Threat Database Ransomware Paradise Ransomware

Paradise Ransomware

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 763
First Seen: September 13, 2017
Last Seen: December 7, 2021
OS(es) Affected: Windows

The Paradise Ransomware is an encryption ransomware Trojan first observed in the second week of September 2017. The Paradise Ransomware is part of a Ransomware as a Service (RaaS) platform that includes threats such as the TeslaWare. These services allow the con artists to lease a third-party to create and manage ransomware Trojans, which they can customize and distribute depending on the targets they want to attack. The people responsible for the RaaS receive a percentage of the profits while taking care of managing payments and maintaining them up-to-date. The person hiring the services of the RaaS can choose the way they will distribute the Paradise Ransomware. Some common ways of distributing these threats include corrupted spam email attachments and various compromised online websites and content.

The Paradise Ransomware and Its Use of RaaS

There are not many details about the RaaS platform since it runs anonymously and all communications are carried out on the Dark Web. The initial Paradise Ransomware attacks were targeted to Western Europe and the United States. The first variants of the Paradise Ransomware run as 'DP_Main.exe' on the infected computer and target computers running the Windows operating system. Like most encryption ransomware Trojans, the Paradise Ransomware is designed to encrypt the victim's data, then requesting that the victim pays a ransom in exchange for the decryption key. Otherwise, the victim's data will be lost forever. The Paradise Ransomware targets the user-generated files, including video, music, spreadsheets, configuration files, archives, and a wide variety of other commonly used file types. The files encrypted by the Paradise Ransomware are marked with the file extension '.paradise' and a unique identifier is added to this extension, which supposedly corresponds to an ID issued by the RaaS to the people hiring their services.

How the Paradise Ransomware Demands Its Ransom Payments

The files renamed by the Paradise Ransomware follow this pattern:

[file name].id-[affiliate_id].[affiliate_email].paradise

There have been several email addresses associated with the people using the Paradise Ransomware. The Paradise Ransomware delivers its ransom note in the form of a text file named '#DECRYPT MY FILES#.txt' dropped on the victim's desktop. The Paradise Ransomware's ransom note contains the following text:

'[WHAT HAPPENED]
Your important files produced on this computer have been encrypted due a security problem
If you want to restore them, write us to the e-mail: info@decrypt.ws
You have to pay for decryption in Bitcoins. The price depends on how fast you write to us.
After payment we will send you the decryption tool that will decrypt all your files.
[FREE DECRYPTION AS GUARANTEE]
Before paying you can send to us up to 3 files for free decryption.
Please note that files must NOT contain valuable information and their total size must be less than 1Mb
[HOW TO OBTAIN BITCOINS]
The easiest way to buy bitcoin is LocalBitcoins site.
You have to register, click Buy bitcoins and select the seller by payment method and price
hxxps://localbitcoins.com/buy_bitcoins
[ATTENTION]
Do not rename encrypted files
Do not try to decrypt your data using third party software, it may cause permanent data loss
If you not write on e-mail in 36 hours - your key has been deleted and you cant decrypt your files'

Dealing with a Paradise Ransomware Attack

The best way to protect your data from threats like the Paradise Ransomware is to have a reliable backup system in place. If you have file backups, then you can recover from the attack by restoring the files from the backup copy. This will undo the con artists' strategy to extort you and demand money. Apart from using a reliable backup method, PC security researchers also recommend that computer users have a security program that is fully up-to-date, which can be used to intercept and remove threats like the Paradise Ransomware from a targeted computer (although they will not restore the files already encrypted).

Update December 24th, 2018 — '.VACv2 File Extension' Ransomware

The '.VACv2 File Extension' Ransomware is categorized as a variant of the Paradise Ransomware that was released on December 24th, 2018. The new variant is named after the file marker placed on the encrypted content that is found in a custom suffix placed on filenames. The '.VACv2 File Extension' Ransomware uses a renaming scheme similar to the one used by the GandCrab Ransomware. Also, some users reported the '.VACv2' extension being listed with the name GandCrab 5.0.4 Ransomware that was identified in October 2018. We have no definitive proof that the '.VACv2 File Extension' Ransomware is based on GandCrab, but threat actors may use snippets of code associated with the GandCrab Ransomware and simply use other names to mislead security researchers. The '.VACv2 File Extension' Ransomware is observed to encode text, images, audio, video, databases, PDFs and eBooks by using a custom AES cipher. The filenames receive a new suffix that looks like this: __{pittt@prt-decrypt.xyz}.VACv2. For example, 'Sabathon-No Bullets Fly.mp3' may be renamed to 'Sabathon-No Bullets Fly.mp3_7ot27pkt81re_{pittt@prt-decrypt.xyz}.VACv2.' An important change spotted by research is the use of a new ransom note that resembles the one employed by the Dharma Ransomware variants. The new message employed by the '.VACv2 File Extension' Ransomware is styled as a Web page named '$%%! NOTE ABOUT FILES -=!-.html' and offers the following text:

