Master Ransomware
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 100 % (High) |
Infected Computers: | 40 |
First Seen: | May 31, 2017 |
Last Seen: | November 4, 2019 |
OS(es) Affected: | Windows |
The Master Ransomware is a variant of a famous ransomware family known as BTCWare. Like other ransomware Trojans, the Master Ransomware is designed to encrypt the victims' files and then request the payment of a sum in exchange for the decryption key necessary to recover the affected files. Victims of the Master Ransomware attack will see a ransom note explaining the situation and demanding that the victim pays a ransom amount using BitCoins. Encryption ransomware Trojans like the Master Ransomware are among the most widely disseminated ransomware Trojans and pose a real danger to computer users. PC security investigators advise computer users to take steps to protect their files and computers from the Master Ransomware and similar threats.
The Master of Extortion
Computer users must refrain from paying the Master Ransomware ransom or contacting the Master Ransomware's creators since there is nothing that can guarantee that they will restore the victim's files and, furthermore, the payment of these ransoms allows the con artists to continue developing these threat attacks. PC security researchers instead advise computer users to take steps to protect their files using file backups and a reliable security program that is fully up-to-date.
The Master Ransomware attack itself is a typical example of these tactics. The Master Ransomware uses a strong encryption algorithm to make the victim's files completely inaccessible. The Master Ransomware will mark the files encrypted with the file extension '.master,' although some variants of this file extension that have been observed in attacks include '[BM-NBM1DiE52wgzUUnzcRPwjMjPEcV4qfpr@bitmessage.ch].master,' '.help@onyon.info].master' and '.[niga@westcost.xyz].master.' Apart from encrypting the victim's files, the Master Ransomware will drop an INF file on the infected computer's desktop. This file contains the Master Ransomware's ransom note and is named '!#_RESTORE_FILES_#!.inf'. Below is the full text of the Master Ransomware's ransom note:
'[WHAT HAPPENED]
Your important files produced on this computer have been encrypted due to a security problem
If you want to restore them, write us to the email: BM-NBM1DiE52wgzUUnzcRPwjMjPEcV4qfpr@bitmessage.ch or makedonskiy@gmx.com
You have to pay for decryption in Bitcoins. The price depends on how fast you write to us.'
Preventing the Invasion of the Master Ransomware and Similar Threats
The best protection against ransomware Trojans is file backups since it gives computer users the ability to recover their files from the backup, rather than having to pay the ransom to recover the affected files. It makes the ransomware tactic completely ineffective effectively since the people responsible for the Master Ransomware attack lose any power they have over the victim. Although it is not possible to recover files encrypted by the Master Ransomware currently, in the past, it has been possible to develop decryption programs that have helped computer users recover from attacks very similar to the Master Ransomware and even closely related to its threat family. Because of this, it is possible that a recovery method for the Master Ransomware may be released over time by malware researchers.
SpyHunter Detects & Remove Master Ransomware

File System Details
# | File Name | MD5 |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
---|---|---|---|
1. | name.exe | 5940d1ee535b763b8affa8df6daca100 | 0 |