove Gedantar Ransomware

File System Details

Gedantar Ransomware may create the following file(s):
# File Name MD5 Detections
1. Gedantar.exe 8afcb6e9b45c234bbb5982f382396049 0

Trending

Most Viewed

Loading...