MarioLocker Ransomware Description
The MarioLocker Ransomware is a new ransomware threat that was spotted by malware experts recently. It would appear that this brand-new data-encrypting Trojan does not belong to any of the popular ransomware families. Like most threats of this kind, the MarioLocker Ransomware would compromise a system, look for popular file types, apply and encryption algorithm to lock the targeted data, and then demand a ransom fee to reverse the damage.
Propagation and Encryption
Researchers are not fully certain how the authors of the MarioLocker Ransomware are propagating this threat. The most common propagation method, when it comes to file-locking Trojans, is spam emails. These emails would often contain a macro-laced document that is meant to seem harmless. However, upon opening the attached document, the user’s system will be infected. Authors of ransomware threats often use bogus application updates, fake pirated variants of legitimate software tools, and torrent trackers, among many other methods, to spread their nasty creations. Upon infecting the targeted system, the MarioLocker Ransomware will scan it to detect the locations of the files that are considered of interest. When the scan is completed, the MarioLocker Ransomware will apply an encryption algorithm to lock the targeted files. This file-locking Trojan is likely to go after a wide variety of files, images, music, documents, databases, videos, archives, presentations, etc. The more files the MarioLocker Ransomware locks, the more likely it is for the victim to pay up. Upon locking a file, the MarioLocker Ransomware applies a new extension to the affected files. This ransomware threat follows a certain pattern when renaming the files - ‘.wanted
The Ransom Note
The attackers’ ransom message can be found in a file named ‘@Readme.txt.’ However, they have neither mentioned a specific ransom fee, which will be demanded from the victim nor have they included any instructions on how to process the payment. Funny enough, they have not included any contact details either, which is rather unusual for authors of ransomware. Instead, they insist that the user opens a list of encrypted data located in ‘C:\Windows\Temp\YourFiles.txt.’
Despite the lack of a specific ransom fee being mentioned, you can be sure that the authors of the MarioLocker Ransomware will not agree to unlock your data for free but instead will demand a hefty sum in exchange for a decryption key. Instead of paying up the ransom fee, you should look into investing in a legitimate anti-malware application that will rid you of the MarioLocker Ransomware for good and keep your computer safe in the future.
Do You Suspect Your PC May Be Infected with MarioLocker Ransomware & Other Threats? Scan Your PC with SpyHunter
SpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like MarioLocker Ransomware as well as a one-on-one tech support service. Download SpyHunter's FREE Malware RemoverSecurity Doesn't Let You Download SpyHunter or Access the Internet?
Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:- Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
- Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
- Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
- IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.
Technical Information
File System Details
# | File Name | Size | MD5 | Detection Count |
---|---|---|---|---|
1 | file.exe | 2,414,592 | 2bf8e0f5e1a64f12b61bbaf128f7bab2 | 1 |
Site Disclaimer
This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your PC. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.