Threat Database Ransomware Instalador Ransomware

Instalador Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 1
First Seen: January 24, 2018
OS(es) Affected: Windows

Malware researchers discovered the Instalador Ransomware on January 19th, 2018. The first samples of the Instalador Ransomware suggest that the program is still under development and that the Instalador Ransomware is aimed at Portuguese-speaking users. The threat payload is designed to arrive on remote computers as a software package with updates to popular browser plug-ins like Adobe Flash Player and Java. The Instalador Ransomware appears to be based on the HiddenTear code, also seen as the Unikey Ransomware. The Instalador Ransomware Trojan behaves like the USBR Ransomware and uses a personalized AES-256 cipher to transcode the targeted data. The affected files are renamed to ..qwerty. For example, 'Tears of the Dragon.epub' is renamed to 'Tears of the Dragon.epub.qwerty' and programs like the Icecream eBook Reader are unable to load their contents.

The Instalador Ransomware is using the '.qwerty' extension to mark the transcoded objects and you may notice that images, presentations, databases, music, text, and spreadsheets are represented by white icons in the Windows Explorer. Some AV companies may use the name QwertyCrypt Ransomware as a substitute for the name Instalador Ransomware. The team behind the Instalador Ransomware is reported to ask potential victims to pay 0.05 Bitcoin (≈585 USD/478 EUR) for retrieving the decryption key and associated decryption program. Cybersecurity vendors stated that the Instalador Ransomware operators are using the 15tGsTDLMztrxP1kCoKPBTaBgv1xCKRtkY Bitcoin wallet to collect payments. Communication with the threat actors may be possible via a channel on the Telegram IM network, which is accessible via smartphones. Computer users that may fall victims to the Instalador Ransomware are likely to be directed to use the t.me/@rodolfoanubis IM channel if they are willing to deliver the ransom payment.

We encourage PC users to look out for the 'Instalador.exe' process that is associated with the Instalador Ransomware. The threat can be terminated with the help of a reputable cybersecurity product. You can rebuild your data using backups and search online for a tool called 'HiddenTearDecrypter.' Malware researchers were successful in cracking the encryption procedure in the Instalador Ransomware, but newer versions of the threat may feature a modified encryption sequence. That is why you should add a backup manager to your OS sooner rather than later. AV engines may flag the files related to the Instalador Ransomware, a.k.a. QwertyCrypt Ransomware as:

  • Ransom_Gen.R002C0WAK18
  • Trojan ( 005249991 )
  • Trojan-Ransom.FileCoder
  • Trojan-Ransom.Win32.Gen.hdp
  • Trojan.GenericKD.12777021
  • Trojan.Ransom.Instalador (A)
  • Trojan[Ransom]/Win32.AGeneric
  • Win32.Trojan.Gen.Wska

SpyHunter Detects & Remove Instalador Ransomware

File System Details

Instalador Ransomware may create the following file(s):
# File Name MD5 Detections
1. file.exe dc4c2932b4efa11cb2ce3e4761b1f8a1 1

Trending

Most Viewed

Loading...