'Your files are encrypted!
Paradise Ransomware Team!
Your personal ID
[16 random characters]
WHAT HAPPENED!
Your important files produced on this computer have been encrypted due to a security problem.
If you want to restore them, write to us by email.
You have to pay for decryption in Bitcoins. The price depends on how fast you write to us.
After payment, we will send you the decryption tool that will decrypt all your files.
Contact!
email: pittt@prt-decrypt.xyz'

The threat actors may offer victims to decrypt one file under 3 MB of size as proof that there is a decryptor. PC users who forgot to make a backup recently may consider paying money to the '.VACv2 File Extension' Ransomware creators. However, you should not trust the people behind the Paradise Ransomware. It is safer to use available data backups, check your email account for recently exchanged files and use older versions of your data from file hosting services. PC security experts remind users that the ransomware business may be in decline, but there are successful RaaS platforms that are still working, and you need to install a useful backup tool on your system.

Update January 4th, 2019 — 'alexbanan@tuta.io' Ransomware

The 'alexbanan@tuta.io' Ransomware is a generic encryption Trojan that appeared shortly after the '.VACv2 File Extension' Ransomware. The 'alexbanan@tuta.io' Ransomware is a member of the Paradise Ransomware family that behaves the same way as the original cyber threat. The threat authors use email accounts to spread the Trojan, but their tactics remain the same — an attached macro-enabled document is received via email claiming to offer important updates to social media and business propositions. PC users may be intrigued to find out more and load a corrupted macro script that installs the 'alexbanan@tuta.io' Ransomware on their devices in the background. The program at hand is reported to use the AES and RSA ciphers to lock content on the compromised devices. Also, the Trojan runs a command in the Command Line tool so that the System Restore points and the Shadow Volume snapshots are erased. The 'alexbanan@tuta.io' Ransomware encodes your typical file formats associated with photos, music, smartphone videos, office documents and some databases. The 'alexbanan@tuta.io' Ransomware marks files by adding the '.__{alexbanan@tuta.io}.CORP' extension. For example, 'Sabaton-The March To War.mp3' is renamed to'Sabaton-The March To War.mp3.__{alexbanan@tuta.io}.CORP.' Victims are shown a file called '$%%! NOTE ABOUT FILES -=!-.html' in the default system Web browser that reads:

'Your files are encrypted!
Paradise Ransomware Team!
Your personal ID
[16 random characters]
WHAT HAPPENED!
Your important files produced on this computer have been encrypted due to a security problem.
If you want to restore them, write to us by email.
You have to pay for decryption in Bitcoins. The price depends on how fast you write to us.
After payment, we will send you the decryption tool that will decrypt all your files.
Contact!
email: alexbanan@tuta.io'

There is no free decryption tool for the users affected by the 'alexbanan@tuta.io' Ransomware at the time of writing this. PC users need to be proactive in defending against threats like the Paradise Ransomware and other variants. You can use backup managers to produce protected archives with your data and make sure you have more than two data backups. That way you would not have to worry if the 'alexbanan@tuta.io' Ransomware managed to lock your content entirely. PC users are advised to disable macros entirely or enable macros from approved sources only.

November 2019 Update

Thanks to the efforts of the cybersecurity community and dedicated researchers, there is now a free decryption tool that can recover files scrambled by the Paradise ransomware.

The decryption tool can recover files with a number of different extensions used in various Paradise ransomware campaigns, including ".paradise", ".2ksys19", ".FC" and ".p3rf0rm4". The tool is a completely free download and comes with a detailed instruction manual with step-by-step instructions. However, Paradise Ransomware must still be removed from the infected system utilizing an antimalware resource. Otherwise, the threat may remain on the infected computer and later cause serious issues or encrypt additional files.

SpyHunter Detects & Remove Paradise Ransomware

File System Details

Paradise Ransomware may create the following file(s):
# File Name MD5 Detections
1. 8tBUerwbQCBA7MYZThoV4oGuOKN.exe a25cad303bd117999ef90678b14969be 300
2. b2ec.tmp.exe 7902fbf7c2c7d09290dc042a6c3e4ccc 263
3. bkh6t6lPwcsYFUvdcMKdg.exe a3c88bfcd317f5e57c84b32f9d545aab 37
4. 53cc.tmp.exe 0f7e6c13bd84333001688893dc6c242e 17
5. bim2VdFPLn54stHVKgKJ.exe f26b38954b3558da7e9bb6566d396e81 8
6. file.exe 8aa00ee509a649619794fc1390319293 2

Related Posts

Trending

Most Viewed

Loading...