Threat Database Ransomware Raf Ransomware

Raf Ransomware

After analyzing the underlying code of the Raf Ransomware threat, cybersecurity researchers have determined that it is a variant from the Makop Ransomware family. Devices infected with the threat will be subjected to data encryption, which will result in a vast portion of the files stored on them no longer being accessible or usable.

As part of the invasive actions performed by the threat, the names of the locked files also will be modified to a significant degree. Indeed, victims will notice that their files now have an ID string, an email address, and a new file extension added to their original names. The email address in question is 'khakuta@msgsafe.io,' while the file extension is '.Raf.' A ransom note will be dropped on the desktop of the breached devices in the form of a text file named 'readme-warning.txt.'

Ransom Note's Details

The ransom-demanding message of the threat follows a Q&A (question and answer) format. It reveals that Raf Ransomware victims are expected to pay a ransom using the Bitcoin cryptocurrency. Affected users also are allowed to send 2 encrypted files to be unlocked for free. However, the chosen files must meet several requirements. First, they must have simple extensions, such as jpg, xls, doc and similar. Second, they must not exceed 1MB in size. To send the files and receive additional instructions, victims are left with two email addresses that act as communication channels - 'khakuta@msgsafe.io' and 'wisetech01@msgsafe.io.'

The entire ransom note of the threat is:

'::: Greetings :::

Little FAQ:
.1.
Q: Whats Happen?
A: Your files have been encrypted and now have the "Raf" extension. The file structure was not damaged, we did everything possible so that this could not happen.

.2.
Q: How to recover files?
A: If you wish to decrypt your files you will need to pay in bitcoins.

.3.
Q: What about guarantees?
A: Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will cooperate with us. Its not in our interests.
To check the ability of returning files, you can send to us any 2 files with SIMPLE extensions(jpg,xls,doc, etc… not databases!) and low sizes(max 1 mb), we will decrypt them and send back to you. That is our guarantee.

.4.
Q: How to contact with you?
A: You can write us to our mailbox: khakuta@msgsafe.io or wisetech01@msgsafe.io

.5.
Q: How will the decryption process proceed after payment?
A: After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files.

.6.
Q: If I don’t want to pay bad people like you?
A: If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause only we have the private key. In practice - time is much more valuable than money.
:::BEWARE:::
DON'T try to change encrypted files by yourself!
If you will try to use any third party software for restoring your data or antivirus solutions - please make a backup for all encrypted files!
Any changes in encrypted files may entail damage of the private key and, as result, the loss all data.'

Related Posts

Trending

Most Viewed

Loading...