Threat Database Ransomware KingOuroboros Ransomware

KingOuroboros Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 3
First Seen: June 27, 2018
OS(es) Affected: Windows

The KingOuroboros Ransomware is an encryption ransomware Trojan that seems to be based on CryptoWire, an open-source ransomware Trojan that was first observed in October of 2016. There have been multiple variants in this ransomware family, with the KingOuroboros Ransomware being one of the latest. It seems that one of the leading ways in which the KingOuroboros Ransomware is delivered to victims, like many other encryption ransomware Trojans, is through corrupted spam email attachments, which use embedded macro scripts to download and install the KingOuroboros Ransomware onto the victim's computer.

How the KingOuroboros Ransomware Carries Out Its Attack

Once the KingOuroboros Ransomware is installed onto the victim's PC, it will use the AES encryption to make the victim's files inaccessible. The KingOuroboros Ransomware will target the user-generated files in its attack, which may include numerous documents, media files, databases and various other file types. The following are some of the file extensions that are typically targeted in attacks like the KingOuroboros Ransomware:

.3dm, .3g2, .3gp, .7zip, .aaf, .accdb, .aep, .aepx, .aet, .ai, .aif, .as, .as3, .asf, .asp, .asx, .avi, .bmp, .c, .class, .cpp, .cs, .csv, .dat, .db, .dbf, .doc, .docb, .docm, .docx, .dot, .dotm, .dotx, .dwg, .dxf, .efx, .eps, .fla, .flv, .gif, .h, .idml, .iff, .indb, .indd, .indl, .indt, .inx, .jar, .java, .jpeg, .jpg, .js, .m3u, .m3u8, .m4u, .max, .mdb, .mid, .mkv, .mov, .mp3, .mp4, .mpa, .mpeg, .mpg, .msg, .pdb, .pdf, .php, .plb, .pmd, .png, .pot, .potm, .potx, .ppam, .ppj, .pps, .ppsm, .ppsx, .ppt, .pptm, .pptx, .prel, .prproj, .ps, .psd, .py, .ra, .rar, .raw, .rb, .rtf, .sdf, .sdf, .ses, .sldm, .sldx, .sql, .svg, .swf, .tif, .txt, .vcf, .vob, .wav, .wma, .wmv, .wpd, .wps, .xla, .xlam, .xll, .xlm, .xls, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .xqx, .xqx, .zip.

The KingOuroboros Ransomware also will delete the Shadow Volume Copies of the files encrypted by the attack and will mark these files with the string 'king_ouroboros,' added to the end of the affected file's name. The affected file will preserve, however, its original file extension, but will not be recognized when the victim attempts to open it.

The KingOuroboros Ransomware’s Ransom Demands

The KingOuroboros Ransomware will deliver a program window titled 'Delta' after encrypting the victim's files. This window will notify the victims that their files were encrypted and contained the demanded ransom, which must be in Bitcoin, and supposedly will pay for a decryptor. The text on the KingOuroboros Ransomware ransom note reads:

'Your files has been safely encrypted
Encrypted files: [random number]
[follows a list of addresses for the encrypted files]
[Buy Bitcoins|BUTTON] [Decrypt Files|BUTTON] [TEXT BOX FOR THE KEY]
The only way you can recover your files is to buy a decryption key
The payment method is Bitcoin. The price is $50 = Bitcoins
After buying hr amount of bitcoins send an email
to king.ouroboros@protonmail.com Your ID: [random characters
We will provide you payment address and your decryption key
You have 72 Hours to complete the payment otherwise your key will be deleted.'

Unless there's no other solution, the payment of the KingOuroboros Ransomware ransom or following the instructions in the KingOuroboros Ransomware's ransom demand is highly discouraged. Instead, steps should be taken to prevent these kinds of attacks in the first place.

Preventive Steps You Can Take to Avoid the KingOuroboros Ransomware Attacks

A security program that is fully up-to-date is fundamental in preventing attacks like the KingOuroboros Ransomware, which are becoming more common increasingly. Apart from a reliable anti-virus application, it is important to have file backups. File backups allow computer users to restore their files after their attack without having to interact with the criminals responsible for the KingOuroboros Ransomware infection. Unfortunately, it is not possible to restore the files encrypted in attacks like the KingOuroboros Ransomware currently, due to the strength and nature of the encryption method used to take the files hostage.

SpyHunter Detects & Remove KingOuroboros Ransomware

File System Details

KingOuroboros Ransomware may create the following file(s):
# File Name MD5 Detections
1. d4de58e79bfcf66ea933e50fbeada266fe32ee2ce0636419ed9ec0f60a99ea2c.exe 8893004b04b4436eb47e9b504b7a437f 3
2. file.exe a50051fb910aabf6e953f813b4212369 0

Trending

Most Viewed

Loading...