Threat Database Ransomware mr.yoba@aol.com Ransomware

mr.yoba@aol.com Ransomware

By GoldSparrow in Ransomware

The mr.yoba@aol.com Ransomware is a recently spotted ransomware threat. Unfortunately, It is likely that there is not a free decryption tool available yet.

Propagation and Encryption

It is not yet known how are the authors of the mr.yoba@aol.com Ransomware propagating their creation exactly. Some believe that mass spam email campaigns alongside fake software updates and infected pirated copies of legitimate applications may be some of the infection vectors used in the propagation of the mr.yoba@aol.com Ransomware. Once it infects your system, it will scan it to locate the files of interest, which will be marked for encryption. Then, the mr.yoba@aol.com Ransomware will begin its encryption process. Once the mr.yoba@aol.com Ransomware locks a file, it also changes its name. This threat uses a random combination of numbers as an extension. For example, a document called 'summer.docx' will be renamed to 'summer.docx.340217.'

The Ransom Note

After the mr.yoba@aol.com Ransomware is done encrypting your data, it will drop two ransom notes called 'FIX_Instructions.txt' and 'FIX_Instruction.hta.' The ransom message reads:

’ ########################|--++++++++++++++--|########################
# | R E L O C K | #
########################|--++++++++++++++--|########################
[$$ Why i can't open any file? $$]
Your files have been encrypted with symmetric encryption algorithm: Rabbit
and two assymetric encryption algorithms: secp256k1, NTRU
secp256k1:
https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm
Rabbit: https://en.wikipedia.org/wiki/Rabbit_(cipher)
NTRU: https://en.wikipedia.org/wiki/NTRUEncrypt
You can't restore your files yourself without secp256k1 Diffie Hellman's secret,
you can see encrypted version of this secret below, only we can decrypt this
string because only we have private NTRU key.
If you want to restore your files
you must pay some funds.
[$$ What's guarantees? $$]
We don't interested in scam. If you pay we will send you
software that unlock your files.
Also we can decrypt one file for test (file size must be < 1024KB). [$$ How can i contact with you? $$] you must write here ( mr.yoba@aol.com ) and send string that you can see below. WARNING! 1) Someone else's decryption software can't help you, it will break your data. 2) Don't try to fix files yourself or use another software, it will break your data. Diffie Hellman's secret (encrypted version): -----BEGIN RELOCK KEY----- { 25, 20, 0, 32, 35, 118, 68, 51, 22, 78, 8, 45, 41, 19, *** }; { 35, 34, 108, 22, 57, 26, 83, 39, 111, 38, 82, 116, 53, *** }; { 68, 88, 95, 80, 120, 75, 107, 106, 56, 17, 7, 58, 32, *** }; ------END RELOCK KEY----- #######################################################################’

The authors of this ransomware threat provide the victim with an email address, 'mr.yoba@aol.com,' where they expect to be contacted. The attackers demand the ransom fee to be paid in Bitcoin. They also propose to decrypt one file for free as long as its size does not exceed 1MB.

Interestingly enough, there have been reports of another ransomware threat using the same email address as the mr.yoba@aol.com Ransomware. Its name is Junior Ransomware, and it is likely that the same shady individuals responsible for the mr.yoba@aol.com Ransomware may be behind the Junior Ransomware too.

We would recommend you strongly to avoid any contact with cyber crooks like the ones responsible for the mr.yoba@aol.com Ransomware. These individuals are not to be trusted. Instead, you should consider downloading and installing a legitimate anti-malware tool, which will rid you of the mr.yoba@aol.com Ransomware once and for all.

Trending

Most Viewed

Loading...